Jade had rehearsed this conversation six times in her head on the walk home. She knew exactly what she wanted to say to Leo: that she felt dismissed when he talked over her in front of his friends, that she left those hangouts feeling invisible...
Learning Objectives
- Identify and name six categories of conversational attacks
- Respond to personal attacks without defending, retaliating, or abandoning the conversation
- Use the parking lot technique to handle deflections without losing the primary thread
- Recognize DARVO and gaslighting patterns without being caught in them
- Decide when to name manipulation tactics explicitly
In This Chapter
Chapter 23: Handling Attacks, Deflections, and Diversions
Jade had rehearsed this conversation six times in her head on the walk home. She knew exactly what she wanted to say to Leo: that she felt dismissed when he talked over her in front of his friends, that she left those hangouts feeling invisible, that she needed him to understand how much that hurt. She had even practiced the opening line: "I want to talk about something that's been bothering me, and I need you to just hear me out."
Leo looked up from his phone when she came in. "Hey."
"Hey. So — I wanted to talk about the thing that happened at Carlos's on Saturday. When you kind of kept interrupting me every time I said something."
Leo set his phone down. She felt a small flutter of hope. He was listening.
"I mean," he said, "you're not exactly supportive of me either."
The flutter died.
"What? I'm not saying anything about —"
"No, seriously. You never come to my soccer games anymore. You got annoyed at me in front of your mom last Thanksgiving. You're always on your phone when we're together. So if we're talking about not feeling supported..." He spread his hands in a gesture of implication.
Ten minutes later, Jade was defending herself against a list of her own supposed failures — failures she had never agreed were failures, arguments she had never come prepared to make. She had arrived with a clear complaint, and now she was apologizing for things she wasn't even sure she'd done. The thing she came to talk about — feeling dismissed on Saturday — had evaporated.
This is the deflection trap.
It is one of the most common and most effective ways that a difficult conversation gets derailed, and it works because it exploits our deepest social instincts. When we are accused of something — even during a conversation we started to raise our own concerns — we feel a powerful pull to defend ourselves. That pull is not a character flaw. It is biology. The threat-response system that Chapter 4 described does not distinguish between physical danger and social danger. A challenge to your reputation, your fairness, your goodness as a partner — your brain processes that challenge with the same urgency it would process a physical threat. The cortisol floods. The thinking narrows. And in that narrowed-thinking state, defending yourself feels not just natural but morally necessary. Of course you defend yourself. What kind of person wouldn't?
The kind of person who keeps the original conversation on track.
This chapter is about traps. Specifically, it is about the full range of moves that can pull a difficult conversation off course — from the relatively innocent (topic drift, accidental digression) to the deliberately calculated (DARVO, gaslighting, tactical guilt trips) — and about what to do when you find yourself inside one.
Chapter 19 asked you to anticipate resistance before the conversation begins. This chapter addresses what to do when resistance arrives as attack. Chapter 4 showed why personal attacks trigger the strongest threat response of all the conversational stressors. Chapter 9's safety-restoration tools are your first line of defense when an attack lands. This chapter builds on all of that with specific techniques for specific attack types, drawn from communication research, clinical observation, and the hard-won wisdom of practitioners who have spent careers navigating high-stakes conflict.
Before we build the toolkit, we need to understand the terrain.
23.1 The Taxonomy of Conversational Attacks
Not all attacks are the same. A person who says "you always do this" is doing something different from a person who says "that's your problem, not mine," which is different still from a person who falls silent and refuses to speak. Understanding which kind of attack you are facing is the first step toward responding effectively. The response that works beautifully for a deflection may be useless against stonewalling. The technique that handles topic hijacking will not address gaslighting. Taxonomy matters.
There are six primary categories of conversational attacks, ranging from the reactive and semi-unconscious to the deliberate and strategic.
Personal Attacks
Personal attacks target the person making the complaint rather than the complaint itself. They shift focus from what was done to who is doing the complaining — questioning the speaker's intelligence, competence, character, motives, credibility, or identity. They can be blunt ("You're being ridiculous") or surgical ("I just think it's interesting that you always seem to find a problem when things are going well for me"). They can be delivered with heat or with eerie calm. What they share is a redirection: instead of addressing the issue raised, they make the issue the person raising it.
Personal attacks are particularly effective because they trigger what Chapter 4 identified as the full threat-response cascade. When your character, competence, or identity is challenged, your brain treats that as an existential threat. The amygdala fires; cortisol floods; your capacity for nuanced language and patient listening contracts sharply. Research by Eisenberger and colleagues (2003) has shown that social pain — the pain of rejection, criticism, or exclusion — activates the same neural regions as physical pain. The brain does not have a separate pain system for social wounds. The attacker, whether consciously or not, has just made you significantly less capable of having the conversation they are ostensibly participating in.
Personal attacks take several characteristic forms worth naming individually:
Character attacks question who you fundamentally are: "You're selfish." "You've always been like this." "You're just not a reliable person."
Competence attacks question your ability to perform or judge: "You clearly don't understand how this works." "You're not qualified to evaluate this." "You've never been good at reading situations."
