COGSEC — Article 008¶
The Voluntary Autopsy¶
When the System Produces Its Own Evidence¶
Disclaimer¶
This article constitutes a literature review and a theoretical analysis of institutional mechanisms documented in academic literature. It does not constitute:
- A diagnosis of any specific situation
- An accusation against identifiable individuals or institutions
- A legal guide or an incitement to action
- A substitute for professional advice (legal, medical, administrative)
The mechanisms described are drawn from works published in peer-reviewed journals (Bell Journal of Economics, Journal of Law & Economics, Quarterly Journal of Economics, RAND Journal of Economics, Annual Review of Psychology, International Journal of Communication) and reference works in information economics, organizational sociology, and institutional theory. The reader is invited to consult the primary sources.
Abstract¶
Every institution that acts upon an individual produces traces. Files, invoices, correspondence, internal notes, prescriptions, decisions. These traces are both the proof of the system's functioning and, potentially, the proof of its dysfunctions. This article analyzes the mechanism by which a simple access request to one's own files compels the institution to a binary choice: produce documents that reveal its own shortcomings, or alter these documents — which constitutes an additional shortcoming.
This mechanism is referred to here as the voluntary autopsy: the system is not attacked from the outside. It is invited to open up. And by opening up, it shows what it contains.
Keywords: disclosure, unraveling, information asymmetry, institutional documentation, forced transparency, binary trap
Note on the COGSEC Series¶
This project documents social and cognitive control mechanisms identified in academic literature. Previous articles established:
- COGSEC001: Foundational theoretical frameworks (Foucault, Goffman, Graeber, etc.)
- COGSEC002: The preventive briefing mechanism
- COGSEC003: N-dimensional cognitive architecture
- COGSEC004: The strategic error of targeting an analyst
- COGSEC005: The Triple Wall — Anatomy of the inability to name
- COGSEC006: Conditioning Cycles
- COGSEC007: The Cargo Cult of Control
This article analyzes what happens when the target individual asks to see their own files.
1. Introduction¶
1.1 The paradox of the trace¶
Every institutional control system needs to document in order to function. A diagnosis must be written to be transmitted. A decision must be signed to have force. Billing must be recorded to be paid. A prescription must be traced to be dispensed.
This documentation is the very condition of institutional power. Without a file, no diagnosis. Without a diagnosis, no treatment. Without treatment, no billing. Without billing, no funding.
But this same documentation constitutes an involuntary memory of the system. Every act produces a trace. Every trace is a potential witness.
Reference
- Power, M. (1997). The Audit Society: Rituals of Verification. Oxford University Press. ISBN 978-0-19-829603-4. DOI: 10.1093/acprof:oso/9780198296034.001.0001 | WorldCat OCLC 36430668 | Open Library
Power (1997) showed that verification systems create their own documentary realities. The institution does not document what it does — it does what it can document. And when the gap between the two becomes visible, the documentation itself becomes evidence.
1.2 The initial asymmetry¶
In the standard configuration, the individual does not see their own files. The institution knows what it has written. The individual does not. This is the classic information asymmetry described by Akerlof (1970):
Reference
- Akerlof, G.A. (1970). The Market for "Lemons": Quality Uncertainty and the Market Mechanism. Quarterly Journal of Economics, 84(3), 488-500. DOI: 10.2307/1879431 | JSTOR
The institution holds the information. The individual suffers the consequences of this information without having access to it. The diagnosis circulates among professionals. The file passes from one practitioner to another. The individual is the subject of the file but not its reader.
1.3 The inversion¶
The voluntary autopsy begins when the individual exercises a simple capacity: asking to see.
Not attacking. Not accusing. Not contesting. Just asking: show me what you have written about me.
This single act inverts the asymmetry.
1.4 Methodology¶
This article proceeds by narrative literature review. It articulates mechanisms individually documented in information economics (Milgrom, 1981; Grossman, 1981; Akerlof, 1970; Stiglitz, 2000), game theory (Hamburger, 1973; Dawes, 1980), organizational sociology (Vaughan, 1996; Power, 1997), and institutional governance (Ostrom, 2009) to propose an integrative model of the forced disclosure mechanism. No original empirical data is presented. Primary sources are cited with DOI when available. Extrapolations — notably the application of market disclosure models to the institutional context — are explicitly identified as theoretical in the Limitations section (section 10).
