Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 13, Issue 48;   November 27, 2013: Some Truths About Lies: III

Some Truths About Lies: III

by

Detecting lies by someone intent on misrepresentation is an important skill for executives, managers, project managers, and just about anyone involved in knowledge-oriented organizations. Here's Part III of our little collection of lie detection techniques.
The molecular structure of Oleic Acid (a cis fat, top), and Elaidic Acid (a trans fat, bottom)

The molecular structure of Oleic Acid (a cis fat, top), and Elaidic Acid (a trans fat, bottom). The two fats have identical numbers of carbon atoms (black), hydrogen atoms (white) and oxygen atoms (red). The numbers of different bond types are also identical. The difference between the two is the placement of the carbon-carbon double bonds near the middle of the chains. In the trans fat version (Elaidic Acid, bottom), the carbon-carbon double bonds are across from each other (hence the name trans fat). In the cis fat version, the Oleic Acid, the carbon-carbon double bonds are adjacent to each other, which causes a bend in the chain at that point. (The prefix cis is from Latin. It means "on this side").

The molecules of the trans isomer are able to pack tightly together to form a solid at temperatures of the human body and slightly above. The molecules of the cis isomer aren't able to do so. They are liquids. This solidification property makes the trans fat an attractive ingredient for foods, because it extends shelf life by preventing rancidity. It also makes the trans fat a deadly ingredient in food, because it solidifies and collects on arterial walls, contributing to heart disease. Photos courtesy Wikipedia.

It's often difficult to detect a lie, but detecting lies can be much easier. Although spotting a single instance of a misleading statement can be difficult, we can often detect deceptions that might otherwise escape our notice if they're part of a series of statements offered over a period of time. One form that facilitates this scenario is the interview.

The term interview connotes a friendly question-and-answer format that we might encounter in print media or broadcast media. But the term also applies to a nonaccusatory question-and-answer session during or after presentations at meetings, or in a one-on-one meeting with one's supervisor, or any of dozens of other situations at work. Interviews are distinguished from interrogations, which are clearly accusatory.

Here's Part III of our little catalog of indicators that suggest the handiwork of a deceiver, emphasizing techniques that apply during interviews. See "Some Truths About Lies: I," Point Lookout for August 4, 2004, for more.

Unpleasantness, defensiveness, or intimidation
Although many follow-up questions are motivated by innocent confusion or a search for clarity, some deceivers experience follow-up questions as challenges to the deceiver's claims. To prevent further follow-up questions, deceivers who fear that their deceptions aren't working sometimes express resentment or anger in response to follow-up questions. Rarely are these emotional displays real in the conventional sense. The deceivers are just using intimidation as a diversion to prevent further probing.
Deceivers who use intimidation, anger, sarcasm, or other means of deterring further questioning are at best failing to cooperate with the interviewer; at worst, they're concealing something important.
That can't be it; it's too small
Deceivers intent on discrediting evidence of errors, negligence, or wrongdoing sometimes assert that evidence is invalid because it's inconclusive on its own, even when it is valid as part of a complete pattern of evidence, or when it typifies incidents that have occurred numerous times. For example, consuming one gram of trans fat doesn't cause coronary artery disease. But consuming one gram per day for thirty years probably would.
Evidence dismissed by the deceiver prematurely as insufficient could indicate a desire to conceal a larger body of damning evidence. During the interview, take note of repeated use of this technique.
An answer for everything
When interviewers When interviewers probe for more
complete disclosure of deceivers'
positions, some deceivers have
exculpatory responses for
absolutely every question
probe for more complete disclosure of deceivers' positions, some deceivers have exculpatory responses for absolutely every question. Such a 100% performance isn't typical outside the realm of deception, because most people have only incomplete knowledge of any given situation.
More important, though, deceivers know that they're deceiving. Some are a little frightened about it. They tend to compensate by presenting stories without holes. But since some highly sophisticated deceivers know that ironclad stories are the mark of the deceiver, they do include some (unimportant) holes now and then.

We'll continue next time with more techniques for detecting lies using the interview. First in this series  Next in this series Go to top Top  Next issue: Some Truths About Lies: IV  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrenHoWzUJVeioCfozEIner@ChacbnsTPttsdDaRAswloCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Ethics at Work:

MX MissileBudget Shenanigans: Swaps
When projects run over budget, managers face a temptation to use creative accounting to address the problem. The budget swap is one technique for making ends meet. It distorts organizational data, and it's just plain unethical.
A thiefLooking the Other Way
Sometimes when we notice wrongdoing, and we aren't directly involved, we don't report it, and we don't intervene. We look the other way. Typically, we do this to avoid the risks of making a report. But looking the other way is also risky. What are the risks of looking the other way?
The interior of an Apple store, location unknownPersonnel-Sensitive Risks: I
Some risks and the plans for managing them are personnel-sensitive in the sense that disclosure can harm the enterprise or its people. Since most risk management plans are available to a broad internal audience, personnel-sensitive risks cannot be managed in the customary way. Why not?
Harry Stonecipher, former CEO of The Boeing CompanyPersonnel-Sensitive Risks: II
Personnel-sensitive risks are risks that are difficult to discuss openly. Open discussion could infringe on someone's privacy, or lead to hurt feelings, or to toxic politics or toxic conflict. If we can't discuss them openly, how can we deal with them?
Police line tapeCounterproductive Knowledge Work Behavior
With the emergence of knowledge-oriented workplaces, counterproductive work behavior is taking on new forms that are rare or inherently impossible in workplaces where knowledge plays a less central role. Here are some examples.

See also Ethics at Work and Effective Communication at Work for more related articles.

Forthcoming issues of Point Lookout

A labyrinth. It's a good metaphor for what toxic disrupts try to erect in the path of the group.Coming June 7: Toxic Disrupters: Tactics
Some people tend to disrupt meetings. Their motives vary, but they use techniques drawn from a limited collection. Examples: they violate norms, demand attention, mess with the agenda, and sow distrust. Response begins with recognizing their tactics. Available here and by RSS on June 7.
A wolf pack, probably preparing for a huntAnd on June 14: Pseudo-Collaborations
Most workplace collaborations produce results of value. But some collaborations — pseudo-collaborations — are inherently incapable of producing value, due to performance management systems, or lack of authority, or lack of access to information. Available here and by RSS on June 14.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenHoWzUJVeioCfozEIner@ChacbnsTPttsdDaRAswloCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.