Motive attacks question why you're raising the concern at all: "This is really about control." "You're doing this because you're jealous." "You're trying to make me look bad."
Identity attacks challenge aspects of the speaker's sense of self: "You're not really committed to this relationship." "I thought you were a professional." "A real friend wouldn't do this."
Each type of personal attack requires a slight variation in response, though the core structure is the same. We will address these variations in section 23.2.
Deflections
Deflections redirect attention from the current complaint to something else — usually something involving the speaker's own behavior. "You're one to talk." "What about when you did X?" The classic form is the counter-complaint: meet a concern with a concern, force the other person to respond to yours, and watch the original issue dissolve in the scramble.
Deflections exploit the social norm of fairness. If you have complaints about me, fairness seems to require that I get to raise my complaints about you. But fairness does not require that we deal with all complaints simultaneously in a single conversation, and deflection weaponizes the impulse toward symmetry to kill the current topic.
The counter-complaint deflection is only the most common form. Deflections also include:
The false equivalence: "You interrupted me in our last conversation too." Even if accurate, this transforms "I want to address this specific behavior" into "who is more guilty."
The timing attack: "You're bringing this up right now?" — which deflects to the question of whether the timing is appropriate, rather than whether the concern is legitimate.
The comparison deflection: "No one else in this relationship/office/family has a problem with this." — which deflects to social consensus rather than addressing the specific complaint.
Whataboutism
Whataboutism is a specific and particularly frustrating form of deflection. Rather than raising a complaint about your behavior, whataboutism redirects to a different issue entirely — often a third-party issue, a past event, or a larger systemic concern — to argue that the current complaint is illegitimate or hypocritical. "What about the way you handled that thing last spring?" "What about the fact that everyone in this office does the same thing?" "What about how much worse it is at other companies?"
Whataboutism originated as a Soviet diplomatic strategy (responding to accusations of human rights violations by pointing to racial injustice in the United States) and has since migrated thoroughly into personal conflict. Its function is to make any specific complaint seem petty or selective by placing it next to something larger. If you engage with the "what about," you have implicitly accepted that the original issue needed to pass some threshold of relative seriousness before it deserved attention — a threshold your counterpart is now in charge of raising whenever you get close.
The implicit logic of whataboutism is: "Your concern is not important enough to merit attention given everything else that exists." Once you accept that frame, you have accepted that you must prove your concern's relative importance before you can raise it — which is an impossible and unfair standard.
Topic Hijacking
Topic hijacking pulls the conversation off its intended course, either deliberately or accidentally. The deliberate version is strategic: introduce a new thread whenever the current one becomes uncomfortable, and keep the other person chasing. The accidental version is simply what happens when one association leads to another and suddenly you are talking about something from four years ago.
Topic hijacking is harder to recognize than direct attacks because it often looks like participation. The person is talking. They are engaged. They are even, sometimes, saying interesting things. The problem is that they are talking about something different from what you came to address.
Deliberate topic hijacking has a characteristic pattern: the new topic is introduced at the moment when the current conversation is getting close to something the hijacker does not want to address. The timing is not random. Just as Priya is about to get a substantive answer about the patient reassignment, a new and urgent concern about her team's metrics appears. Just as Jade is getting close to articulating how dismissed she felt, Leo launches into a detailed inventory of her supposed failures. The new topic arrives, with impeccable timing, precisely when the original one needed one more step to arrive somewhere.
Guilt Trips
Guilt trips leverage the speaker's feelings — pain, disappointment, sacrifice, suffering — to shift the emotional weight of the conversation onto the other person's conscience. "After everything I've done for you." "I just don't think you understand how much this has cost me." "Fine, I guess my feelings don't matter." "I've given so much to this relationship and this is what I get."
What makes guilt trips particularly effective is that they are not entirely dishonest. The feelings being expressed may be real. The history being invoked may be accurate. The emotional weight being applied is not necessarily manufactured. But its function in the conversation is to make you feel so responsible for the other person's pain that you abandon your own position to relieve it.
Guilt trips work through the mechanism of emotional debt: the person deploying the guilt trip is claiming that you owe them something — relief from pain, gratitude for sacrifice, deference to their distress — and that pressing your current concern is a failure to pay that debt. Once you accept the debt frame, continuing the conversation feels selfish. Stopping it feels like the moral thing to do.
Stonewalling
Stonewalling is the passive attack: refusal to engage. Silence. Monosyllables. The thousand-yard stare. The implication of the conversation being beneath response. John Gottman's research identified stonewalling as one of the four predictors of relationship failure (the "Four Horsemen"), precisely because it is so effective at ending conversations without resolving anything.
Stonewalling communicates contempt without using words, making it difficult to confront directly. It also forces the other party into an impossible position: they must either escalate (which validates the stonewaller's implicit claim that the conversation is aggressive or unreasonable) or retreat (which rewards the stonewalling and teaches that it works). The stonewaller maintains plausible deniability — "I didn't say anything wrong" — while the conversation dies.
Stonewalling can be chronic (a pattern of withdrawal in conflict) or situational (a response to feeling flooded, overwhelmed, or cornered). The response differs: chronic stonewalling requires naming the pattern and establishing consequences; situational stonewalling often responds to a check-in and a pause.