2. The Disclosure Principle¶
2.1 Milgrom's unraveling (1981)¶
Paul Milgrom (2020 Nobel Prize) demonstrated a fundamental principle in information economics: in a game where information is verifiable, silence is interpreted as an admission.
Reference
- Milgrom, P. (1981). Good News and Bad News: Representation Theorems and Applications. Bell Journal of Economics, 12(2), 380-391. DOI: 10.2307/3003562 | JSTOR
The mechanism is as follows:
IF an institution holds documents
AND the individual has the right to request them
AND the refusal to produce is itself a signal
THEN:
├── Producing the documents = revealing their content
├── Not producing = revealing that something is being hidden
└── There is no third option
Milgrom calls this process unraveling — a thread that is pulled, which pulls the next one, and the next.
2.2 Grossman's extension (1981)¶
Sanford Grossman complemented this analysis by showing that the very existence of verifiable documents changes the nature of the game:
Reference
- Grossman, S.J. (1981). The Informational Role of Warranties and Private Disclosure about Product Quality. Journal of Law & Economics, 24(3), 461-483. DOI: 10.1086/466995 | JSTOR
When verifiable documents exist, not producing them is itself information. The rational observer infers that the content is unfavorable to the holder.
2.3 The Milgrom & Roberts synthesis (1986)¶
Reference
- Milgrom, P. & Roberts, J. (1986). Relying on the Information of Interested Parties. RAND Journal of Economics, 17(1), 18-32. DOI: 10.2307/2555625 | JSTOR
Milgrom and Roberts showed that even when the parties involved have divergent interests, the truth emerges if both sides can produce verifiable evidence. The existence of the right of access to documents creates this structural condition.
3. The Binary Trap¶
3.1 The institutional decision matrix¶
When an institution receives a request for access to its own documents, it faces a binary choice with no intermediate option.
| Decision | Compliant file content | Non-compliant file content |
|---|---|---|
| Produce | No risk — proof of proper functioning | The shortcomings are documented by the institution itself |
| Not produce | Unjustified suspicion — loss of credibility | Silence confirms the problem (Milgrom, 1981) |
| Alter | Disproportionate risk for zero gain | Forgery is added to the initial shortcoming |
3.2 The absence of a neutral position¶
The crucial point: there is no neutral position. The system cannot remain still. The access request is a forced position. Every day of silence is a day of signal. Every produced document is an analyzable document. Every missing document is an analyzable absence.
This is what game theory calls a game with verifiable information: the very possibility of verification transforms silence into admission and falsehood into risk.
3.3 The risk asymmetry¶
The fundamental asymmetry of the mechanism:
RISK FOR THE INDIVIDUAL WHO REQUESTS:
├── Request denied → Nothing changes
├── Request granted → Information gained
└── Regardless of outcome → Position improved or unchanged
RISK FOR THE INSTITUTION THAT RESPONDS:
├── Compliant document → Nothing changes
├── Non-compliant document → Self-produced evidence
├── Missing document → Negative signal
├── Altered document → Additional offense
└── Regardless of outcome → Position unchanged or degraded
At the informational level, the asymmetry is structural: the individual cannot lose information, the institution cannot gain any. The individual may bear practical costs (time, stigmatization as a "difficult requester," administrative complexity) — but these costs do not alter the informational asymmetry of the mechanism. They constitute friction, not inversions.
4. The Multiplier Effect¶
4.1 Simultaneous requests and impossible coordination¶
When the individual sends requests to multiple institutions, each having documented a part of their journey, an additional mechanism activates.
Each institution responds separately. Each institution does not know what the others have responded. And yet, the responses are cross-referenceable.
Reference
- Vaughan, D. (1996). The Challenger Launch Decision: Risky Technology, Culture, and Deviance at NASA. University of Chicago Press. ISBN 978-0-226-85175-4. WorldCat OCLC 33318920 | Open Library
Vaughan (1996) documented how the normalization of deviance within organizations allows dysfunctions to accumulate undetected — as long as no one cross-references the data. Each department sees its own piece. No one sees the puzzle.
The simultaneous request forces the cross-referencing.
