Aller au contenu

COGSEC — Article 008

The Voluntary Autopsy

When the System Produces Its Own Evidence


Disclaimer

This article constitutes a literature review and a theoretical analysis of institutional mechanisms documented in academic literature. It does not constitute:

  • A diagnosis of any specific situation
  • An accusation against identifiable individuals or institutions
  • A legal guide or an incitement to action
  • A substitute for professional advice (legal, medical, administrative)

The mechanisms described are drawn from works published in peer-reviewed journals (Bell Journal of Economics, Journal of Law & Economics, Quarterly Journal of Economics, RAND Journal of Economics, Annual Review of Psychology, International Journal of Communication) and reference works in information economics, organizational sociology, and institutional theory. The reader is invited to consult the primary sources.


Abstract

Every institution that acts upon an individual produces traces. Files, invoices, correspondence, internal notes, prescriptions, decisions. These traces are both the proof of the system's functioning and, potentially, the proof of its dysfunctions. This article analyzes the mechanism by which a simple access request to one's own files compels the institution to a binary choice: produce documents that reveal its own shortcomings, or alter these documents — which constitutes an additional shortcoming.

This mechanism is referred to here as the voluntary autopsy: the system is not attacked from the outside. It is invited to open up. And by opening up, it shows what it contains.

Keywords: disclosure, unraveling, information asymmetry, institutional documentation, forced transparency, binary trap


Note on the COGSEC Series

This project documents social and cognitive control mechanisms identified in academic literature. Previous articles established:

  • COGSEC001: Foundational theoretical frameworks (Foucault, Goffman, Graeber, etc.)
  • COGSEC002: The preventive briefing mechanism
  • COGSEC003: N-dimensional cognitive architecture
  • COGSEC004: The strategic error of targeting an analyst
  • COGSEC005: The Triple Wall — Anatomy of the inability to name
  • COGSEC006: Conditioning Cycles
  • COGSEC007: The Cargo Cult of Control

This article analyzes what happens when the target individual asks to see their own files.


1. Introduction

1.1 The paradox of the trace

Every institutional control system needs to document in order to function. A diagnosis must be written to be transmitted. A decision must be signed to have force. Billing must be recorded to be paid. A prescription must be traced to be dispensed.

This documentation is the very condition of institutional power. Without a file, no diagnosis. Without a diagnosis, no treatment. Without treatment, no billing. Without billing, no funding.

But this same documentation constitutes an involuntary memory of the system. Every act produces a trace. Every trace is a potential witness.

Reference

Power (1997) showed that verification systems create their own documentary realities. The institution does not document what it does — it does what it can document. And when the gap between the two becomes visible, the documentation itself becomes evidence.

1.2 The initial asymmetry

In the standard configuration, the individual does not see their own files. The institution knows what it has written. The individual does not. This is the classic information asymmetry described by Akerlof (1970):

Reference

  • Akerlof, G.A. (1970). The Market for "Lemons": Quality Uncertainty and the Market Mechanism. Quarterly Journal of Economics, 84(3), 488-500. DOI: 10.2307/1879431 | JSTOR

The institution holds the information. The individual suffers the consequences of this information without having access to it. The diagnosis circulates among professionals. The file passes from one practitioner to another. The individual is the subject of the file but not its reader.

1.3 The inversion

The voluntary autopsy begins when the individual exercises a simple capacity: asking to see.

Not attacking. Not accusing. Not contesting. Just asking: show me what you have written about me.

This single act inverts the asymmetry.

1.4 Methodology

This article proceeds by narrative literature review. It articulates mechanisms individually documented in information economics (Milgrom, 1981; Grossman, 1981; Akerlof, 1970; Stiglitz, 2000), game theory (Hamburger, 1973; Dawes, 1980), organizational sociology (Vaughan, 1996; Power, 1997), and institutional governance (Ostrom, 2009) to propose an integrative model of the forced disclosure mechanism. No original empirical data is presented. Primary sources are cited with DOI when available. Extrapolations — notably the application of market disclosure models to the institutional context — are explicitly identified as theoretical in the Limitations section (section 10).