The Attack Taxonomy Table
| Attack Type | Example | Effect on Conversation | Response Strategy |
|---|---|---|---|
| Personal Attack | "You're always so sensitive" / "You clearly don't understand how this works" | Triggers threat response; forces self-defense instead of issue | Name without retaliating; separate person from behavior; return to topic |
| Deflection | "What about when YOU did X?" / "You're one to talk" | Reverses roles; initiator becomes defendant | Acknowledge without accepting; use parking lot; restate original topic |
| Whataboutism | "What about how your whole team handles this?" / "Everyone does this" | Makes specific complaint seem petty or selective | Reject comparative framing; clarify scope; stay particular |
| Topic Hijacking | Raising new issues whenever conversation nears resolution | Conversation never lands anywhere; original issue buried | Name the drift; use parking lot; "broken record" return |
| Guilt Trip | "After everything I've done" / "I guess my feelings don't matter" | Transfers emotional burden; makes abandonment of position feel like relief | Name the dynamic; distinguish real feelings from leverage; hold ground with care |
| Stonewalling | Silence, monosyllables, contemptuous shrug | Conversation dies; initiator must escalate or abandon | Name it; check in on state; offer pause; do not chase |
23.2 Personal Attacks: Responding Without Retaliating
Here is the fundamental problem with personal attacks: every instinct you have will tell you to defend yourself. And if you defend yourself, you have just accepted the attacker's frame. You are no longer discussing what you came to discuss. You are discussing you — your competence, your character, your motives, your history. The original issue has been vacated, and the attacker is now on their own ground.
The non-defensive response is the alternative. It requires three things simultaneously: you must not deny the attack, not match it, and not abandon the conversation. This is harder than it sounds because the threat response that personal attacks trigger is not a cognitive choice — it is a physiological event that happens faster than conscious thought. The first wave of cortisol hits before you have decided how to respond. Your jaw may have already tightened, your voice may have already shifted register. The non-defensive response must be executed from inside this state, which is precisely why it must be practiced before you need it.
The Non-Defensive Response: Core Structure
The non-defensive response has a recognizable three-step structure:
Step 1: Acknowledge. Signal that you heard something was said. You do not accept it as true. You do not dispute it. You acknowledge its existence. This prevents the conversation from becoming a contest about whether the attack happened, which is another trap.
Step 2: Do not defend. This is the pivotal step. Defending yourself confirms that the personal attack has the power to redirect the conversation. Every moment you spend explaining why you are not what they just said you are is a moment not spent on the original concern. And because the accusations in personal attacks are often broad — you're always selfish, you're never reliable — they are nearly impossible to disprove in the middle of an activated conversation. The defense generates more material for the attack.
Step 3: Return to the original topic. Name explicitly what you came to address and redirect the conversation back to it. Not aggressively. Not with a speech about how unfair the attack was. Clearly and consistently: here is what I want to address.
"I hear that you have concerns about how I've been. I want to address those concerns. Right now I want to come back to what I raised about Saturday."
This structure does several things at once. It prevents you from appearing to ignore the attack (which often escalates things). It declines to defend yourself (which would validate the attack's power to redirect). It signals that you heard the person while refusing to be redirected. And it returns, gently but explicitly, to the topic you came to address.
The Threat Response and the Window of Choice
The neuroscience of the threat response gives us a useful practical insight. The initial amygdala firing — the first wave of defensive urgency — typically peaks within two to four seconds of the triggering stimulus. After that initial peak, if you do not immediately escalate, there is a brief window in which the prefrontal cortex can reassert some influence over the response.
This is why the pause before responding to a personal attack is not merely a stylistic choice — it is neurologically functional. A breath. A beat of silence. Even a deliberate slowing of your speech rate. These actions interrupt the automatic escalation pathway and create the conditions for a more deliberate response.
Jade, in the opening scenario, felt the flutter of hope die when Leo deflected. In that moment, her threat response activated. The feeling of being attacked, of suddenly becoming the defendant in a trial she had not signed up for, hit with physical force. What she needed in that moment — and what this chapter is teaching — is to recognize that activation, take the beat, and respond from deliberate choice rather than from reactive urgency.
Separating the Person from the Behavior
When the personal attack feels genuinely aggressive — when it seems designed to wound rather than to deflect — a second technique becomes useful: naming the attack itself as a behavioral event without attributing motive.
"That felt like a personal attack. Is that what you intended?"
This is a remarkably effective line for several reasons. First, it puts the attacker in the position of having to either confirm that they intended to attack you (which most people will not do explicitly) or deny it (which functionally commits them to pulling back). Second, it names what is happening without accusation: "that felt like" is your experience, not a verdict about them. Third, it creates a brief pause — and pauses are where conversations can reset.
The question at the end matters enormously. It transforms the statement from an accusation ("you attacked me") into a genuine inquiry ("did I read this correctly?"). The genuine inquiry invites reflection. The accusation invites defense.
