You already pay people to break your systems.
Not because your systems are poorly built. Not because your engineers are incompetent. But because the architecture that built the system cannot see its own blind spots. The people who designed it are too close to it, too invested in it, too embedded in the assumptions that shaped it to find the vulnerabilities that exist precisely because of those assumptions.
So you bring in someone from outside and give them a brief, a boundary, and a sanction. You tell them: find what we cannot find, break what we cannot break and show us where we are exposed before our adversaries do.
You call it penetration testing, red teaming or a white hat operation.
And you consider it a necessary investment in the health of a complex system.
What you have not yet done is apply the same logic to your judgment.
The technology stack can be attacked from outside and so can the consensus.
Every organisation develops an internal logic over time. A set of assumptions about what is true, what is possible, what constitutes acceptable risk, and what kind of answer is permissible in a meeting room. This logic is not written down anywhere, but it lives in the culture, in the hiring decisions, in the questions that get asked and the questions that don't, in the people who get promoted and the people who quietly leave.
It is, structurally, a consensus machine, and like all consensus machines it has a specific and predictable vulnerability. It cannot audit itself.
The internal verification architecture, the strategy teams, the legal counsel and the management consensus, will always return the answer it was built to return. Not through malice, but through design. The system routes signal through its existing framework and receives back what that framework is capable of receiving.
Watkins handed her memo to Lay. Lay handed it to the lawyers who built the structures she was questioning. They found no reason for concern. Boisjoly presented his data to NASA management. Management asked Thiokol to reconsider. Thiokol asked its engineers to take off their engineering hats. The system audited itself. It declared itself healthy. The consequences arrived anyway.
This is not a failure of individuals. It is the predictable behaviour of a system that has no sanctioned mechanism for receiving the signal it cannot generate from inside itself.
You have that mechanism for your technology, but you do not yet have it for your judgment.
The white hat penetration tester is not an employee, not on a performance plan and is not being developed toward a competency framework or assessed against a behavioural rubric. He is given a specific brief, a legitimate zone of operation, and the sanction to do the thing the internal architecture cannot do, attack the system from outside its own assumptions.
The outlier operates on identical logic.
He is not an employee improvement project nor a cultural fit problem requiring resolution. He is not the person who needs to learn to communicate better, influence more effectively, or take off his engineering hat.
He is the white hat for your consensus machine.
Give him the same thing you give the penetration tester. A contained brief, a legitimate zone and the sanction to surface difficult truth without it being automatically routed through the HR framework that will smooth it back into acceptability before it has a chance to land.
The point is not to make the outlier comfortable, but to make his signal usable. You contain it, you sanction it and you deploy it.
Not as a management challenge but as a strategic function.
This is the category.
Not a department, not a programme and not an initiative with a quarterly review and a RAG status report. A sanctioned function with a specific brief, to carry the signal the system suppresses early and recognises too late.
The Fidelity Cell exists because the consensus machine cannot audit itself. Because the internal verification architecture will always return the answer it was built to return. Because the smooth, fluent, plausible answer travels fastest and costs most. Because Enron happened and Challenger happened and Theranos happened and in each case the answer was already in the room and the room chose not to listen.
It exists because you already understand this logic when it applies to your technology, and now you are simply being asked to apply it one level higher.
To the judgment that runs everything else.
Discovery.
A contained, low-intensity intervention designed to identify where signal is being suppressed, who carries it, and whether the organisation has the maturity to use it without forcing it back through standard HR logic.
Its value is not measured by performance frameworks but by second-order effects, the sharper challenge, earlier truth, and reduced consensus blindness.
It does not begin with a proposal or a methodology or a change management programme, but instead it begins with a conversation between people who have both been somewhere the system couldn't reach and come back with something it couldn't generate.
If that conversation produces nothing, nothing is lost. If it produces what it has produced before, the return is asymmetric.
That is the only kind of investment worth making.
Diagnostic
One question.
Where in your organisation is the signal being suppressed right now?
And who is carrying it?
© Leo Cunningham 2026. All rights reserved.
Written beyond the air-gap.