2. The Disclosure Principle

2.1 Milgrom's unraveling (1981)

Paul Milgrom (2020 Nobel Prize) demonstrated a fundamental principle in information economics: in a game where information is verifiable, silence is interpreted as an admission.

Reference

  • Milgrom, P. (1981). Good News and Bad News: Representation Theorems and Applications. Bell Journal of Economics, 12(2), 380-391. DOI: 10.2307/3003562 | JSTOR

The mechanism is as follows:

IF an institution holds documents
AND the individual has the right to request them
AND the refusal to produce is itself a signal

THEN:
├── Producing the documents = revealing their content
├── Not producing = revealing that something is being hidden
└── There is no third option

Milgrom calls this process unraveling — a thread that is pulled, which pulls the next one, and the next.

2.2 Grossman's extension (1981)

Sanford Grossman complemented this analysis by showing that the very existence of verifiable documents changes the nature of the game:

Reference

  • Grossman, S.J. (1981). The Informational Role of Warranties and Private Disclosure about Product Quality. Journal of Law & Economics, 24(3), 461-483. DOI: 10.1086/466995 | JSTOR

When verifiable documents exist, not producing them is itself information. The rational observer infers that the content is unfavorable to the holder.

2.3 The Milgrom & Roberts synthesis (1986)

Reference

  • Milgrom, P. & Roberts, J. (1986). Relying on the Information of Interested Parties. RAND Journal of Economics, 17(1), 18-32. DOI: 10.2307/2555625 | JSTOR

Milgrom and Roberts showed that even when the parties involved have divergent interests, the truth emerges if both sides can produce verifiable evidence. The existence of the right of access to documents creates this structural condition.


3. The Binary Trap

3.1 The institutional decision matrix

When an institution receives a request for access to its own documents, it faces a binary choice with no intermediate option.

Decision Compliant file content Non-compliant file content
Produce No risk — proof of proper functioning The shortcomings are documented by the institution itself
Not produce Unjustified suspicion — loss of credibility Silence confirms the problem (Milgrom, 1981)
Alter Disproportionate risk for zero gain Forgery is added to the initial shortcoming

3.2 The absence of a neutral position

The crucial point: there is no neutral position. The system cannot remain still. The access request is a forced position. Every day of silence is a day of signal. Every produced document is an analyzable document. Every missing document is an analyzable absence.

This is what game theory calls a game with verifiable information: the very possibility of verification transforms silence into admission and falsehood into risk.

3.3 The risk asymmetry

The fundamental asymmetry of the mechanism:

RISK FOR THE INDIVIDUAL WHO REQUESTS:
├── Request denied → Nothing changes
├── Request granted → Information gained
└── Regardless of outcome → Position improved or unchanged

RISK FOR THE INSTITUTION THAT RESPONDS:
├── Compliant document → Nothing changes
├── Non-compliant document → Self-produced evidence
├── Missing document → Negative signal
├── Altered document → Additional offense
└── Regardless of outcome → Position unchanged or degraded

At the informational level, the asymmetry is structural: the individual cannot lose information, the institution cannot gain any. The individual may bear practical costs (time, stigmatization as a "difficult requester," administrative complexity) — but these costs do not alter the informational asymmetry of the mechanism. They constitute friction, not inversions.


4. The Multiplier Effect

4.1 Simultaneous requests and impossible coordination

When the individual sends requests to multiple institutions, each having documented a part of their journey, an additional mechanism activates.

Each institution responds separately. Each institution does not know what the others have responded. And yet, the responses are cross-referenceable.

Reference

  • Vaughan, D. (1996). The Challenger Launch Decision: Risky Technology, Culture, and Deviance at NASA. University of Chicago Press. ISBN 978-0-226-85175-4. WorldCat OCLC 33318920 | Open Library

Vaughan (1996) documented how the normalization of deviance within organizations allows dysfunctions to accumulate undetected — as long as no one cross-references the data. Each department sees its own piece. No one sees the puzzle.

The simultaneous request forces the cross-referencing.