If someone says "Yes, I'm attacking you because you've been acting unfairly," you have very different information than if they say "No, I didn't mean it that way." Both responses are useful. The first tells you something about the state of the relationship and the depth of the other person's frustration. The second creates space to continue.
Responding to Specific Attack Subtypes
Different personal attack subtypes call for slight variations in the non-defensive response structure.
Responding to character attacks: Character attacks ("you're always selfish") require the greatest discipline, because they touch the core of self-concept. The non-defensive response here is particularly important: any defense of your character in the middle of a difficult conversation sounds like a campaign speech — self-serving and unconvincing. Instead: "I hear that you see me that way. I'm not going to argue about my character right now. What I want to address is [original topic]."
Responding to competence attacks: Competence attacks ("you clearly don't understand this") are particularly insidious in professional contexts, because they carry the implicit claim that you don't have standing to raise the concern. The response is to separate standing from understanding: "Whether or not I fully understand all the details, what I'm observing is [specific behavior], and that's what I want to address."
Responding to motive attacks: Motive attacks ("you're doing this because of [bad reason]") can sometimes be addressed with genuine curiosity: "What makes you think that? I'm asking sincerely." This is only effective if you are actually willing to hear the answer without defending yourself — which is a high bar. If you're not in that space, the simpler non-defensive return is: "I understand you see it that way. What I'm trying to address is [original topic]."
Responding to identity attacks: Identity attacks — attacks on who you are as a professional, partner, friend, or human being — are the most threatening because they are the most total. They are also often the most untrue in a helpful way: identities are complex and the attacker's one-dimensional characterization is almost certainly incomplete. But that complexity cannot be argued in the moment. The non-defensive response: "I hear that you feel that way about me. I'm not going to let this conversation become about who I am as a person. I want to focus on [original topic]."
The Broken Record for Staying on Topic
When you have returned to the original topic multiple times and keep being pulled away, the broken record technique is your tool: state your key point, quietly and consistently, every time the conversation tries to leave it.
Jade's broken record, in the conversation at the opening of this chapter, would be: "What I'm trying to address is feeling dismissed on Saturday. I want to keep talking about that."
She would say this, or a close variation, every time Leo introduced a new redirect. Not with aggression. Not with raised volume. With the same calm consistency of tone that a broken record — an old-fashioned vinyl record with a scratch — plays the same phrase over and over regardless of what else is happening in the room.
The broken record is not stubbornness. It is commitment to staying in the conversation you came to have rather than the conversation your counterpart is trying to have instead. The variation in phrasing matters: saying exactly the same words repeatedly can feel robotic and contemptuous. Varying the expression while keeping the substance identical communicates both consistency and genuine engagement: "I know we've gotten into some other things, but what I came to address — feeling dismissed on Saturday — I still haven't been able to say what I needed to say about that."
Non-Defensive Response Templates
These templates are not scripts to be memorized and deployed robotically. They are structures — starting frameworks that you adapt to your situation, relationship, and voice.
When the attack questions your character: "I'm hearing some frustration with me, and I want to address that. Can we finish talking about [original topic] first, and then I'm genuinely willing to hear what's been bothering you?"
When the attack questions your competence or judgment: "I may have gotten things wrong in the past. What I'm asking us to focus on right now is [original topic]. Can we do that?"
When the attack feels like it was designed to wound: "That landed as a personal attack. I don't want this conversation to go there. Can we come back to [original topic]?"
When you're not sure if it was an attack or a genuine concern: "That may be worth talking about — I'm not dismissing it. Right now I'm focused on [original topic]. I promise we can come back to the other thing."
When you are genuinely hurt by what was said: "What you said hurt, and I'm going to need a minute with that. And I also still want to address [original topic]. I don't want that to get lost."
When the attack is delivered quietly and without heat (which can be the most destabilizing form): "I notice what you just said. I'm choosing not to engage with it right now. What I want to focus on is [original topic]."
Notice that all of these templates do the same three things: acknowledge, not defend, and return. The words change. The structure does not.
23.3 Deflection and Whataboutism
Deflections and whataboutism both use the same mechanism: they put something else in front of you to deal with, so that you cannot deal with what you came to address. The difference is what that something else is. Deflection typically introduces your own behavior as the counter-issue. Whataboutism introduces broader context to reframe your complaint as illegitimate.
Why Deflection Is So Hard to Resist
Before we address techniques, we need to understand why deflection works as well as it does. The counter-complaint deflection — "you're one to talk" — activates not just your threat response (you're being accused of something) but your fairness instinct (if we're evaluating behavior, mine is getting evaluated too). Fairness is a deep human value. It feels genuinely unfair to say "I get to raise concerns about you, but you don't get to raise concerns about me." That feeling of unfairness is real, and it makes the deflection feel legitimate even when its function is to destroy the current conversation.
The key insight: fairness does not require simultaneity. Both concerns can be legitimate. Both concerns can deserve attention. They do not need to be addressed in the same conversation, in the same five minutes, with neither person able to complete a thought before the other interrupts with a counter-complaint. Sequencing is not injustice.
Acknowledging Without Accepting the Redirect
The key to handling both deflection and whataboutism is a move that combines genuine acknowledgment with firm refusal to be redirected. You must signal that you have heard the other concern — and that you take it seriously enough to give it its own time — while refusing to let it displace the current conversation.
