Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 10, Issue 6;   February 10, 2010: Confronting the Workplace Bully: II

Confronting the Workplace Bully: II

by

When bullied, one option is to fight back, but many don't, because they fear the consequences. Confrontation is a better choice than many believe — if you know what you're doing.
Senator Joseph R. McCarthy (Democrat of Wisconsin)

Senator Joseph R. McCarthy (Democrat of Wisconsin), Senator from January 3, 1947, through May 2, 1957. He was a renowned bully who had made a career of accusing notables and government employees of associations with the Communist Party. Following his re-election in 1952, he was made Chairman of the Senate Committee on Government Operations, which was thought to be a less-visible position where he would be relatively unable to continue his more outrageous bullying patterns. But this committee included a subcommittee, the Senate Permanent Subcommittee on Investigations, which he bent to his will. Beginning in April, 1954, in 36 day of hearings televised by all three networks, he accused hundreds of people of treason and subversion, destroying countless careers and sometimes lives. But in one famous exchange with Attorney Joseph N. Welch, he met his match. On the thirtieth day of the hearings, on June 9, following a truly outrageous provocation by Sen. McCarthy, Mr. Welch confronted the bully with calm restraint. The hearings went on for six more days, but they were finished. The Senator's career unraveled rapidly thereafter. He was censured by the Senate on December 2, and his career was ruined. Listen to the exchange between McCarthy and Welch. Photo courtesy United States Senate.

Workplace bullies select targets carefully, focusing on those who can't or won't fight back, because bullies fear counterattacks. If you've been targeted, the bully probably believes you won't fight back, and, paradoxically, that's the key to successful confrontation. Here is Part II of our series on confronting the workplace bully, including six tips for managing an effective confrontation. See "Confronting the Workplace Bully: I," Point Lookout for February 3, 2010, for more.

Have a clear objective
You probably can't "fix" or instruct or improve the bully, because you haven't been asked to. But you can force the bully to find another target, or at least, cease targeting you. That is a clear, achievable objective.
It can't be achieved in one dramatic incident. Prepare for a campaign — a series of small face-offs.
Rely on strategic surprise
As you begin formulating a campaign, you'll feel an urge to counterattack immediately in small ways. Resist the urge. Bullies sense these changes. If you counterattack before you're really ready, the bully can prepare for whatever you finally decide to do.
Strategic surprise is a significant advantage. Maintain the posture of a helpless target until you can suddenly apply overwhelming force. See "Biological Mimicry and Workplace Bullying," Point Lookout for March 31, 2010, for more.
Most workplace bullying is psychological, not physical
While physical bullying does occur, most workplace bullying is psychological, consisting of rumors, lies, shunning, innuendo, exclusion, humiliation, shouting, insults, and more. Avoid physical confrontation, because criminal charges are likely.
Tactics for effective counterattacks depend on the tactics of the bully. Choose an approach at which you're more skilled — or can become more skilled — than the bully is.
In private, initiate; in public, respond
In each As you begin formulating a
campaign of counterattack,
you'll feel an urge to counter-
attack immediately in small
ways. Resist the urge.
confrontation incident, choose between initiating and responding. In private, initiating the confrontation is a powerful display of confidence and courage. Without witnesses, you have more tactical freedom. In public, wait to be attacked, and respond powerfully.
If you counterattack in public without provocation, you might seem yourself to be a bully. Provocation by the bully is essential to success in public counterattacks.
Choose a favorable setting
Choose the setting for counterattacks carefully. The most favorable setting is either private or one in which most onlookers are hostile to the bully.
Don't expect open demonstrations of support, because bullies make such demonstrations risky for your supporters. All you need is a few witnesses who are willing to say that the bully provoked you, and that you acted reasonably.
In attack, be cool
Screaming, tears, and other expressions of emotion reduce your chances of success. A cool, deliberative posture says, "I enjoy making trouble for you, because you've made so much trouble for me." It shows that you can carry out your plan for as long as necessary.
The goal of counterattack is to demonstrate that bullying you will be an expensive, painful affair. Coolness emphasizes and supports that message.

All these ideas work better if you believe in yourself. That is the place to begin. You can do it.  Confronting the Workplace Bully: I First issue in this series  Go to top Top  Next issue: The Politics of Lessons Learned  Next Issue

101 Tips for Targets of Workplace BulliesIs a workplace bully targeting you? Do you know what to do to end the bullying? Workplace bullying is so widespread that a 2014 survey indicated that 27% of American workers have experienced bullying firsthand, that 21% have witnessed it, and that 72% are aware that bullying happens. Yet, there are few laws to protect workers from bullies, and bullying is not a crime in most jurisdictions. 101 Tips for Targets of Workplace Bullies is filled with the insights targets of bullying need to find a way to survive, and then to finally end the bullying. Also available at Apple's iTunes store! Just . Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Bullying:

Too much time on his handsHurtful Clichés: II
Much of our day-to-day conversation consists of harmless clichés: "How goes it?" or "Nice to meet you." Some other clichés aren't harmless, but they're so common that we use them without thinking. Here's Part II of a series exploring some of these clichés.
Threatened and fearfulThe Costs of Threats
Threatening as a way of influencing others might work in the short term. But a pattern of using threats to gain compliance has long-term effects that can undermine your own efforts, corrode your relationships, and create an atmosphere of fear.
A captive zebra of the species Equus quagga (plains zebra)How Targets of Bullies Can Use OODA: I
Most targets of bullies just want the bullying to stop, but most bullies don't stop unless they fear for their own welfare if they continue the bullying. To end the bullying, targets must turn the tables.
The Yin and Yang symbol with white representing Yang and black representing YinUnrecognized Bullying: III
Much workplace bullying goes unrecognized because of cognitive biases that can cause targets, perpetrators, bystanders, and supervisors of perpetrators not to notice bullying. The Halo Effect and the Horn Effect are two of these biases.
"Approaching the fowl with stalking-horse", an 1875 illustration of a cut-out horse shape used in huntingBullying by Proxy: II
Bullying by proxy occurs when A bullies B at the behest of C. Organizational control of bullying by proxy is difficult, in part, because C's contribution is covert. Policies that control overt bullying are less effective at controlling bullying by proxy.

See also Workplace Bullying and Workplace Bullying for more related articles.

Forthcoming issues of Point Lookout

A white water rafting team completes its courseComing December 11: White Water Rafting as a Metaphor for Group Development
Tuckman's model of small group development, best known as "Forming-Storming-Norming-Performing," applies better to development of some groups than to others. We can use a metaphor to explore how the model applies to Storming in task-oriented work groups. Available here and by RSS on December 11.
Tuckman's stages of group developmentAnd on December 18: Subgrouping and Conway's Law
When task-oriented work groups address complex tasks, they might form subgroups to address subtasks. The structure of the subgroups and the order in which they form depend on the structure of the group's task and the sequencing of the subtasks. Available here and by RSS on December 18.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.