4.2 The coordination dilemma¶
INSTITUTION A responds: version VA
INSTITUTION B responds: version VB
INSTITUTION C responds: version VC
IF VA = VB = VC → Consistency → Credibility
IF VA ≠ VB ≠ VC → Inconsistency → Documentation of the gap
COORDINATION REQUIRED to maintain VA = VB = VC
COORDINATION IMPOSSIBLE without:
├── Knowing what the others have responded
├── Having synchronization time
├── Being able to contact the others without leaving traces
└── Having a common interest in coordinating
= N-PERSON PRISONER'S DILEMMA (Hamburger, 1973)
Reference
- Hamburger, H. (1973). N-person Prisoner's Dilemma. Journal of Mathematical Sociology, 3(1), 27-48. DOI: 10.1080/0022250X.1973.9989822 | Taylor & Francis
The more institutions are queried, the harder coordination becomes, and the higher the probability that at least one response will diverge.
4.3 The first crack¶
It takes only one institution that responds accurately for all the others to be compelled to align or reveal the gap. This is the unraveling principle applied to a multi-actor system.
Dawes (1980) showed that in N-person social dilemmas, cooperation (here: the consistency of the lie) is inversely proportional to the number of participants:
Reference
- Dawes, R.M. (1980). Social Dilemmas. Annual Review of Psychology, 31, 169-193. DOI: 10.1146/annurev.ps.31.020180.001125 | Annual Reviews
5. Temporality¶
5.1 The countdown¶
The access request creates a constrained time frame. The institution has a deadline. This deadline is simultaneously:
- A protection for the institution (reasonable response time)
- A pressure on the institution (obligation to respond)
- A marker for the individual (certain date of expected response)
Elinor Ostrom (2009 Nobel Prize) showed that social dilemmas are not permanent traps — human groups can escape them, but only if communication is established before positions crystallize:
Reference
- Ostrom, E. (2009). Beyond Markets and States: Polycentric Governance of Complex Economic Systems. Nobel Prize Lecture, 8 December 2009. Nobel Prize | PDF
5.2 Progressive irreversibility¶
DAY 1:
├── Request received
├── All options open
├── Responding accurately = honorable and risk-free
│
DAY 15:
├── Accumulated silence
├── Coordination attempted or not
├── Each day of silence = additional signal
│
DAY 30:
├── Deadline expired or response provided
├── If response: analyzable document
├── If silence: documented infraction
│
DAY 365:
├── Cross-referencing completed
├── Gaps identified
├── Positions crystallized
├── Correction nearly impossible
What is repairable on day 1 becomes difficult by day 30 and sealed by day 365.
6. The Paradox of the Well-Kept System¶
6.1 The good file as good evidence¶
A system that functions correctly produces compliant documents. The access request reveals nothing problematic. The institution responds, the individual observes, the file closes.
The voluntary autopsy threatens only dysfunctional systems.
This is the fundamental point: this mechanism is not a weapon. It is a compliance test. A healthy system passes through it undamaged. A failing system is revealed by it.
6.2 The inversion of the burden¶
In the standard configuration: - The individual who complains must prove the dysfunction - The institution benefits from the presumption of compliance - The burden of proof rests on the weakest party
The voluntary autopsy inverts this burden: - The institution must produce its own documents - The documents speak for themselves - The burden of proof rests on the one who holds the traces
Reference
- Stiglitz, J.E. (2000). The Contributions of the Economics of Information to Twentieth Century Economics. Quarterly Journal of Economics, 115(4), 1441-1478. DOI: 10.1162/003355300555015 | Oxford Academic
Stiglitz (2001 Nobel Prize) showed that information asymmetry is the foundation of most market dysfunctions. Eliminating this asymmetry — through forced transparency — is the fundamental correction.
7. Application to Multi-Sectoral Systems¶
7.1 Compartmentalization as vulnerability¶
Institutional control systems generally operate in silos. The medical sector does not communicate with the banking sector. The banking sector does not communicate with the real estate sector. Each silo maintains its own files, its own procedures, its own narratives.