"That's worth a conversation. I want to give it the attention it deserves. Right now, I need us to stay with what I raised."
"I hear that [deflected issue] is a concern for you. I'd like to address that separately. Can we handle one thing at a time?"
"I'm not going to pretend that didn't matter. Let's talk about it after we finish this."
Notice what these responses do not say: they do not say "that's not relevant" or "stop changing the subject" or "we're not talking about that." Those formulations invite argument about whether the deflected topic is relevant, which is another trap. Instead, the responses above accept the relevance of the deflected topic while insisting on sequence. "Yes, and — after this."
The sequence framing is powerful because it is genuinely fair. You are not saying the other concern doesn't matter. You are saying: this concern gets to exist, and it gets its own conversation, and we will have that conversation, and right now we are finishing this one.
The Parking Lot Technique
The parking lot is a practical tool borrowed from facilitation and mediation that transforms deflection from a derailing move into a manageable interruption. Here is how it works in full detail:
Step 1: Acknowledge the deflected topic. Signal that you have heard it and that it has value. "I hear that. That matters." Do not qualify, minimize, or express doubt about the concern. Genuine acknowledgment is part of the good faith this technique requires.
Step 2: Write it down (or say explicitly that you are noting it). "I want to park that so we can come back to it." The act of writing, or the explicit verbal note, makes the parking real. It signals that you are not dismissing the topic; you are deferring it. If you have something to write on, do so visibly — the visibility matters. It is not a disappearing act. It is a deferral.
Step 3: Return to the original topic. "Right now, I need us to stay with [original topic]."
Step 4: Return to the parked item at the appropriate time. When the original conversation has reached a stopping point, revisit the parked item explicitly. "We noted [the deflected topic] earlier. Do you want to address that now?" This follow-through is essential. The parking lot only works as a good-faith tool if both parties believe the parked item will actually be returned to. If the parking lot becomes a mechanism for indefinitely deferring the other party's concerns, it stops being a tool and starts being a manipulation.
The parking lot has several powerful properties. It removes the deflected topic from the middle of the conversation without discarding it. It demonstrates good faith — you are not dismissing the other concern, you are deferring it. It makes explicit that the conversation has an agenda and a sequence, which makes random topic drift harder to sustain. And it gives both parties a record of what was set aside, reducing the chance that either person feels their concerns were swept under the rug.
For Jade, the parking lot response to Leo's opening deflection would be: "I hear that you feel like I haven't been supportive enough, and I want to talk about that. I'm going to hold onto that — can we come back to it after I say what I came to say?" If she had a notebook, she could write "Leo's concerns about my support" and set it visibly on the table between them.
What to Do When the Parking Lot is Refused
The parking lot has a limit: it requires the other party's implicit cooperation. If someone refuses to let an issue be parked — "no, I want to talk about this now" — the choice becomes explicit: whose conversation takes priority? There is no technique that resolves this without negotiation.
In practice, when the parking lot is refused, the next move is negotiation about sequence: "I hear that this is urgent for you. Can you give me ten minutes to finish what I was saying, and then we'll spend time on your concern?" If the other party agrees to this, you have a sequence — and a commitment from them to then actually hear what you came to say. If they refuse even this, you have important information: the conversation you came to have may not be possible right now, and the choice is between letting the other party's concern be the conversation (and raising your original concern later) or naming the impasse directly and negotiating further.
Handling Whataboutism Specifically
Whataboutism deserves one additional technique beyond the parking lot: the scope clarification. When someone introduces a "what about X" that implies your complaint is petty because X exists, name the scope of what you are actually addressing.
"I'm talking about one specific thing — what happened on Saturday. I'm not making a broader claim about our whole relationship or about how everything is between us. Can we stay particular?"
This resists the whataboutism trap precisely: whataboutism expands scope to relativize your specific complaint. Scope clarification shrinks it back down to the particular, which is where specific complaints belong and where they can actually be resolved.
The scope clarification has a companion: the refusal of comparative framing. When whataboutism implies "your concern is less important than [other thing]," resist the invitation to rank concerns: "I'm not asking whether this is the most important thing in the world. I'm asking us to address this specific situation." You do not need to establish that your concern outranks everything else before it deserves attention.
23.4 Topic Hijacking and Digression
Topic hijacking is different from deflection in one important way: it does not always have a combative intent. Sometimes a conversation wanders because one party is genuinely associating — one thought leads to another, which connects to something from last year, which connects to a feeling that has been building for months — and suddenly you are having a completely different conversation from the one you started. Both of you arrived at this new conversation genuinely, following the natural trail of connection. Neither of you planned to be here. But here you are, five miles from where you started, with no map back.
The techniques for handling deliberate and accidental topic hijacking are similar, but the tone differs. With deliberate hijacking, you may need to be more explicit. With accidental drift, a gentle course correction usually suffices.
Naming the Drift
The first tool is simply naming it — observing out loud that the conversation has moved without accusing anyone of moving it.
"I want to notice that we've gotten pretty far from what I was trying to address. Can we find our way back?"
