Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 12, Issue 31;   August 1, 2012:

Rapid-Fire Attacks

by

Someone asks you a question. Within seconds of starting to reply, you're hit with another question, or a rejection of your reply. Abusively. The pattern repeats. And repeats again. And again. You're being attacked. What can you do?
An Africanized honeybee, also known as a killer bee

An Africanized honeybee, also known as a killer bee. Africanized honeybees are indeed more aggressive than European honeybees, but their stings are not any more deadly. When they do engage animals that they have determined are predators, they are more successful than their European counterparts, not because of the power of their stings, but because they attack in far greater numbers, with far less provocation, and with far greater persistence. For these reasons, they are far more likely than their European counterparts to get "inside" their targets' OODA loops. This is the same strategy that the attacker in the office exploits when employing rapid-fire attacks. Photo (cc) Jeffrey W. Lotz, courtesy Wikipedia.

The rapid-fire attack, often executed before witnesses or within earshot of witnesses, can be unbearable. Defending against it can be even more difficult. But targets who understand the dynamics that make these attacks so hurtful can respond effectively. And that can be very satisfying.

The OODA model of conflict can help us understand the power of the rapid-fire attack. (See "OODA at Work," Point Lookout for April 6, 2011) According to OODA, when we're engaged in conflict, we cycle through a loop of Observing, Orienting, Deciding, and Acting. If the attacks arrive more rapidly than the target can cycle through his or her OODA loop, the attacker can eventually prevail. Unable to keep up with the attacks, some targets feel so overloaded and frustrated that clear thinking itself becomes impossible.

When this happens, how can targets respond? Let's first explore some responses that are usually ineffective.

File complaints
Targets can complain to the attacker's supervisor, to their own supervisors, or to the Human Resources department.
Most likely, if a pattern is in place, a competent supervisor — the target's or the attacker's — would have already noticed the pattern. The supervisor hasn't acted effectively, and probably won't or can't. Still, complaining to supervisors might be worthwhile. It's a matter of judgment.
Filing complaints with Human Resources might work, especially if the organization has a workplace bullying policy. (See "What Is Workplace Bullying?," Point Lookout for March 3, 2010, for more) But what ensues will be beyond the target's control. For example, the investigation will probably involve interviews of all concerned. If any of those interviewed experience these interviews as attacks instigated by the target, retribution could follow.
Build alliances
Sometimes, targets try to assemble alliances of witnesses and other targets, before filing a joint complaint. This approach can work, but there are risks. First, alliance members might not preserve confidentiality. If any of them circulates information about the alliance before the alliance takes action, the attacker can disable the alliance before it can act.
More important, the person who initiates the alliance might be seen by Management as a "troublemaker." Almost certainly, the attacker will attempt to characterize the alliance initiator as such. If that characterization sticks, the initiator has a new problem, far more serious than the attacker's attacks.
Wait for the attacks to pass
Waiting can work, Filing complaints with Human Resources
might work, especially if the
organization has a workplace
bullying policy
but targets must maintain an unfailingly cool demeanor, because the attacks will persist, and they might even escalate. As they escalate, they become more obvious to all, and the attacker acquires a well-deserved reputation.
If the target remains cool, never showing aggression, the attacks will seem to be unprovoked, which could force Management to act. But a single break in discipline by the target can make the attacks seem provoked, reducing the likelihood of Management intervening on behalf of the target.

Next time we'll examine a tactic that can work even if all of the above tactics fail.  Next in this series Go to top Top  Next issue: Dealing with Rapid-Fire Attacks  Next Issue

101 Tips for Targets of Workplace BulliesIs a workplace bully targeting you? Do you know what to do to end the bullying? Workplace bullying is so widespread that a 2014 survey indicated that 27% of American workers have experienced bullying firsthand, that 21% have witnessed it, and that 72% are aware that bullying happens. Yet, there are few laws to protect workers from bullies, and bullying is not a crime in most jurisdictions. 101 Tips for Targets of Workplace Bullies is filled with the insights targets of bullying need to find a way to survive, and then to finally end the bullying. Also available at Apple's iTunes store! Just . Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenXEiRBfuFHUtjHrqUner@ChacpYPvvSVhUNIOeXHKoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Bullying:

A multi-function phoneDeniable Intimidation
Some people achieve or maintain power by intimidating others in deniable ways. Too often, when intimidators succeed, their success rests in part on our unwillingness to resist, or on our lack of skill. By understanding their tactics, and by preparing responses, we can deter intimidators.
You worthless piece of trash!Hurtful Clichés: I
Much of our day-to-day conversation consists of harmless clichés: "How goes it?" or "Nice to meet you." Some other clichés aren't harmless, but they're so common that we use them without thinking. Maybe it's time for some thought.
A thiefLooking the Other Way
Sometimes when we notice wrongdoing, and we aren't directly involved, we don't report it, and we don't intervene. We look the other way. Typically, we do this to avoid the risks of making a report. But looking the other way is also risky. What are the risks of looking the other way?
Gen. Robert E. Lee's traveling chess setSo You Want the Bullying to End: II
If you're the target of a workplace bully, ending the bullying can be an elusive goal. Here are some guidelines for tactics to bring it to a close.
Winston Churchill in the Canadian Parliament, December 30, 1941Strategy for Targets of Verbal Abuse
Many targets of verbal abuse at work believe that they have just two strategic options: find a new job, or accept the abuse. In some cases, they're correct. But not always.

See also Workplace Bullying and Conflict Management for more related articles.

Forthcoming issues of Point Lookout

Adolf Hitler greets Neville Chamberlain at the beginning of the Bad Godesberg meeting on 24 September 1938Coming October 20: On Ineffectual Leaders
When the leader of an important business unit is ineffectual, we need to make a change to protect the organization. Because termination can seem daunting, people often turn to one or more of a variety of other options. Those options have risks. Available here and by RSS on October 20.
Browsing books in a library. So many books, we must make choicesAnd on October 27: Five Guidelines for Choices
Each day we make dozens or hundreds of choices — maybe more. We make many of those choices outside our awareness. But we can make better choices if we can recognize choice patterns that often lead to trouble. Here are five guidelines for making choices. Available here and by RSS on October 27.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenXEiRBfuFHUtjHrqUner@ChacpYPvvSVhUNIOeXHKoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Power Affect: How We Express Our Personal Power

Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Bullet Points: Mastery or Madness?

DecisBullet Point Madnession makers in modern organizations commonly demand briefings in the form of bullet points or a series of series of bullet points. But this form of presentation has limited value for complex decisions. We need something more. We actually need to think. Briefers who combine the bullet-point format with a variety of persuasion techniques can mislead decision makers, guiding them into making poor decisions. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.