GOBLIN HOUSE
[ Enter Database → ]
Claim investigated: The absence of SentinelOne from both direct federal contracting and lobbying activities, despite operating in a heavily regulated sector with significant government spending, represents an outlier pattern among comparable publicly-traded cybersecurity companies Entity: SentinelOne Original confidence: inferential Result: UNCHANGED → INFERENTIAL
The claim's strongest case is that SentinelOne's apparent absence from both federal contracting and lobbying is genuinely anomalous among publicly-traded cybersecurity peers like CrowdStrike, Palo Alto Networks, and Fortinet, all of which have extensive USASpending contract records and LDA filings. The strongest counterargument is that the record absence may result from methodological issues: SentinelOne may contract through resellers or subcontractors whose awards would not appear under the company's name in USASpending, or the lobbying search may have missed filings under subsidiary names or prior trade names. The claim is neither confirmed nor contradicted by current data — it is a well-posed hypothesis requiring targeted verification against primary records.
Reasoning: The claim remains inferential because: (1) USASpending.gov's search by company name alone is insufficient — federal contracts could be awarded to 'SentinelOne Inc.' under its legal name (CIK and EIN needed for reliable lookup), or potentially through subsidiaries not indexed under the parent. (2) The Lobbying Disclosure Act database (soprweb.senate.gov) requires checking not just the company's name but also any registered lobbyist firms retained by SentinelOne. (3) The assertion of an 'outlier pattern' requires a benchmark: has the researcher verified that comparable peers (CrowdStrike, Palo Alto Networks, Fortinet) DO appear in both databases? The provided facts do not include that benchmark verification. (4) The 'Unit 8200 spinout' background is relevant: Israeli-founded companies sometimes avoid direct U.S. government contracting due to ITAR/export control complexities or to maintain operational flexibility, choosing commercial/subcontractor channels instead. This is a plausible alternative explanation that weakens the 'outlier' inference without contradicting it. The claim cannot be elevated to secondary confidence without direct verification of the databases and peer benchmarking.
USASpending.gov: Search Recipient: 'SentinelOne Inc.' or 'SentinelOne' with DUNS/UEI (if known). Also search under 'Sentinel Labs' (prior corporate name). Additionally search parent awards under parent company if acquired.
Validating whether SentinelOne has any direct federal prime contracts or grant awards. If zero results persist across all legal/trade names, the absence is confirmed at the prime level.
USASpending.gov: Search prime recipient names of known SentinelOne resellers: 'Carahsoft', 'CDW Government', 'Presidio', 'Insight Public Sector', 'World Wide Technology'. Filter by product/service code for cybersecurity (e.g., 7B22, 7B23, or NAICS 541519, 541512) to find awards likely fulfilling SentinelOne contracts.
If SentinelOne's federal market access is exclusively through resellers/subcontractors, its absence from direct prime awards is explained, and the claim of 'no federal contracts' is misleading as stated.
Lobbying Disclosure Act Database (soprweb.senate.gov): Search registrant names containing 'Sentinel' (for SentinelOne). Also search for any lobbying firm retained by SentinelOne — check their own filings referencing SentinelOne as a client. Search for 'SentinelOne Inc.' as client name in quarterly filing forms.
Validates the lobbying absence claim. If no filings exist under any name or retained firm, the absence is confirmed. If filings exist, the claim is contradicted.
SEC EDGAR CIK lookup): CIK 0001583708 (SentinelOne Inc.) — retrieve all filings from 2021 IPO through current. Specifically check 10-Ks and proxy statements for disclosure of material government contracts, compliance with cybersecurity regulations, or any risk factors mentioning federal procurement.
Public companies must disclose material government contracts and material legal proceedings. The 10-K's MD&A and risk factors sections will reveal whether federal revenue is discussed — confirming or refuting the company's exposure to federal contracting.
SAM.gov / FPDS (Federal Procurement Data System): Search active and expired registrations for 'SentinelOne Inc.' or DUNS/UEI. Also check for any predecessor entities.
SAM registration is required for all federal contractors. Absence of registration confirms the company deliberately avoids the federal prime contractor path. Presence confirms past or current eligibility.
SIGNIFICANT — Resolving this pattern is significant because it bears on: (1) accountability for how cybersecurity firms access public spending — if SentinelOne has significant federal end-user adoption via resellers, the public deserves to know the scale of this channel. (2) The Unit 8200 connection raises national security questions about supply chain risk and foreign influence in U.S. government security infrastructure — understanding the company's actual federal footprint (or deliberate lack thereof) is material to this debate. (3) The lobbying absence, if real, would be a notable datum for understanding how tech companies with national security-adjacent founders navigate (or avoid) direct political engagement in Washington.