"I feel like we've been talking about [current topic] for a while. I don't want to lose track of [original topic]. Can we go back?"
These naming moves work because they describe a situation rather than accuse a person. "We've gotten far" is not "you keep changing the subject." It creates a shared observation that both parties can then respond to, rather than an accusation that one party will need to deny.
The naming move is also an act of self-awareness: you are demonstrating that you know where the conversation started and where it is now. This can itself be reassuring to the other party — it signals that you are tracking the conversation, that you will not lose the thread of their concerns either, and that you are proposing a return to order rather than an accusation of derailment.
The Broken Record and the Anchor Statement
In cases of repeated topic drift — whether deliberate or not — the broken record has a companion technique: the anchor statement. Before each major re-return to the original topic, briefly re-anchor both parties in what the conversation is actually about.
"The thing I started to say — and keep trying to get back to — is that I feel dismissed when you talk over me. That's what I'm here to address."
The anchor statement serves the function of a GPS recalculation. The route has been disrupted by detours. The anchor brings everyone back to where you are trying to go, without requiring that anyone account for how the detour happened.
The anchor statement is distinct from the broken record in that it is more explicit about the full original context, not just the key phrase. The broken record is a repeated return; the anchor statement is a periodic full re-orientation. Use the broken record for minor drifts; use the anchor statement when significant conversation has accumulated between the current moment and the original topic.
The Deliberate Hijack: Naming It More Explicitly
When you suspect that topic hijacking is deliberate — when new threads appear with suspicious regularity at the precise moments when the original topic is approaching resolution — more explicit naming becomes appropriate.
"I've noticed that every time we get close to [original topic], something new comes up. I want to address [original topic] before we add anything else. Can we do that?"
This is a more direct observation, and it carries more relational friction than the simple naming move. Use it when the gentle version has failed to hold the thread.
When to Let the Digression Go
Not every digression deserves reclaiming. Some conversations wander because the original topic was a gateway to a more important one. Some digressions reveal that what you thought you wanted to address is not actually the root issue. Skilled conversationalists develop a sense for when following a digression is more productive than pulling back from it.
The signal that a digression deserves following: the new topic is clearly more emotionally salient to at least one party, and addressing the original topic without first clearing this one would feel hollow or incomplete. The signal that you should reclaim the original: the new topic is clearly a distraction or avoidance, and the original issue will remain unaddressed if you follow the thread.
This judgment is imprecise, and you will sometimes be wrong. If you follow a digression that turns out to be avoidance, you have lost the original conversation but can try to return to it. If you reclaim a thread that was actually a more important issue, you may win the original battle while losing the more significant war. The willingness to occasionally let a digression lead is not weakness; it is sophistication.
23.5 When the Attack Is Calculated: Manipulation Tactics
Everything in sections 23.1 through 23.4 assumes that the attacks and diversions you face are, at most, semi-conscious — responses driven by defensiveness, fear, or conflict avoidance rather than deliberate strategy. For most of the difficult conversations in your life, this is accurate. People who deflect, topic-hijack, or launch personal attacks in the middle of hard conversations are usually not strategists. They are scared people doing the best they can with the emotional resources they have in the moment.
But not always.
Some attacks are calculated. Some conversational patterns are deliberately designed to control the outcome of a conversation by destabilizing the other person. These warrant separate attention — not because they are common, but because failing to recognize them leaves you completely vulnerable to them.
DARVO: Deny, Attack, Reverse Victim and Offender
DARVO is a pattern first named and described by psychologist Jennifer Freyd in her research on responses to abuse allegations, and it has since been recognized across a wide range of conflict contexts. The acronym stands for: Deny, Attack, Reverse Victim and Offender.
Deny: The person accused of wrongdoing flatly denies that it happened, often with a certainty and forcefulness that makes the accuser doubt their own perception. "That never happened." "I never said that." "You're making things up."
Attack: Having denied, the person launches an attack on the accuser's credibility, motives, character, or mental state. "You have a history of misremembering things." "You're always looking for something to be upset about." "Everyone else I know thinks you're being unreasonable."
Reverse Victim and Offender: The final and most destabilizing move: the accused positions themselves as the real victim of the situation. The person who raised a concern is now the aggressor. The person who did the thing being complained about is now suffering at the hands of the complainer's unfair accusation. "I can't believe you would say something like this about me." "Do you have any idea how damaging these accusations are?" "I'm the one who's been hurt here."
What makes DARVO so effective is the sequence. Each step builds on the last. The denial creates uncertainty. The attack undermines the accuser's confidence in their own perception. The reversal exploits the resulting confusion — the accuser, now doubting themselves and feeling responsible for the other person's pain, often abandons the original complaint entirely.
Freyd's research found that DARVO can operate at both the individual and institutional level. When an organization denies a complaint, attacks the complainer's credibility through formal channels, and then claims institutional harm from the unfair accusation, it is enacting the same pattern at scale. Case Study 23-02 examines this research in full.
