Chapter 3: The Architecture of Information Asymmetry
The most dangerous information asymmetry isn't when one party knows something the other doesn't. It's when one party controls what multiple parties see—and no mechanism requires those parties to compare versions. Merit can't protect you in systems where your performance can be redefined.
Chapter 3 of The Quiet Years by Dilia Wood identifies information asymmetry as the structural mechanism that enables institutional extraction without rule-breaking — when one intermediary controls what multiple parties see and no architecture requires those versions to be reconciled. The chapter demonstrates this pattern across the Inspirador SBA 504 case, platform marketplaces, employment equity structures, and telecommunications.

The most dangerous information asymmetry isn't when one party knows something the other doesn't. It's when one party controls what multiple parties see—and no mechanism requires those parties to compare versions.
Most people think systems fail because someone violates a rule. But the most consequential failures happen when everyone follows the rules exactly as written—and the structure still produces contradictory outcomes.
Information asymmetry is the architecture that makes this possible. It is the mechanism through which systems create different realities for different parties, even when they believe they're participating in the same agreement.
It doesn't announce itself. It operates quietly, invisibly, through the simple fact that no two parties see the same version of the truth at the same time.
This was the architecture I had walked into without knowing it, and the reason collapse had unfolded the way it did.
THE STRUCTURE OF SEPARATE REALITIES
In theory, the SBA 504 program is an exercise in balance: lender, borrower, CDC—each providing oversight, each protecting the others.
In practice, the CDC controls the record.
Whoever controls the record controls interpretation. Whoever controls interpretation controls institutional reality. And institutional reality is what determines the outcome—not performance, not evidence, not truth.
The program doesn't fail because individuals behave badly. It fails because the architecture allows a single party to curate different versions of events for different audiences, with no structural requirement for reconciliation.
Imagine an agreement where Party A is told one thing, Party B is told another, and Party C never sees either version in full. Now imagine the system operates as though these versions are identical.
That's the 504 structure. And it works—until the moment pressure is applied.
Under pressure, asymmetry becomes a weapon. The party who controls information can produce multiple truths simultaneously, each tailored to the audience receiving it. The architecture simply permits this—no rule-breaking required, no red flags triggered.
THE LETTERS THAT EXPOSED THE SYSTEM
Two letters. Same date. Same author. Same loan. Two incompatible claims.
One letter told the SBA that I had canceled the loan. The other told Compass Bank that the CDC had canceled the authorization.
For months, I read this contradiction as a moral failure—evidence of misconduct, deception, maybe even fraud.
Years later, returning to the screenshots, I saw something different. These weren't just conflicting narratives. They were architectural artifacts—the outcome of a system built to allow contradictory claims to coexist without detection.
The SBA had no mechanism forcing it to compare its version to the bank's. The bank had no mechanism requiring verification of the SBA's version. Both trusted the intermediary, because the architecture assumed the intermediary's good faith.
The structure made contradiction invisible. Invisible contradiction made extraction possible.
The letters didn't reveal corruption. They revealed design.
WHY CONTRADICTION DOESN'T TRIGGER INVESTIGATION
Contradiction is only meaningful in systems that reconcile information horizontally.
The 504 structure is vertical.
Each party receives information filtered through the intermediary. The system has no structural cross-check, no verification loop, no architectural requirement that all parties share a unified factual foundation.
The result: Contradictions don't signal failure. They disappear into silos.
The SBA believed their version. The bank believed theirs. Both were "true" inside their respective lanes.
The architecture didn't collapse because someone lied. It collapsed because the system allowed each truth to function independently.
That is the essence of information asymmetry—why the party controlling the flow of information always has disproportionate power, even when they appear, on paper, to be a neutral administrator.
WHY GOOD FAITH IS NOT A SAFEGUARD
Systems built on trust are systems built on vulnerability.
Good faith is not a control. It is an assumption. And assumptions cannot protect anyone under pressure.
The SBA assumes the CDC acts neutrally. The bank assumes the CDC acts accurately. The borrower assumes the CDC acts in alignment with program integrity.
These assumptions are neither enforced nor verified nor required to be true.
This is the quiet truth at the heart of institutional design: When a system depends on goodwill for stability, it is already unstable.
Architectural safeguards are what protect people, not trust. Information asymmetry isn't a flaw in that architecture—it is the architecture.
THE CONSEQUENCE OF PARTITIONED REALITY
When the collapse unfolded, I kept hunting for the mistake I must have made: a missed detail, a misunderstood clause, a conversation I should have insisted on, a document I should have reviewed more aggressively.
But the letters revealed a different truth. My performance had nothing to do with the outcome.
The vulnerability wasn't personal. It was structural.
