This is part of a series providing insights aimed at corporate strategists seeking competitive advantage through better and more accurate decision-making. The full series is available at our special section on Decision Intelligence.
The best business leaders are good at spotting falsehoods. Some joke and say they have a “bullshit detector”, but that humorous description does not do service to the way great leaders detect falsehoods. Bullshit is easy to detect. You see it and smell it and if you step in it it is your own fault. In the modern world falsehoods are far more nuanced.
Now more than ever, business and government leaders need to ensure their mental models for detecting falsehood are operating in peak condition.
The business information environment today includes more sources and feeds of data than ever. And in the case of every data source, whether the data is from internal or external sources, or from a paid service or open, or from the government or academia, there are issues with data. All data can have unintentional mistakes in it. Some can be intentionally manipulated. Additionally, how that data is analyzed and acted upon can generate conclusions that are horribly wrong.
The same is true for the employees working in every organization today. Employees from the most junior to most senior are living in an information rich environment that is shaping perceptions and this can shape the way decisions are made on the job. Every employee in your organization is subject to disinformation and misinformation via a wide range of channels, including traditional media and press but also:
- Email, voice and video that connects everyone everywhere.
- Social media, including Facebook and Twitter and LinkedIn, which enables anyone to create and disseminate and consume any content.
- New genres of information include podcasts, blogs, streaming video (YouTube), on demand entertainment (Netflix, AppleTV, Apple Music, Amazon video), on demand books (Kindle and ebooks).
- Many video games can serve as communications media, including immersive video games using virtual reality and augmented reality.
- Government and corporate information systems which enable instant broadcasting of messages to individuals. These are controlled by people who can be tricked into transmitting the wrong information or can simply screw up (reducing credibility while doing so).
- Cable and broadcast TV is in just about every house and can even reach people on their mobile devices.
Now consider how malicious actors, including a spectrum from individuals, competitors, criminals and even nations are exploiting the new information environment. They are doing so for a variety of objectives and are doing this with access to a range of new tools to enable broad reach. New technologies being leveraged by adversaries to create and disseminate false information includes:
- Internet-based communications technologies that enable anonymous action from a distance.
- Machine learning algorithms that can extract information from massive quantities of data. These algorithms can be used for a variety of purposes including learning previously unknowable things about people, their behaviors, and deepest desires, all of which can aid adversaries seeking to manipulate cognition.
- An Internet that is optimized to deliver information through ads to tailorable audiences across multiple devices and track who sees what.
- Artificial Intelligence that can help create the right message to influence an audience, and then quickly re-tailor messages on the fly to improve desired outcomes.
- Tools that can manipulate images, audio and sound to create deceptive messages, including creating entire events that never occurred. These tools are now so easy to use that amateurs are “face swapping” faces into videos of their choosing just for fun. These tools are being weaponized across video, text and audio.
- Tools that can take entire sources of information offline through denial of service attacks.
- Fragile security systems that can be penetrated remotely to enable planting of information or extraction of data for malicious use.
These new information paths and new technologies for creating and disseminating false information means that all of us need to continually improve our ability to spot and vet falsehoods.
Fine Tuning Your Falsehood Detector
The tips below flow from decades of service as a Naval Intelligence officer with a focus on all source intelligence analysis, as well as a study of cognitive science and cognitive bias. They are designed to provide a quick mental checklist that can empower any citizen, employee, corporate leader and government leader to spot falsehoods.
- Know your sources of data and analysis. Every data source has weaknesses that need to be understood. This is true for technical data sources and human data sources.
- Continually assess your sources of data and analysis. Is there bias in what is being collected or what is not being collected? Has the source been reliable over time? Is the source subject to political bias or corporate pressure?
- Avoid making big, irreversible decisions on a single source of data. The smart use of multiple sources of data and analytic rigor will help spot and mitigate falsehood from any one source.
- When data sources cannot be vetted, you may need to make assumptions. Avoid making irreversible decisions till you can confirm those assumptions.
- Fight bias in judgement by keeping your cognitive bias in check. The confirmation bias is frequently leveraged by fraudsters so is especially dangerous (see An Executive’s Guide To Cognitive Bias in Decision Making).
- Organizations should use a team based approach to detecting falsehoods. Companies should build an environment where substantive and informed debate is welcomed. Groups can be deceived too, but by treating analysis as a team sport and capturing dissenting ideas many risks can be avoided.
- Individuals can also use a team based approach to detecting falsehoods, especially fraud, by seeking out reputable sources of insight. Inform your decisions by reviewing common fraud schemes reported by the FTC and law enforcement sources. Ask experienced friends and family their views (but be sure they have not fallen for misinformation/disinformation themselves- don’t ask your anti-vax cousin for Covid advice).
- Understand that well intentioned, good people can be deceived into believing something with all their heart and this may includes sources that have reliably reported in the past. Learn to be politely skeptical and ask questions about why a source thinks a certain way.
- Understand that the greatest, most well intentioned corporations, government agencies and institutions are also subject to bias and error. All organizations are fallible. In many cases is will be prudent to make planning assumptions that trust highly regarded institutions, but understand, all organizations make mistakes. If your falsehood detector is tuned to assume all large organizations are perfect it will result in potentially devastating errors.
Consider this short list as you think through how to optimize your corporate intelligence efforts. Also consider how you can help your employees improve their personal Falsehood Detector. Doing so can help their on the job performance and mitigate several threats continually attacking their personal information environment.
Additional Reading from our Intelligent Enterprise Series:
Decision Intelligence and Establishing an Intelligent Enterprise: The greatest determinant of your success will be the quality of your decisions. We examine frameworks for understanding and reducing risk while enabling opportunities. Topics include Black Swans, Gray Rhinos, Foresight, Strategy, Stratigames, Business Intelligence and Intelligent Enterprises. Leadership in the modern age is also a key topic in this domain.
About the Author
Bob Gourley
Bob Gourley is an experienced Chief Technology Officer (CTO), Board Qualified Technical Executive (QTE), author and entrepreneur with extensive past performance in enterprise IT, corporate cybersecurity and data analytics. CTO of OODA LLC, a unique team of international experts which provide board advisory and cybersecurity consulting services. OODA publishes OODALoop.com. Bob has been an advisor to dozens of successful high tech startups and has conducted enterprise cybersecurity assessments for businesses in multiple sectors of the economy. He was a career Naval Intelligence Officer and is the former CTO of the Defense Intelligence Agency.
Subscribe to OODA Daily Pulse
The OODA Daily Pulse Report provides a detailed summary of the top cybersecurity, technology, and global risk stories of the day.