
A Bengal Tiger (Panthera tigris tigris). Nature has little use for deniable intimidation. In Nature, intimidation is straightforward.
Deniable intimidation is stealthy. The intimidator-aggressor uses intimidation to manipulate others, but wants to avoid being caught at it. To onlookers, deniable intimidation looks innocent, but to the intimidator's target it can be maddening and humiliating. Responding to deniable intimidation with conventional counter-intimidation is risky, because onlookers tend to see the target's defensive behavior as gratuitous aggression. That's one reason why intimidators seek deniability.
How then can targets respond? In what follows, I'll refer to the intimidator as the aggressor and the target as the defender.
- Centering helps
- Defenders who center themselves can think more clearly and maintain self-control more easily. Knowing right from wrong and convincing themselves that their own behavior is appropriate are strategies helpful to defenders.
- Be selective
- Defenders needn't respond to every assault. They might have to acknowledge that an assault has occurred: "I hear you." But they don't have to mix it up with the aggressor every time.
- Wait for it
- Withstanding deniable intimidation and abuse with aplomb can sometimes compel the aggressor to adopt less deniable tactics. Frustrated that their stealthy approaches aren't working, some aggressors forget that their preferred strategy was based on deniability. They become impatient, lose composure, and attack more directly. When that happens, targets have much more freedom to choose counter-aggressive responses.
- Remember the nonverbal options
- Targets usually consider only verbal responses, especially when aggressors choose email as the medium for attacks. While verbal responses are often useful, nonverbal responses can be even more effective. For example, in email, delaying a response can fluster the attacker and give the target more time to devise effective responses. In face-to-face meetings, a brief, confident smile might be more effective than a blatant counter-insult.
- Counter-intimidate the aggressor in private
- In private, straightforward counter-intimidation is relatively low risk, because there are no observers. But since the aggressor might cite anything the defender does or says as evidence of the defender's aggressiveness, defenders must be prepared to convincingly deny anything that might reflect unfavorably upon them. Since the aggressor might make fraudulent accusations, defenders must also convincingly deny falsehoods. Their manner must be equally convincing for both true and false accusations.
- Rattle the aggressor
- Rattled, Targets usually consider only verbal
responses, especially when aggressors
choose email as the medium for attacksthe aggressor is more likely to engage in blatant intimidation. Techniques that rattle aggressors include a charming, affable manner, deft use of humor, a calm demeanor, keeping one's cool, comfortable and obvious alliances with others, and superior performance. - Seize the initiative
- Letting the aggressor determine the tempo and content of the exchange cedes the advantage to the aggressor, who can choose favorable times and settings for deniable attacks. By seizing the initiative, defenders can choose times and settings favorable to them.
Seeking deniability is a strategy that is most appealing to aggressors who feel weak. Targets who can keep that in mind are more likely to recognize their own power. Top
Next Issue
Is every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info
Your comments are welcome
Would you like to see your comments posted here? rbrenogMhuqCxAnbfLvzbner@ChacigAthhhYwzZDgxshoCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and
found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Emotions at Work:
Never, Ever, Kill the Messenger
- If you're a manager in a project-oriented organization, you need to know the full, unvarnished Truth.
When you kill a messenger, you deliver a message of your own: Tell me the Truth at your peril. Killing
messengers has such predictable results that you have to question any report you receive — good
news or bad.
Intimidation Tactics: Touching
- Workplace touching can be friendly, or it can be dangerous and intimidating. When touching is used to
intimidate, it often works, because intimidators know how to select their targets. If you're targeted,
what can you do?
What Enough to Do Is Like
- Most of us have had way too much to do for so long that "too much to do" has become the new
normal. We've forgotten what "enough to do" feels like. Here are some reminders.
Be With the Real
- When the stream of unimportant events and concerns reaches a high enough tempo, we can become so transfixed
that we lose awareness of the real and the important. Here are some suggestions for being with the Real.
The Problem of Work Life Balance
- When we consider the problem of work life balance, we're at a disadvantage from the start. The term
itself is part of the problem.
See also Emotions at Work and Conflict Management for more related articles.
Forthcoming issues of Point Lookout
Coming December 13: Contrary Indicators of Psychological Safety: I
- To take the risks that learning and practicing new ways require, we all need a sense that trial-and-error approaches are safe. Organizations seeking to improve processes would do well to begin by assessing their level of psychological safety. Available here and by RSS on December 13.
And on December 20: Contrary Indicators of Psychological Safety: II
- When we begin using new tools or processes, we make mistakes. Practice is the cure, but practice can be scary if the grace period for early mistakes is too short. For teams adopting new methods, psychological safety is a fundamental component of success. Available here and by RSS on December 20.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenogMhuqCxAnbfLvzbner@ChacigAthhhYwzZDgxshoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Follow Rick





Recommend this issue to a friend
Send an email message to a friend
rbrenogMhuqCxAnbfLvzbner@ChacigAthhhYwzZDgxshoCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed
