![U.S. President Barack Obama and Arizona Governor Jan Brewer conferring in the Oval Office in 2010 U.S. President Barack Obama and Arizona Governor Jan Brewer conferring in the Oval Office in 2010](../images/obama-brewer.png)
U.S. President Barack Obama and Arizona Governor Jan Brewer conferring in the Oval Office in 2010. A more famous photograph of these two executives "conferring" depicts an exchange that occurred on the Phoenix-Mesa Gateway Airport tarmac in January 2012. In that photograph, taken by Haraz N. Ghanbari of the Associated Press, Gov. Brewer appears to be buttonholing the President, pointing her index finger at him in a most assertive manner. Because the interaction occurred in full public view, the Governor's actions were widely regarded as disrespectful, even hostile. So prevalent was that view, that the Governor had to deny any intention of hostility (see, for example, "Arizona Gov. Brewer Says She 'Was Not Hostile' in Meeting With Obama," a story available at the National Public Radio Web site).
I know of no direct evidence of the Governor's intentions in this incident. However, her behavior is consistent with what I call "ambushing" in this essay. The President's response — cool, measured attention — provides an outstanding example of the effective management of ambushes. Official White House Photo by Pete Souza.
In Part I of this exploration, we examined three tactics for causing other people to lose control. Skill in recognizing these tactics in the moment is helpful to anyone intent on remaining calm and resisting the urge to attack or to respond to insults in kind. But there are two other consequences of this kind of awareness. First, bystanders who recognize the tactics of manipulation are well equipped to intervene to halt the fracas before it expands. Second, and even more important, a general awareness of widespread ability to recognize these toxic behaviors is a deterrent to anyone considering employing them.
With these advantages in mind, consider four more examples.
- Interrupting
- Although interrupting others is widely regarded as rude, the effects of being interrupted vary from person to person. Interruptions can be so upsetting that graceless retaliation is difficult to avoid. And repeated, staccato interruption — badgering — can lead to angry outbursts by the person interrupted.
- Startling
- When startled, we're more likely to respond gracelessly. To exploit this, an attacker might approach a target stealthily from behind, and suddenly, and apparently affectionately, throw an arm around the target's shoulders. Or the attacker might enter the target's office unannounced at particularly inopportune moments. These methods use invasions of the target's personal space to induce fear responses. Personal space invasions are especially effective if the attacker has physically assaulted or threatened the target — or anyone known to the target — in the past.
- Mock taunting or needling
- To taunt is to provoke or ridicule with hurtful remarks. A mock taunt is a taunt delivered as if in jest, possibly with a wink or smile. Sometimes we call this behavior "needling." Attackers using this tactic expect their targets to be offended because the targets disregard the humorous wrapper. They expect bystanders to be duped by that wrapper. To bystanders, targets who respond gracelessly to the taunt then seem to be thin-skinned. The attacker can then deny intentionally inflicting pain, saying, "I didn't mean anything by it," or, "Can't you take a joke?" or "I didn't realize you were so touchy."
- Ambushing
- Ambush, especially in Ambush, especially in public,
depletes the target's ability
to maintain composurepublic, depletes the target's ability to maintain composure by surprising the target in some way that threatens his or her ability to perform. For example, if the target is presenting to a small group virtually, and each remote site was to have received accompanying materials to be distributed in hardcopy, the attacker might deliver to some sites draft versions instead of the final versions, which might appear to be an honest mistake. The confusion can rattle the target, who then might not deal well with the attacker's probing or potentially embarrassing questions during the presentation.
Make a collection of the tactics you personally witness. They're most likely to come your way eventually. Next in this series Top
Next Issue
Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!
Your comments are welcome
Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and
found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Conflict Management:
Covert Bullying
- The workplace bully is a tragically familiar figure to many. Bullying is costly to organizations, and
painful to everyone within them — especially targets. But the situation is worse than many realize,
because much bullying is covert. Here are some of the methods of covert bullies.
Overtalking: III
- Overtalking other people is a practice that can be costly to organizations, even though it might confer
short-term benefits on the people who engage in it. If you find that you are one who overtalks others,
what can you do about it?
Toxic Conflict at Work
- Preventing toxic conflict is a whole lot better than trying to untangle it once it starts. But to prevent
toxic conflict, we must understand some basics of conflict, and why untangling toxic conflict can be
so difficult.
Creating Toxic Conflict: I
- Many managers seem to operate as if their primary goal is to create toxic conflict among their subordinates.
Here's a collection of methods for sowing toxic conflict that can help bad managers become worse managers.
Contextual Causes of Conflict: II
- Too often we assume that the causes of destructive conflict lie in the behavior or personalities of
the people directly participating in the conflict. Here's Part II of an exploration of causes that lie
elsewhere.
See also Conflict Management and Workplace Politics for more related articles.
Forthcoming issues of Point Lookout
Coming July 3: Additive bias…or Not: II
- Additive bias is a cognitive bias that many believe contributes to bloat of commercial products. When we change products to make them more capable, additive bias might not play a role, because economic considerations sometimes favor additive approaches. Available here and by RSS on July 3.
And on July 10: On Delegating Accountability: I
- As the saying goes, "You can't delegate your own accountability." Despite wide knowledge of this aphorism, people try it from time to time, especially when overcome by the temptation of a high-risk decision. What can you delegate, and how can you do it? Available here and by RSS on July 10.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Follow Rick
![Send email or subscribe to one of my newsletters](../images/social-icons/email-32.png)
![Follow me at LinkedIn](../images/social-icons/linkedin-reg-32.png)
![Follow me at X, or share a post](../images/social-icons/x-32.png)
![Subscribe to RSS feeds](../images/social-icons/feed-icon-32.png)
![Subscribe to RSS feeds](../images/social-icons/facebook-icon-32.png)
Recommend this issue to a friend
Send an email message to a friend
rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed
![Technical Debt for Policymakers Blog](../images/logos/techdebtpolicy-logo-sm-1.png)