Saturday, February 28, 2026

COUNTERFEIT SMS

 COUNTERFEIT SMS

By OffRoadPilots

A counterfeit Safety Management System (SMS) is not simply a weak or

immature system; it is a system that never truly operates in daily decision-

making. It exists primarily to satisfy oversight expectations rather than to

control operational risk. The first and most reliable indicator appears in

behavior changes during oversight. Before an audit, work is informal,

hazards are handled verbally, and production dominates choices. During an

audit, employees suddenly quote policy, manuals are referenced, reports

appear, and safety terminology becomes fluent. Afterward, operations

return to normal. A real SMS permanently changes how decisions are

made; a counterfeit one only changes how people speak when observed. If

safety language disappears when oversight leaves, the system is theatrical

rather than functional.


Another major sign is the

presence of reports without

operational change. Genuine

systems convert hazard

reports into removal of risk.

Counterfeit systems convert

reports into records. You will

see repeated hazards logged

over months or years,

corrective actions labelled as

“monitor,” and files closed

without verification. A

decisive question is whether

the organization can

demonstrate a hazard

eliminated because someone

reported it. If the only evidence consists of meetings, investigations, or

discussion rather than removal, the SMS is administrative. Safety

.performance must be measured in hazards removed, not documents

produced.


Risk assessments also reveal authenticity. In counterfeit environments,

assessments consistently conclude that risk is acceptable. Probability

values are copied across forms, different hazards receive identical ratings,

and existing controls are re-listed as new mitigation. The purpose becomes

approval of planned work rather than understanding exposure. A real SMS

frequently produces inconvenient outcomes: delays, redesign, additional

cost, or cancellation. If risk assessment never disrupts production, it is

authorizing risk rather than analyzing it.


Counterfeit systems

commonly assign safety to

a department or individual

instead of embedding it

across the organization.

Employees say “talk to

safety” or “the SMS office

handles that.” In a real

system, maintenance can

delay flights, dispatch can

reject plans, supervisors can

stop tasks, and workers

intervene without permission. When safety belongs to a single role, operations belong entirely to production. When safety belongs to everyone, behavior changes across the organization. A safety office should coordinate safety, never contain it.


SMS.Investigation quality is another clear diagnostic. Counterfeit investigations

end with human error: inattention, lack of awareness, complacency, or need

for retraining. Real investigations identify system conditions such as time

pressure, staffing levels, conflicting priorities, procedure design, or

equipment usability. If corrective actions repeatedly retrain individuals, the

organization is repairing people instead of repairing the environment that

shaped behavior. Human error should begin an investigation, not conclude

it.


Worker communication reveals the true operating climate. In counterfeit

systems employees speak cautiously, requesting anonymity and warning

investigators not to document their statements. They describe how they

“make it work” or how things have always been done. In real systems

employees reference previous reports, known fixes, and management-

supported changes. Psychological safety determines operational safety.

When workers must protect themselves from reporting, the reporting

system itself becomes a hazard.


Safety meetings also

differentiate real and false

systems. Counterfeit

meetings review statistics,

discuss events abstractly,

and end without assigned

actions or deadlines.

Agendas repeat monthly.

Real meetings conclude

with clear responsibilities,

completion dates, and

verification methods.Meetings that generate discussion but no operational decision function as

public relations rather than risk control.


Performance indicators can mislead when they measure activity instead of exposure. Counting reports, inspections, or training hours demonstrates motion, not safety. Authentic indicators track risk movement, such as the time required to mitigate a hazard, recurrence rates after corrective action,

or exposure reduction trends. If performance graphs cannot demonstrate

decreased operational exposure, they measure bureaucracy rather than

protection.


Change management provides another decisive indicator. In counterfeit

systems the organization documents risk after implementing the change:

procedures already in use before assessment, equipment installed before

review, staffing reduced before analysis. Documentation becomes

historical justification rather than prevention. In functioning SMS

environments, operational staff expect no change to proceed before risk

understanding.


Emergency preparedness

exposes similar patterns.

Counterfeit plans are precise

but impractical, listing

unavailable personnel,

outdated contacts, and

unrealistic timelines.

Exercises emphasize

attendance rather than

performance. When

responders privately describewhat would actually happen, the gap between reality and documentation

reveals system authenticity. A real plan reflects how people truly operate under pressure.

Ultimately, a counterfeit SMS manages regulatory exposure, while a real SMS manages operational exposure. One protects the organization from

findings; the other protects people from harm. The difference appears in

consequences. In a functioning system work sometimes stops, schedules

move, costs increase, and leaders accept delay. Safety competes with

production and sometimes wins. If safety never meaningfully influences

decisions, it is not part of operations.


A final diagnostic question captures the distinction: ask any employee to

describe the last time safety overruled operations. If the organization

struggles to answer, the SMS exists on paper. If multiple employees

immediately provide different real examples, the system is alive.


OffRoadPilots





No comments:

Post a Comment

COUNTERFEIT SMS

 COUNTERFEIT SMS By OffRoadPilots A counterfeit Safety Management System (SMS) is not simply a weak or immature system; it is a system that...