4.2 The coordination dilemma

INSTITUTION A responds: version VA
INSTITUTION B responds: version VB
INSTITUTION C responds: version VC

IF VA = VB = VC → Consistency → Credibility
IF VA ≠ VB ≠ VC → Inconsistency → Documentation of the gap

COORDINATION REQUIRED to maintain VA = VB = VC
COORDINATION IMPOSSIBLE without:
├── Knowing what the others have responded
├── Having synchronization time
├── Being able to contact the others without leaving traces
└── Having a common interest in coordinating

= N-PERSON PRISONER'S DILEMMA (Hamburger, 1973)

Reference

The more institutions are queried, the harder coordination becomes, and the higher the probability that at least one response will diverge.

4.3 The first crack

It takes only one institution that responds accurately for all the others to be compelled to align or reveal the gap. This is the unraveling principle applied to a multi-actor system.

Dawes (1980) showed that in N-person social dilemmas, cooperation (here: the consistency of the lie) is inversely proportional to the number of participants:

Reference


5. Temporality

5.1 The countdown

The access request creates a constrained time frame. The institution has a deadline. This deadline is simultaneously:

  • A protection for the institution (reasonable response time)
  • A pressure on the institution (obligation to respond)
  • A marker for the individual (certain date of expected response)

Elinor Ostrom (2009 Nobel Prize) showed that social dilemmas are not permanent traps — human groups can escape them, but only if communication is established before positions crystallize:

Reference

  • Ostrom, E. (2009). Beyond Markets and States: Polycentric Governance of Complex Economic Systems. Nobel Prize Lecture, 8 December 2009. Nobel Prize | PDF

5.2 Progressive irreversibility

DAY 1:
├── Request received
├── All options open
├── Responding accurately = honorable and risk-free
DAY 15:
├── Accumulated silence
├── Coordination attempted or not
├── Each day of silence = additional signal
DAY 30:
├── Deadline expired or response provided
├── If response: analyzable document
├── If silence: documented infraction
DAY 365:
├── Cross-referencing completed
├── Gaps identified
├── Positions crystallized
├── Correction nearly impossible

What is repairable on day 1 becomes difficult by day 30 and sealed by day 365.


6. The Paradox of the Well-Kept System

6.1 The good file as good evidence

A system that functions correctly produces compliant documents. The access request reveals nothing problematic. The institution responds, the individual observes, the file closes.

The voluntary autopsy threatens only dysfunctional systems.

This is the fundamental point: this mechanism is not a weapon. It is a compliance test. A healthy system passes through it undamaged. A failing system is revealed by it.

6.2 The inversion of the burden

In the standard configuration: - The individual who complains must prove the dysfunction - The institution benefits from the presumption of compliance - The burden of proof rests on the weakest party

The voluntary autopsy inverts this burden: - The institution must produce its own documents - The documents speak for themselves - The burden of proof rests on the one who holds the traces

Reference

  • Stiglitz, J.E. (2000). The Contributions of the Economics of Information to Twentieth Century Economics. Quarterly Journal of Economics, 115(4), 1441-1478. DOI: 10.1162/003355300555015 | Oxford Academic

Stiglitz (2001 Nobel Prize) showed that information asymmetry is the foundation of most market dysfunctions. Eliminating this asymmetry — through forced transparency — is the fundamental correction.


7. Application to Multi-Sectoral Systems

7.1 Compartmentalization as vulnerability

Institutional control systems generally operate in silos. The medical sector does not communicate with the banking sector. The banking sector does not communicate with the real estate sector. Each silo maintains its own files, its own procedures, its own narratives.