I could execute perfectly and still be reinterpreted into failure—not because evidence was missing, but because someone else controlled the narrative the institutions relied on. And the institutions had no way to see anything other than the version they were given.
This was the revelation that shifted everything: You cannot outperform an architecture that allows your reality to be rewritten.
This realization would become the foundation for my entire structural literacy framework, and the beginning of my understanding of architectural fraud—manipulation that requires no rule-breaking, only design exploitation.
WHY MERIT CAN'T PROTECT YOU IN ASYMMETRICAL SYSTEMS
Merit protects you only in systems where all parties see the same reality.
Information asymmetry destroys those conditions.
You can meet every requirement, exceed every metric, follow every rule—and still lose, because someone else controls the interpretation of your performance.
This isn't cynicism. It's architectural observation.
Meritocracy assumes a shared truth: one record, one set of facts, one outcome based on performance. The better you perform, the more secure your position becomes. Competence translates directly to protection.
Asymmetrical systems don't operate that way.
They produce multiple truths, each authoritative within its own lane. Your performance exists in one version. The interpretation that reaches decision-makers exists in another. And you have no structural mechanism to ensure those versions align.
When interpretation depends on which version an institution sees, merit becomes irrelevant. You cannot outperform a system whose architecture allows your performance to be redefined after you've already performed.
I had documentation proving loan obligations met, revenue projections exceeded, historic preservation completed, city approvals secured, business operating successfully through 2008 crisis.
McGee had positional authority to claim adverse change had occurred, financial misrepresentation existed, risk management required intervention.
His version reached the institutions with interpretation authority. Mine existed in files those institutions never compared.
Both were "true" within their respective information lanes. But only one determined the outcome.
This is why competence feels like it should be protection—and why it systematically fails in asymmetric architectures.
The system isn't measuring your performance. It's measuring the interpreter's narrative about your performance.
And if the interpreter's incentives misalign with yours, your merit becomes evidence they can reframe.
Strong revenue? "Unsustainable growth masking structural problems."
Successful operations? "Lucky timing in favorable conditions."
Perfect documentation? "Overcurated to hide underlying issues."
Asymmetric architecture allows every strength to be reinterpreted as weakness because institutions see only the version the intermediary provides.
This was the realization that changed everything about how I understood institutional vulnerability.
I hadn't failed to perform. I had performed inside an architecture where performance doesn't determine outcomes.
Once you see this, you cannot unsee it. And once you understand it, you cannot build inside asymmetric systems the same way again.
THE ARCHITECTURE REVEALS ITS LOGIC
Once I understood the mechanics of information asymmetry, pieces that had never made sense suddenly aligned.
Why the SBA believed I canceled the loan. Why the bank believed the CDC canceled the authorization. Why evidence didn't alter institutional response. Why my documentation didn't protect me.
I had not misread the system. The system had been designed to allow this.
And once you learn to see asymmetry, you begin to see it everywhere.
INFORMATION ASYMMETRY ACROSS DOMAINS
The pattern McGee exploited wasn't unique to SBA lending. It operates across every coordination system where one party intermediates information flow between others.
PLATFORM MARKETPLACES
Platform marketplaces operate on identical architecture—and at billion-user scale.
Seller dashboard shows:
- "You earned $850 this month"
- "15% platform fee applied"
- "Customer satisfaction: 4.8 stars"
Buyer experience shows:
- "Item cost: $950"
- "Service fee: $25"
- "Seller rating: 4.8 stars"
Platform sees:
- Seller earned $850
- Buyer paid $975 ($950 + $25 fee)
- Platform captured $125 (not the $142.50 the seller believes 15% would indicate)
- Neither party sees the complete transaction
The seller believes they're paying 15% of $1,000. The buyer believes they're paying a $25 service fee. Both are correct within their information lane. Neither sees that the platform captured 12.8% of total transaction value—more than either party understood.
The architecture simply shows each party the version that keeps them participating.
Contradiction doesn't trigger investigation because there's no mechanism requiring the parties to compare their versions.
The seller assumes the buyer paid what they received plus platform fee. The buyer assumes the seller received what they paid minus platform fee. Both assumptions are reasonable. Both are incomplete.
The platform's actual extraction remains invisible through architecture that partitions information, not through fraud.
This is information asymmetry operating at scale.
EMPLOYMENT EQUITY
Venture-backed companies create identical asymmetry around employee equity.
Employee sees:
- Offer letter: "100,000 shares, 4-year vest, 1-year cliff"
- Equity percentage: "0.5% of company"
- Valuation: "$20M post-money"
Investor sees:
- Liquidation preferences: 2x on Series A, 1.5x on Series B
- Participating preferred terms
- Full dilution schedule across all financing rounds
- Anti-dilution provisions triggered by down rounds
Founder/company sees:
- Cap table with complete picture
- All side letters and amendments
- Board control provisions
- Drag-along rights in acquisition scenarios
The employee believes their 0.5% means they'll receive 0.5% of any exit value.
But the investor liquidation preferences mean: first $30M of exit goes entirely to investors, next portion split according to participating preferred terms, and only after investors recoup 2x does employee equity activate.
In a $50M acquisition, the employee's "0.5%" might be worth $250K if they calculated 0.5% × $50M, but the actual payout after the preference stack is $80K—or $0 if the acquisition price doesn't exceed the preference threshold.
The offer letter was accurate. The equity grant was real. The percentage was correct.
But the employee never saw the preference stack, never saw the side letters, never saw how liquidation would actually flow. And the company had no structural obligation to show the complete picture.
Information asymmetry allowed the employee to believe one truth while operating in another. Their equity value was determined by documents they never saw—and an architecture that didn't require anyone to show them.
TELECOMMUNICATIONS
Telecommunications reveals information asymmetry at mass scale—hundreds of millions of people experiencing partitioned reality daily, each believing their phone shows them truth.
Consumers see unlimited data, 5G coverage, no throttling, bars indicating signal strength. They believe the visual interface represents the performance they purchased. When data slows, they assume tower congestion or geographic limits—never architectural de-prioritization invisible to their device.
Carriers see something different: a full prioritization ecosystem where premium users receive priority access, budget-tier customers slow first during congestion, and "unlimited" applies only when the network is under-loaded.
The carrier can promise "unlimited" while contractually deprioritizing users because each party only sees their lane. The consumer blames the tower. The carrier manages the architecture. No rule is broken. No reconciliation is required.
Just like the McGee letters: each version is accurate within its lane, no mechanism requires cross-verification, and contradiction only appears if someone sees all three layers simultaneously.
The architecture is identical to the SBA 504 structure: three parties, separate information lanes, no reconciliation mechanism. Consumers blame tower congestion. MVNOs believe they're selling carrier-equivalent service. Carriers know "unlimited" is conditional—and have no obligation to reconcile those realities.
Just as McGee could tell the SBA one thing and the bank another, carriers can promise "unlimited" while contractually deprioritizing people—because each party only sees their lane.
This isn't a consumer protection issue. This is an architectural issue—one of the most widely lived examples of information asymmetry in the modern economy.
WHY INFORMATION ASYMMETRY PREDICTS EXTRACTION
Extraction happens through design, not through violation.
When one party sees more, knows more, controls more, decides what counts as evidence, decides what gets passed upward, decides what gets omitted—then extraction becomes a predictable structural outcome, not an anomalous event.
Information asymmetry is the mechanism through which institutional advantage compounds.
It explains why systems protect intermediaries even when evidence contradicts their claims, why vulnerable parties cannot prove harm without the system's permission, why documentation matters only when interpretation aligns with it, and why collapse is often invisible until it is irreversible.
Once I saw this architecture in my own life, I could not unsee it.
THE ECONOMICS OF HIDDEN INFORMATION
Economist George Akerlof won a Nobel Prize for documenting how information asymmetry degrades market function in "The Market for Lemons."
When sellers know more than buyers about product quality, markets collapse toward the lowest common denominator. Buyers can't distinguish good products from bad, so they're only willing to pay prices that assume the worst. Good products exit the market. Only lemons remain.
Akerlof's insight was about horizontal asymmetry—seller vs. buyer.
Coordination systems fail through vertical asymmetry.
The intermediary sits above all parties, sees more than each of them, and can extract from everyone simultaneously.
McGee knew more than the SBA (what he told the bank). He knew more than the bank (what he told the SBA). He knew more than me (what he told both institutions).
This isn't a seller hiding defects from a buyer. This is an intermediary creating separate realities for multiple parties, each of whom trusts the intermediary more than they verify with each other.
Political economists call this a principal-agent problem: when an intermediary's incentives diverge from the parties they represent, asymmetric information becomes a tool for extraction.
What I was discovering was how this theoretical problem manifests in the architecture of coordination systems themselves—and why it makes competence insufficient as protection.
WHAT COMES NEXT
Information asymmetry creates the conditions for extraction. But asymmetry alone doesn't determine outcomes—interpretation does.
The party who controls not just what information exists, but what it means, holds the power that matters most.
Chapter 4 turns to that second layer: interpretation authority—what happens when the person who controls your file also controls what your performance is allowed to prove.
The architecture I was learning to see in my own collapse was the same architecture operating across every coordination system I'd ever built inside. Understanding it would change everything about how I built next.