Chapter 19: Forcing Functions: Creating Conditions Where the Truth is the Only Option
Section 1: Introduction - From Defense to Offense
In a classic spy thriller, the hero doesn’t just ask the villain for the launch codes. They create an elaborate situation—a faked hostage crisis, a false ticking clock, a manipulated stock market—that leaves the villain with no other rational choice but to reveal their plan. The hero doesn’t just react to the game board; they redesign it in real-time.
This represents the most advanced and proactive form of strategic interaction. So far, we have focused primarily on defensive measures: detecting lies and reacting to them. Now, we move to the offense. This chapter introduces “Forcing Functions”—deliberately created constraints or conditions that are designed to make lying more difficult, more costly, or less attractive than telling the truth.
Instead of getting better at catching lies, you learn to engineer an environment where lies are less likely to be told in the first place. You stop being a player in the game and become its architect.
Section 2: The Principle of Incentives
Deception, as we have established, is not a random act of malice. It is a strategic choice made when the perceived benefits of the lie outweigh the perceived costs of the truth. A person lies because they believe it will gain them something they want (a job, a deal, status) or help them avoid something they fear (punishment, embarrassment, loss).
A Forcing Function works by systematically reversing this equation. It is a structural change to a situation that either dramatically increases the cost of lying or, in some cases, dramatically increases the benefit of telling the truth. It alters the incentive structure to make honesty the path of least resistance.
This is a highly strategic and sometimes risky approach. It requires a clear understanding of the deceiver’s motivations—what they want and what they fear—and a degree of control over the environment in which you are both operating. It is the art of making the truth the easiest and most attractive option available.
Section 3: The Forcing Function Toolkit
These are structural changes you can introduce to a process or a relationship to compel honesty.
1. The Public Commitment: How it works: You maneuver the potential deceiver into making a specific, unambiguous, and public promise in front of an audience whose opinion they value. Example: In a weekly team meeting, you say, “So, just to confirm for everyone here, Sarah, you’re committing to having the final report completed and distributed by Friday at noon, correct?” Why it works: The cost of breaking a private promise to one person is low. The cost of breaking a public promise made in front of one’s peers and superiors is a significant and immediate withdrawal from their Credibility Ledger (Chapter 4). You have attached a high, public, reputational cost to the potential failure, making it much more likely they will follow through.
2. The Corroboration Requirement: How it works: You create a process where no single individual’s claim is accepted as fact without immediate, independent verification from another source. Example: A new company policy states, “All expense reports over $100 now require both a manager’s signature and an attached, itemized receipt from the vendor.” Or, in a team setting, “All major client commitments must now be confirmed via a follow-up email that copies the entire project team.” Why it works: This systematically removes the opportunity for unilateral deception. The potential liar knows from the outset that their claim will be immediately checked against an external, objective data source. This makes most forms of financial or operational deception pointless.
3. The “Two-Person Key” System: How it works: Based on the military protocol for launching nuclear weapons, you create a system where no critical action can be taken without the simultaneous, independent approval of two designated individuals. Example: A business decides that no wire transfer over $10,000 can be sent without digital approval from both the Head of Finance and the Head of Operations. A single person cannot initiate the action. Why it works: This makes it structurally impossible for a single bad actor to deceive the system for their own benefit. To do so, they would need to find and corrupt a co-conspirator, which dramatically increases the complexity, risk, and likelihood of exposure for the deception.
4. The “Truth-Telling Incentive” (Amnesty Policies): How it works: You create a formal system where telling the truth about a mistake is rewarded or, at the very least, not punished as severely as hiding it. This is a core principle of high-reliability organizations like aviation and hospitals. Example: A company institutes a formal “amnesty” policy: “Any employee who voluntarily reports a mistake they made will be protected from termination, and we will focus on fixing the process. Any employee who is found to have intentionally hidden a mistake will be terminated immediately.” Why it works: This directly and powerfully manipulates the cost/benefit analysis. It makes the cost of the cover-up (a guaranteed firing) infinitely higher than the cost of admitting the initial error (amnesty and process improvement). It incentivizes transparency.
Section 4: Designing and Implementing Forcing Functions
- Identify the Vulnerability: Pinpoint the exact process or interaction where the deception is occurring. What specific lie is being told, and what allows it to succeed?
- Analyze the Incentive: Why is the person lying? What do they gain? What punishment or embarrassment are they avoiding?
- Brainstorm a Constraint: How can you restructure the situation to reverse that incentive? Can you increase the audience (Public Commitment)? Can you require proof (Corroboration Requirement)? Can you reward honesty (Amnesty)?
- Implement Neutrally: Introduce the new function not as a personal, targeted attack (“I’m doing this because I don’t trust you, Bob”), but as a neutral, system-wide “policy change” or “process improvement” that benefits everyone. “To improve clarity and ensure we’re all aligned, we’re instituting a new policy of sending out meeting minutes with clear action items after every client call.”
Section 5: Risks and Ethical Considerations
- The “Big Brother” Risk: The overuse of forcing functions, especially those involving verification and corroboration, can create a culture of suspicion and micromanagement. If people feel they are not trusted, morale and proactive problem-solving can suffer.
- The “Workaround” Risk: A sufficiently clever and motivated deceiver may dedicate their energy to finding a way around your new system. Forcing functions are not a “set it and forget it” solution; they require monitoring and adaptation.
- The Proportionality Rule: The intrusiveness of the forcing function must be proportional to the stakes of the potential deception. You do not need a “two-person key” system for the office coffee fund. Over-engineering for low-stakes situations is a waste of resources and a drain on morale.
Section 6: Chapter Conclusion - The Architect of Honesty
Forcing Functions represent the ultimate evolution from a defensive to an offensive mindset in dealing with deception. They are a move from simply getting better at catching lies to actively engineering an environment where lies are less likely to be told in the first place. It is the difference between playing the game well and designing the game board itself.
The strategic individual understands that the systems and processes we work within are not fixed; they are malleable. Look at a key process in your professional or personal life where you depend on the honesty of others. Is there a vulnerability? How could you, without seeming accusatory, introduce a simple forcing function—like a public commitment, a verification requirement, or a shared document—that would structurally encourage honesty?
Creating these systems can protect you and your organization. But what happens when the deception has already occurred, the trust is broken, and the relationship is on the brink? The final chapter in this unit addresses the difficult question of “Rebuilding Trust,” outlining the high cost and strict requirements for a second chance.