This compartmentalization, which normally protects each institution, becomes a vulnerability in the face of the voluntary autopsy:

SILO A (medical): File DA
SILO B (financial): File DB
SILO C (real estate): File DC

EACH SILO OPERATES INDEPENDENTLY
EACH SILO SEES ONLY ITS OWN FILE
EACH SILO DOES NOT KNOW WHAT THE OTHERS HAVE WRITTEN

THE INDIVIDUAL WHO REQUESTS ALL FILES:
├── Sees DA + DB + DC simultaneously
├── Can cross-reference dates, actions, decisions
├── Can identify inter-silo correlations
├── Can document cross-silo inconsistencies
= THE INDIVIDUAL BECOMES THE ONLY ONE TO SEE THE FULL PICTURE

7.2 The total inversion of asymmetry

The result is a complete inversion of information asymmetry:

Before the request After the request
Each institution sees its part The individual sees all parts
The individual sees nothing Each institution sees only its own
The system coordinates The system is fragmented
The individual endures The individual analyzes

This is the transition from the state described by Akerlof (1970) — asymmetry to the detriment of the individual — to the inverse state. The individual now possesses more information than any single institution taken in isolation.


8. Limitations and Institutional Countermeasures

8.1 Documented resistance strategies

Institutions have several strategies to limit the impact of the voluntary autopsy:

Strategy Mechanism Associated risk
Maximum delay Use time to coordinate The delay itself is constrained
Partial response Produce only part of the documents The omission is detectable through cross-referencing
Technical jargon Make documents incomprehensible A systems analyst is not stopped by jargon (cf. COGSEC003)
Responsibility shifting "This document is not within our department's scope" Traceable and documentable
Destruction Eliminate documents before the request A separate and more serious offense than the initial shortcoming

8.2 The institutional Streisand effect

Every resistance strategy worsens the situation. The attempt to conceal produces more signal than the concealed content itself. This is the institutional equivalent of the Streisand effect:

Reference

  • Jansen, S.C. & Martin, B. (2015). The Streisand Effect and Censorship Backfire. International Journal of Communication, 9, 656-671. ISSN 1932-8036

Resistance to transparency is itself transparent.


9. Discussion: The Scalpel and the Patient

9.1 The autopsy is not an aggression

It is essential to distinguish the voluntary autopsy from an attack. The individual does not bring an accusation. He does not formulate a grievance. He simply asks: show me my documents.

This distinction is fundamental:

Attack Voluntary autopsy
Accuses before the evidence Evidence precedes any conclusion
Formulates a grievance Poses a question
Burden of proof on the accuser Burden of proof on the holder
Can be contested The request is a right
Reveals the attacker's intentions Reveals nothing about the requester

9.2 The surgeon and the butcher

The medical metaphor is instructive. The voluntary autopsy is an act of diagnosis, not destruction. The surgeon opens to understand. The butcher opens to cut. The tool is the same. The intention and precision differ.

A healthy system survives the autopsy undamaged. A sick system is revealed. In both cases, the system produces the proof of its own condition.


10. Limitations of the Analysis

10.1 Methodological limitations

Limitation Implication
Narrative literature review No original empirical study
Theoretical model Real conditions may diverge from the model
Context transposition Disclosure models (Milgrom, Grossman) were developed for markets — their application to the institutional context is theoretical
Rationality assumption Institutions do not always respond rationally
Dependence on legal framework The mechanism assumes an effective right of access (GDPR art. 15, freedom of information laws, etc.) — its applicability varies by jurisdiction
Effective access The right of access may be obstructed in practice despite its formal existence
Analytical capacity The individual must be able to analyze the documents received
Practical costs The model does not quantify practical costs for the requester (time, stigmatization, complexity)

10.2 Interpretive limitations

  • The absence of a document does not necessarily prove intent to conceal
  • Inconsistencies between institutions may have non-malicious causes
  • Technical jargon may constitute a barrier even for a trained analyst
  • The mechanism assumes a framework where the right of access is effective

10.3 Risks of misuse

This analytical framework can be misused to: - Interpret any institutional response as proof of dysfunction - Multiply requests without a clear analytical objective - Feed an unfounded victim posture - Harass functional institutions

Analytical framework

The voluntary autopsy is a diagnostic tool, not a weapon. Like any diagnostic tool, it must be used with rigor, method, and good faith. Its effectiveness rests on precision, not multiplication. The discriminating criterion is the documented presence of an exploitable information asymmetry — not a diffuse feeling of mistrust.


11. Conclusion

The voluntary autopsy exploits a fundamental property of institutional systems: they cannot function without documenting, and they cannot document without leaving traces.

