![The FBI wanted poster for Evgeniy Mikhailovich Bogachev, a Russian cyber criminal The FBI wanted poster for Evgeniy Mikhailovich Bogachev, a Russian cyber criminal](../images/bogachev-poster.png)
The FBI wanted poster for Evgeniy Mikhailovich Bogachev, a Russian cyber criminal alleged to have been associated with creating the Gameover ZeuS botnet, which used encrypted communications between its control servers and its nodes, making it much more difficult for law enforcement to shut down. It was temporarily terminated in June, 2014. According to the FBI, "Bogachev and his cybercriminal associates are responsible for the theft of over $100 million from U.S. financial institutions, Fortune 500 firms, universities, and government agencies."
Modern cyber attacks are always covert in nature. Consequently, officials rarely uncover them until after damage has reached significant scales. So it is with covert attacks in teams of knowledge workers. Team leaders and management would do well to elevate their attack detection skills.
Violent conflict is rare in teams of knowledge workers. Because most organizations have policies about violence, officials intervene effectively, and violent conflict quickly leads to disciplinary or legal action and possible termination. Toxic conflict, or nonviolent destructive conflict (NDC), is more common. More common it may be, but more manageable it is not. Because few organizations have effective policies for NDC, many team leaders must address it on their own.
The Karpman Drama Triangle [Karpman 1968] can be a useful model for understanding NDC in teams. Here are brief descriptions of the three roles of the Triangle, emphasizing deeds rather than intentions.
- Persecutor
- Persecutors attack their Victims, using tactics like blaming, controlling, isolating, shaming, lying, or whatever might inflict psychic pain that advances the Persecutor's agenda, if there is one.
- Victim
- Victims adopt stances of hopeless helplessness. They rarely try to defend themselves, or escape their Persecutors' attacks, or constructively address their situations. Instead, they plead (sometimes silently) to anyone who might possibly come to their rescue.
- Rescuer
- Rescuers intervene between Victims and Persecutors, but they do so ineffectively. They might interrupt the persecution, but they rarely end the Persecutor's ability to re-engage. Victims therefore become dependent on the Rescuers' continuing intervention.
Although early indications of NDCs are usually attacks by Persecutors on Victims, team leaders watching for attacks miss many of them. Here's a catalog of attack modes frequently overlooked.
- Isolation
- Isolating Victims by any means, including rumormongering or exclusion from meetings formal and informal, is difficult to detect, unless you're the Victim. Watch carefully. See "Social Isolation and Workplace Bullying," Point Lookout for August 21, 2013.
- Tweaking CCs
- Tweaking CCs are email messages containing damaging information, sent to Victims, and copied to supervisors or others in management. To enhance deniability, these messages usually appear businesslike, even though they contain aspersions. See "The Tweaking CC," Point Lookout for February 7, 2001.
- Plopping
- In plopping Team leaders watching for personal
attacks in toxic conflicts miss many
of them because they are covertincidents, the Persecutor is actually everyone in the meeting except the Victim. When the Victim makes a contribution, they all let it "plop." There is an awkward pause and then the discussion resumes as if the Victim were not even present. See "Plopping," Point Lookout for October 22, 2003. - Disinformation
- Disinformation is more than mere lies. Truly effective disinformation is easy or cheap to produce, difficult or expensive to disprove, and damaging to the Victim. Disinformation thus enables the Persecutor to saturate the Victim's defenses. See "How Workplace Bullies Use OODA: I," Point Lookout for April 13, 2011.
- Deprivation
- Depriving Victims of resources needed to fulfill their responsibilities is an attack that's difficult to bear. Assigning unfavorable offices or cubicles, restricting access to information, or providing outdated equipment are examples for individual Victims. Project Victims (yes, projects can be Victims) might be staffed with untrained or less capable personnel or they might be allocated inadequate budgets.
These tactics can escape anyone's notice. But when attacks of a less covert nature occur — shouting, foul language, direct insults, whatever — look more closely. A pattern of prior covert attacks calls for vigorous investigation. Top
Next Issue
Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!
Footnotes
Your comments are welcome
Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and
found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Conflict Management:
Virtual Conflict
- Conflict, both constructive and destructive, is part of teamwork. As virtual teams become more common,
we're seeing more virtual conflict — conflict that crosses site boundaries. Dealing with destructive
conflict is difficult enough face-to-face, but in virtual teams, it's especially tricky.
How to Avoid Responsibility
- Taking responsibility and a willingness to be held accountable are the hallmarks of either a rising
star in a high-performance organization, or a naïve fool in a low-performance organization. Either
way, you must know the more popular techniques for avoiding responsibility.
Unresponsive Suppliers: III
- When suppliers have a customer orientation, we can usually depend on them. But government suppliers
are a special case.
Overt Verbal Abuse at Work
- Verbal abuse in the workplace involves using written or spoken language to disparage, to disadvantage,
or to otherwise harm others. Perpetrators tend to favor tactics that they can subsequently deny having
used to harm anyone.
Tuckman's Model and Joint Leadership Teams
- Tuckman's model of the stages of group development, applied to Joint Leadership Teams, reveals characteristics
of these teams that signal performance levels less than we hope for. Knowing what to avoid when we designate
these teams is therefore useful.
See also Conflict Management and Emotions at Work for more related articles.
Forthcoming issues of Point Lookout
Coming July 3: Additive bias…or Not: II
- Additive bias is a cognitive bias that many believe contributes to bloat of commercial products. When we change products to make them more capable, additive bias might not play a role, because economic considerations sometimes favor additive approaches. Available here and by RSS on July 3.
And on July 10: On Delegating Accountability: I
- As the saying goes, "You can't delegate your own accountability." Despite wide knowledge of this aphorism, people try it from time to time, especially when overcome by the temptation of a high-risk decision. What can you delegate, and how can you do it? Available here and by RSS on July 10.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Follow Rick
![Send email or subscribe to one of my newsletters](../images/social-icons/email-32.png)
![Follow me at LinkedIn](../images/social-icons/linkedin-reg-32.png)
![Follow me at X, or share a post](../images/social-icons/x-32.png)
![Subscribe to RSS feeds](../images/social-icons/feed-icon-32.png)
![Subscribe to RSS feeds](../images/social-icons/facebook-icon-32.png)
Recommend this issue to a friend
Send an email message to a friend
rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed
![Technical Debt for Policymakers Blog](../images/logos/techdebtpolicy-logo-sm-1.png)