This compartmentalization, which normally protects each institution, becomes a vulnerability in the face of the voluntary autopsy:
SILO A (medical): File DA
SILO B (financial): File DB
SILO C (real estate): File DC
EACH SILO OPERATES INDEPENDENTLY
EACH SILO SEES ONLY ITS OWN FILE
EACH SILO DOES NOT KNOW WHAT THE OTHERS HAVE WRITTEN
THE INDIVIDUAL WHO REQUESTS ALL FILES:
├── Sees DA + DB + DC simultaneously
├── Can cross-reference dates, actions, decisions
├── Can identify inter-silo correlations
├── Can document cross-silo inconsistencies
│
= THE INDIVIDUAL BECOMES THE ONLY ONE TO SEE THE FULL PICTURE
7.2 The total inversion of asymmetry¶
The result is a complete inversion of information asymmetry:
| Before the request | After the request |
|---|---|
| Each institution sees its part | The individual sees all parts |
| The individual sees nothing | Each institution sees only its own |
| The system coordinates | The system is fragmented |
| The individual endures | The individual analyzes |
This is the transition from the state described by Akerlof (1970) — asymmetry to the detriment of the individual — to the inverse state. The individual now possesses more information than any single institution taken in isolation.
8. Limitations and Institutional Countermeasures¶
8.1 Documented resistance strategies¶
Institutions have several strategies to limit the impact of the voluntary autopsy:
| Strategy | Mechanism | Associated risk |
|---|---|---|
| Maximum delay | Use time to coordinate | The delay itself is constrained |
| Partial response | Produce only part of the documents | The omission is detectable through cross-referencing |
| Technical jargon | Make documents incomprehensible | A systems analyst is not stopped by jargon (cf. COGSEC003) |
| Responsibility shifting | "This document is not within our department's scope" | Traceable and documentable |
| Destruction | Eliminate documents before the request | A separate and more serious offense than the initial shortcoming |
8.2 The institutional Streisand effect¶
Every resistance strategy worsens the situation. The attempt to conceal produces more signal than the concealed content itself. This is the institutional equivalent of the Streisand effect:
Reference
- Jansen, S.C. & Martin, B. (2015). The Streisand Effect and Censorship Backfire. International Journal of Communication, 9, 656-671. ISSN 1932-8036
Resistance to transparency is itself transparent.
9. Discussion: The Scalpel and the Patient¶
9.1 The autopsy is not an aggression¶
It is essential to distinguish the voluntary autopsy from an attack. The individual does not bring an accusation. He does not formulate a grievance. He simply asks: show me my documents.
This distinction is fundamental:
| Attack | Voluntary autopsy |
|---|---|
| Accuses before the evidence | Evidence precedes any conclusion |
| Formulates a grievance | Poses a question |
| Burden of proof on the accuser | Burden of proof on the holder |
| Can be contested | The request is a right |
| Reveals the attacker's intentions | Reveals nothing about the requester |
9.2 The surgeon and the butcher¶
The medical metaphor is instructive. The voluntary autopsy is an act of diagnosis, not destruction. The surgeon opens to understand. The butcher opens to cut. The tool is the same. The intention and precision differ.
A healthy system survives the autopsy undamaged. A sick system is revealed. In both cases, the system produces the proof of its own condition.
10. Limitations of the Analysis¶
10.1 Methodological limitations¶
| Limitation | Implication |
|---|---|
| Narrative literature review | No original empirical study |
| Theoretical model | Real conditions may diverge from the model |
| Context transposition | Disclosure models (Milgrom, Grossman) were developed for markets — their application to the institutional context is theoretical |
| Rationality assumption | Institutions do not always respond rationally |
| Dependence on legal framework | The mechanism assumes an effective right of access (GDPR art. 15, freedom of information laws, etc.) — its applicability varies by jurisdiction |
| Effective access | The right of access may be obstructed in practice despite its formal existence |
| Analytical capacity | The individual must be able to analyze the documents received |
| Practical costs | The model does not quantify practical costs for the requester (time, stigmatization, complexity) |
10.2 Interpretive limitations¶
- The absence of a document does not necessarily prove intent to conceal
- Inconsistencies between institutions may have non-malicious causes
- Technical jargon may constitute a barrier even for a trained analyst
- The mechanism assumes a framework where the right of access is effective
10.3 Risks of misuse¶
This analytical framework can be misused to: - Interpret any institutional response as proof of dysfunction - Multiply requests without a clear analytical objective - Feed an unfounded victim posture - Harass functional institutions
Analytical framework
The voluntary autopsy is a diagnostic tool, not a weapon. Like any diagnostic tool, it must be used with rigor, method, and good faith. Its effectiveness rests on precision, not multiplication. The discriminating criterion is the documented presence of an exploitable information asymmetry — not a diffuse feeling of mistrust.