How to recognize DARVO in real time:
The signature is the rapid reversal: you came in with a concern, and within a few exchanges you have somehow become the problem. The conversation has gone from "I want to address something you did" to "you are cruel for suggesting this." If you find yourself wondering how you became the one who needs to apologize, check whether you may be experiencing DARVO.
The DARVO Recognition Checklist:
- Did the conversation begin with you raising a specific concern or complaint?
- Did the other person respond with a flat denial (not just disagreement, but "it never happened")?
- Has the conversation shifted from the original behavior to your character, motives, or mental state?
- Do you feel like you are now on trial for the act of raising a concern?
- Is the other person presenting themselves as harmed by your accusation?
- Do you feel guilty for bringing up the original issue?
If you answered yes to four or more of these, DARVO is likely operating.
How to respond to DARVO:
The DARVO-specific response has three components:
-
Hold your ground on the factual question. Do not get drawn into debating your motives, your character, or your history. "I'm not willing to debate whether my concerns are legitimate. I'm here to address [specific behavior]."
-
Name the reversal without accusing. "I notice that we've moved from talking about [original issue] to talking about whether I have a right to raise it. I want to come back to [original issue]."
-
Separate the conversation about the behavior from the conversation about the accusation. If the person needs space to express how they feel about being confronted, that is a real need — but it is not this conversation. "I hear that this accusation is painful. I'm not trying to hurt you. And I still need to address [specific behavior]."
Gaslighting
Gaslighting — the term derives from the 1944 film in which a husband systematically manipulates his wife into believing she is imagining things — refers to the pattern of denying or distorting a person's perception of reality to make them doubt their own experience. In conflict, gaslighting sounds like:
- "That never happened."
- "You're misremembering."
- "I never said anything like that."
- "You're imagining things."
- "Everyone agrees the problem is your interpretation, not what I did."
- "You're always doing this — making things into a crisis."
The target of gaslighting is not your argument. It is your capacity to trust your own perception. Once you doubt your own experience, you can no longer assert anything with confidence — and the person doing the gaslighting has effective control of the narrative.
Recognizing gaslighting: The signature is a persistent, calm denial of events you know occurred, delivered with a certainty that implies you are the one who is confused. Gaslighting rarely shows as anger. It presents as reasonable correction of an unreasonable person.
Responding without getting trapped:
First, trust your own record. If possible, keep contemporaneous notes of significant events. An email confirming what was agreed. A text message trail. A journal entry dated the same day. These are not paranoid habits — they are basic documentation practices that protect your ability to assert facts.
In the conversation itself: "I remember it differently from you. I'm not going to debate whose memory is correct. What I want to address is [specific behavior or situation]."
Notice this response does not claim your memory is perfect. It declines to accept the framing that one person's memory is correct and one is wrong. It returns to the behavior.
Second, name the pattern carefully. In cases of persistent gaslighting, naming the dynamic is important — but do so in terms of impact, not accusation. "I've noticed that whenever I raise a concern, what I'm experiencing gets described as wrong or misremembered. That pattern makes it very hard for me to feel like my experience is being taken seriously."
Emotional Manipulation: Guilt, Pity, and Fear
Guilt trips were introduced in section 23.1. This section addresses the broader category of emotional manipulation: any technique that leverages your feelings to control your position in a conversation.
Guilt is leveraged by invoking what you owe the other person. Past sacrifices. Shared history. The magnitude of their investment in you. The implicit logic: if you truly appreciated what they've done for you, you would not be raising this concern.
Pity is leveraged by foregrounding the other person's suffering. The stress they are under. The difficulties in their life. The way your concern is one more burden piled on an already exhausted person. The implicit logic: only a heartless person would press this issue right now.
Fear is leveraged by implying consequences. Not explicit threats — those are a different category — but implications. A long silence. A comment about "wondering how much longer this relationship makes sense." A reference to what "could happen" if things keep going this way. The implicit logic: dropping the concern is safer than continuing.
The crucial distinction between genuine emotional expression and emotional manipulation: real expressions of genuine feelings do not require you to change your position. They invite you to hear the feeling, to care about the person, to adjust your tone or timing if appropriate. Manipulative appeals are structured to make one specific outcome — your abandonment of the concern — feel morally mandatory.
The diagnostic question: does this appeal to my feelings require me to change my position?
Responding to emotional manipulation:
Separate the feeling from the demand. "I hear that you're exhausted, and I care about that. That's not what we're talking about right now."
Name the dynamic without using the word "manipulation": "I notice that every time I try to address this, I end up feeling responsible for your pain and backing down. I don't think that's helping either of us."
Maintain the distinction between caring about the person and ceding your position. You can hold someone in genuine regard and still assert your concern. These are not mutually exclusive. The guilt trip works by making them feel mutually exclusive. Your job is to refuse that framing — to demonstrate through your behavior that you can care deeply about someone's wellbeing while still maintaining a position they find uncomfortable.
When to Name the Dynamic Explicitly
There is no universal rule for when to name a manipulation pattern explicitly. Naming it has real benefits — it makes the dynamic visible, interrupts the automatic operation of the tactic, and signals that you see what is happening. It also has real costs — it can escalate the conversation, it can be wrong (not every deflection is a calculated DARVO; not every memory disagreement is gaslighting), and it can damage the relationship if the other person felt they were acting in good faith.
