Secrets as Ammunition: Why Insiders Have Always Weaponized Information Against Their Own Institutions
The Eternal Insider's Dilemma
In 63 BCE, Marcus Tullius Cicero faced a problem that would be familiar to any modern corporate executive or government official: he possessed information that could destroy his enemies, but using it through official channels would also destroy himself. His solution was as elegant as it was ancient—he found a way to let the information "escape" through carefully managed intermediaries, allowing him to maintain plausible deniability while achieving his political objectives.
This pattern has repeated itself across five millennia of recorded human behavior, from the palace intrigues of ancient Mesopotamia to the anonymous sources quoted in today's Washington Post. The strategic leak is not a modern invention born of democratic transparency or journalistic ethics. It is one of humanity's oldest weapons in the perpetual war between competing factions within the same organization.
The Psychology of Institutional Betrayal
What drives someone to betray the institution that employs them? Modern organizational psychology suggests it's rarely the high-minded principles that leakers claim in their post-exposure interviews. Instead, research on workplace behavior reveals that leaking typically occurs when individuals feel their legitimate channels for influence have been blocked or when they believe they're losing an internal power struggle.
This aligns perfectly with historical patterns. When Themistocles leaked Athenian naval plans to Persian commanders in 480 BCE, he wasn't motivated by pacifist ideals—he was positioning himself for a post-war political landscape where his rivals might hold power. Similarly, when Pentagon analyst Daniel Ellsberg released the Pentagon Papers in 1971, he had already spent months attempting to influence policy through official channels within the RAND Corporation and the Defense Department.
The leak, in other words, is almost never the first option. It's the weapon of choice for insiders who have already lost the argument in the room where decisions are made.
The Mechanics of Managed Disclosure
Across cultures and centuries, successful leakers have followed remarkably similar tactical patterns. They identify sympathetic intermediaries—whether Roman historians, medieval chroniclers, or modern journalists—who can provide both distribution and legitimacy for their information. They time their disclosures to maximize damage to their targets while minimizing risk to themselves. And they almost always maintain multiple layers of deniability.
Consider the case of the Watergate revelations. "Deep Throat," later revealed as FBI Associate Director Mark Felt, never handed Bob Woodward a smoking gun document. Instead, he confirmed information the reporters had gathered elsewhere and guided their investigation toward productive avenues. This approach allowed Felt to damage his rivals within the Nixon administration while maintaining his position within the FBI hierarchy—at least until the investigation threatened his own interests.
The same pattern appears in ancient sources. When Plutarch describes the fall of various Roman politicians, his accounts often rely on information that could only have come from surviving members of their inner circles—individuals who had clear incentives to distance themselves from their former allies' failures.
The Information Asymmetry Game
What makes strategic leaking so persistent across human societies is its fundamental basis in information asymmetries. Institutions concentrate sensitive information among small groups of insiders, creating both the opportunity and the incentive for those insiders to weaponize that information when their interests diverge from the institution's official position.
This dynamic explains why attempts to prevent leaking through legal threats or organizational restructuring have proven consistently ineffective throughout history. The Athenian Assembly passed death penalties for revealing state secrets. Roman emperors executed officials suspected of sharing military intelligence. Medieval courts tortured suspected informants. Modern governments prosecute leakers under espionage statutes.
None of these approaches have eliminated the behavior, because they fail to address its underlying psychological drivers. As long as institutions concentrate information and create internal competition for influence, some insiders will inevitably conclude that their interests are better served by sharing secrets with outsiders than by maintaining loyalty to colleagues who have outmaneuvered them in internal political struggles.
The Ecosystem of Secrets
Perhaps most importantly, strategic leaking requires a functioning ecosystem of information brokers—individuals and institutions outside the immediate organization who can receive, verify, and disseminate leaked information in ways that serve their own interests. This ecosystem has remained remarkably stable across historical periods, even as the specific technologies and social structures have evolved.
In ancient Rome, this role was filled by historians like Tacitus and Suetonius, who built their reputations on access to insider information about imperial politics. In medieval Europe, traveling merchants and clerics served as informal intelligence networks, carrying sensitive information between competing courts and kingdoms. In modern democracies, journalists and think tank researchers perform similar functions, providing platforms for information that serves their sources' factional interests while advancing their own professional objectives.
The Eternal Return
The consistency of this pattern across cultures and centuries suggests something profound about human psychology in organizational settings. We are not primarily motivated by abstract principles or institutional loyalty. Instead, we respond to immediate threats and opportunities within our social environment, using whatever tools are available to advance our perceived interests.
This reality makes strategic leaking less a breakdown of institutional norms than a natural expression of those norms. Every organization that concentrates sensitive information among competing factions will eventually experience leaks. Every society that creates intermediary institutions capable of receiving and amplifying leaked information will see those institutions used for factional warfare.
Understanding this pattern doesn't make strategic leaking less problematic for institutional stability—if anything, it makes the challenge more daunting. But it does suggest that effective responses must account for the underlying human psychology rather than simply imposing stronger penalties for behavior that has persisted across five millennia of human organization.