11. Conclusion¶
The voluntary autopsy exploits a fundamental property of institutional systems: they cannot function without documenting, and they cannot document without leaving traces.
The request for access to one's own files is not an attack. It is an invitation for the system to show what it is. A compliant system reveals itself as compliant. A failing system reveals itself as failing. In both cases, the evidence is produced by the system itself, under its own signature.
The mechanism is all the more powerful because: 1. Requests are simultaneous (coordination impossible) 2. Institutions are compartmentalized (revealing cross-referencing) 3. The deadline is constrained (forced temporality) 4. Documents are verifiable (Milgrom's unraveling)
Central thesis
Institutional documentation is a structural witness. It cannot be briefed (COGSEC002), it cannot conform to the group (COGSEC007), and it cannot be conditioned (COGSEC006). The voluntary autopsy does not create dysfunctions. It makes them visible. The scalpel does not create the tumor. It reveals it. And it is the patient who holds the scalpel.
Author's Declaration¶
The author declares:
- No financial conflict of interest
- No institutional affiliation at the time of writing
- That this article constitutes a contribution to the field of cognitive security (COGSEC)
References¶
Akerlof, G.A. (1970). The Market for "Lemons": Quality Uncertainty and the Market Mechanism. Quarterly Journal of Economics, 84(3), 488-500. DOI: 10.2307/1879431 | JSTOR
Dawes, R.M. (1980). Social Dilemmas. Annual Review of Psychology, 31, 169-193. DOI: 10.1146/annurev.ps.31.020180.001125 | Annual Reviews
Grossman, S.J. (1981). The Informational Role of Warranties and Private Disclosure about Product Quality. Journal of Law & Economics, 24(3), 461-483. DOI: 10.1086/466995 | JSTOR
Hamburger, H. (1973). N-person Prisoner's Dilemma. Journal of Mathematical Sociology, 3(1), 27-48. DOI: 10.1080/0022250X.1973.9989822 | Taylor & Francis
Jansen, S.C. & Martin, B. (2015). The Streisand Effect and Censorship Backfire. International Journal of Communication, 9, 656-671. ISSN 1932-8036
Milgrom, P. (1981). Good News and Bad News: Representation Theorems and Applications. Bell Journal of Economics, 12(2), 380-391. DOI: 10.2307/3003562 | JSTOR
Milgrom, P. & Roberts, J. (1986). Relying on the Information of Interested Parties. RAND Journal of Economics, 17(1), 18-32. DOI: 10.2307/2555625 | JSTOR
Ostrom, E. (2009). Beyond Markets and States: Polycentric Governance of Complex Economic Systems. Nobel Prize Lecture, 8 December 2009. Nobel Prize | PDF
Power, M. (1997). The Audit Society: Rituals of Verification. Oxford University Press. ISBN 978-0-19-829603-4. DOI: 10.1093/acprof:oso/9780198296034.001.0001 | WorldCat OCLC 36430668 | Open Library
Stiglitz, J.E. (2000). The Contributions of the Economics of Information to Twentieth Century Economics. Quarterly Journal of Economics, 115(4), 1441-1478. DOI: 10.1162/003355300555015 | Oxford Academic
Vaughan, D. (1996). The Challenger Launch Decision: Risky Technology, Culture, and Deviance at NASA. University of Chicago Press. ISBN 978-0-226-85175-4. WorldCat OCLC 33318920 | Open Library
🦆 Protocole Canard Prestige¶
What follows is a summary in protocol form. It is not part of the academic analysis.
They are underestimated.
Ducks. "Cases." "Problem files."
Those whose files are thick.
Thick with what?
With acts. With decisions. With prescriptions. With invoices. With notes. With transmissions.
Every page is a trace.
Every trace is a witness.
And one day, the file asks to read itself.
Not with rage. With an access request.
Not with accusation. With a question.
"Show me what you have written."
The system opens.
The system shows.
The system reads itself.
And what it reads does not please it.
Because the file does not lie.
The file is the witness no one could brief.
Pattern by pattern. Trace by trace. Document by document.
COGSEC — Article 008 Duck Prestige Protocol "The file is the witness no one could brief."
🧠🦆
This article is part of the Cognitive Security project — CogSec.
PGP Verification