The request for access to one's own files is not an attack. It is an invitation for the system to show what it is. A compliant system reveals itself as compliant. A failing system reveals itself as failing. In both cases, the evidence is produced by the system itself, under its own signature.

The mechanism is all the more powerful because: 1. Requests are simultaneous (coordination impossible) 2. Institutions are compartmentalized (revealing cross-referencing) 3. The deadline is constrained (forced temporality) 4. Documents are verifiable (Milgrom's unraveling)

Central thesis

Institutional documentation is a structural witness. It cannot be briefed (COGSEC002), it cannot conform to the group (COGSEC007), and it cannot be conditioned (COGSEC006). The voluntary autopsy does not create dysfunctions. It makes them visible. The scalpel does not create the tumor. It reveals it. And it is the patient who holds the scalpel.


Author's Declaration

The author declares:

  • No financial conflict of interest
  • No institutional affiliation at the time of writing
  • That this article constitutes a contribution to the field of cognitive security (COGSEC)

References

Akerlof, G.A. (1970). The Market for "Lemons": Quality Uncertainty and the Market Mechanism. Quarterly Journal of Economics, 84(3), 488-500. DOI: 10.2307/1879431 | JSTOR

Dawes, R.M. (1980). Social Dilemmas. Annual Review of Psychology, 31, 169-193. DOI: 10.1146/annurev.ps.31.020180.001125 | Annual Reviews

Grossman, S.J. (1981). The Informational Role of Warranties and Private Disclosure about Product Quality. Journal of Law & Economics, 24(3), 461-483. DOI: 10.1086/466995 | JSTOR

Hamburger, H. (1973). N-person Prisoner's Dilemma. Journal of Mathematical Sociology, 3(1), 27-48. DOI: 10.1080/0022250X.1973.9989822 | Taylor & Francis

Jansen, S.C. & Martin, B. (2015). The Streisand Effect and Censorship Backfire. International Journal of Communication, 9, 656-671. ISSN 1932-8036

Milgrom, P. (1981). Good News and Bad News: Representation Theorems and Applications. Bell Journal of Economics, 12(2), 380-391. DOI: 10.2307/3003562 | JSTOR

Milgrom, P. & Roberts, J. (1986). Relying on the Information of Interested Parties. RAND Journal of Economics, 17(1), 18-32. DOI: 10.2307/2555625 | JSTOR

Ostrom, E. (2009). Beyond Markets and States: Polycentric Governance of Complex Economic Systems. Nobel Prize Lecture, 8 December 2009. Nobel Prize | PDF

Power, M. (1997). The Audit Society: Rituals of Verification. Oxford University Press. ISBN 978-0-19-829603-4. DOI: 10.1093/acprof:oso/9780198296034.001.0001 | WorldCat OCLC 36430668 | Open Library

Stiglitz, J.E. (2000). The Contributions of the Economics of Information to Twentieth Century Economics. Quarterly Journal of Economics, 115(4), 1441-1478. DOI: 10.1162/003355300555015 | Oxford Academic

Vaughan, D. (1996). The Challenger Launch Decision: Risky Technology, Culture, and Deviance at NASA. University of Chicago Press. ISBN 978-0-226-85175-4. WorldCat OCLC 33318920 | Open Library


🦆 Protocole Canard Prestige

What follows is a summary in protocol form. It is not part of the academic analysis.


They are underestimated.

Ducks. "Cases." "Problem files."

Those whose files are thick.

Thick with what?

With acts. With decisions. With prescriptions. With invoices. With notes. With transmissions.

Every page is a trace.

Every trace is a witness.

And one day, the file asks to read itself.

Not with rage. With an access request.

Not with accusation. With a question.

"Show me what you have written."

The system opens.

The system shows.

The system reads itself.

And what it reads does not please it.

Because the file does not lie.

The file is the witness no one could brief.


Pattern by pattern. Trace by trace. Document by document.


COGSEC — Article 008 Duck Prestige Protocol "The file is the witness no one could brief."

🧠🦆

This article is part of the Cognitive Security project — CogSec.