The decision framework:
Name it explicitly when: - The pattern is persistent and has occurred across multiple conversations - The stakes of not naming it are high (the behavior continues; your concerns are systematically unaddressed) - The relationship can absorb the friction of the naming - You are reasonably confident in your interpretation
Address the impact without naming the tactic when: - You are uncertain whether the behavior is strategic or defensive - The relationship is fragile or you are uncertain about the other party's capacity to hear it - The pattern is new rather than established - Naming it is more likely to escalate than to resolve
"I've noticed that our conversations tend to end with me feeling like the problem. I don't think that's what you're intending, but it's what keeps happening. I'd like us to find a different way."
This framing addresses the impact (conversations ending with you as the problem) without the diagnosis (you are deliberately doing this to me). It invites collaboration rather than demanding confession. It is almost always the better first move. Explicit naming of tactics is a later resort, not a first one.
The Jade Scenario: Resolution
Return to Jade, ten minutes into her conversation with Leo, defending herself against a list of supposed failures. What does she do now?
First, she has to notice what happened. The shift from raiser to defender is so fast and so natural that it can be minutes before a person realizes they are in a different conversation from the one they started. That noticing — the meta-awareness of "wait, how did I become the defendant here?" — is itself a skill that takes practice. Most people develop it retrospectively, not in real time. The goal of practice is to shorten the gap between the moment of deflection and the moment of recognition.
Second, she needs to stop defending. Every defense she offers concedes the frame — that this conversation is now about whether she has been a good enough girlfriend. She does not have to concede that frame. She can simply stop participating in it.
Third, she can use the parking lot: "Leo, I hear that you have concerns about how I've been showing up, and I want to address them. I'm going to note that because I don't want it to get lost. Can we come back to what I came to talk about first?"
If he presses — if he insists on resolving his concerns before hearing hers — she can name what she's noticing: "I notice that we've switched from talking about what I came to discuss to talking about whether I deserve to raise it. I'm not willing to let that trade happen. I want to hear your concerns. I need you to hear mine. Can we do both?"
She is not attacking him. She is not conceding. She is naming what happened and insisting on her right to be heard — the same right she is, implicitly, offering him. The parking lot has created the conditions for both concerns to receive attention. What it requires of Leo is the same thing it requires of Jade: to trust that the conversation can hold both of them, one at a time.
23.6 Chapter Summary
Conversational attacks come in six primary forms, ranging from the emotionally reactive to the deliberately strategic. Personal attacks target the speaker rather than the concern. Deflections introduce counter-complaints. Whataboutism reframes specific concerns as petty or selective. Topic hijacking pulls the conversation off course. Guilt trips leverage your feelings to move your position. Stonewalling refuses engagement as a form of passive attack.
The foundational response to personal attacks is the non-defensive response: acknowledge, do not defend, return to topic. Separating the person from the behavior ("that felt like a personal attack — is that what you intended?") creates a useful pause and forces explicit choice. The broken record sustains the original topic under repeated pressure. Different personal attack subtypes — character, competence, motive, and identity attacks — require slight variations in the non-defensive response, but the core structure remains constant.
For deflections and whataboutism, the key moves are acknowledging without accepting the redirect, and the parking lot technique: name it, note it, defer it, return to original, revisit later. Scope clarification addresses whataboutism's comparative framing by returning to the specific. The parking lot's effectiveness depends on genuine follow-through: it is only good faith if the parked item is actually revisited.
Topic hijacking is addressed by naming the drift without accusation, using the anchor statement to re-establish what you came to address, and using the broken record to sustain return. Deliberate hijacking may require more explicit naming; accidental drift usually responds to gentle course correction.
Calculated manipulation — DARVO, gaslighting, and emotional manipulation — requires additional techniques. DARVO is recognized by the rapid reversal from complaint-raiser to accused; the response is holding ground on the original behavior, naming the reversal, and separating the two conversations. Gaslighting is recognized by calm denial of your own perceptions; the response is trusting your record and declining to debate memory while returning to behavior. Emotional manipulation is recognized by appeals that require you to change your position; the response is separating the feeling from the demand.
The decision to name a manipulation pattern explicitly depends on persistence, stakes, relationship health, and confidence of interpretation. Naming the impact without naming the tactic is almost always the better first move.
Chapter 33 (Power Imbalances) will examine these same attacks in contexts where power differentials make them significantly harder to handle — where the personal attack comes from a supervisor, the gaslighting comes from a parent, and the guilt trip comes from someone whose approval you genuinely need. The tools are the same; the application becomes more complex when the attack also carries institutional or relational authority.
For now: you have been deflected. You are defending yourself against things you did not come to discuss. You feel the pull to keep defending, to win that argument, to prove that you are not whatever they just said you were.
Put down the defense. Notice what happened. Name it if you need to. Return to what you came to say.
That is the work.
Chapter 23 is part of Part 5: In the Moment. See also Chapter 21 (De-escalation), Chapter 22 (Managing Flooding), Chapter 24 (Recovery Strategies), and Chapter 25 (Negotiation Principles).