GOBLIN HOUSE
[ Enter Database → ]
Claim investigated: The absence of accession numbers in purported NSO Group SEC filings indicates either compromised source data or fabricated records, as legitimate EDGAR filings always include unique accession numbers Entity: NSO Group Original confidence: inferential Result: WEAKENED → INFERENTIAL
The claim that 'absence of accession numbers indicates fabricated records' is possible but overstates certainty. Legitimate EDGAR filings do always include accession numbers, but the absence could also result from: (1) the filings being manually entered test submissions or exhibits (e.g., Form 13F-HR exhibits that lack accession numbers), (2) the data being scraped or cached from a non-official source that stripped accession numbers, or (3) the filings being related to NSO Group's U.S.-based subsidiaries or investment vehicles that may use different identifiers. The strongest case against fabrication is that the SEC's EDGAR system itself validates accession numbers at submission, making non-accessioned 'filings' procedurally impossible as official submissions. A controlled search of EDGAR's Full-Text database and CIK index would definitively resolve this.
Reasoning: The claim asserts a definitive inference (fabricated records) from an absence that has plausible alternative explanations. Without proof that the source database (unidentified) correctly extracted accession numbers, or verification that the listed filings (by form type and date) exist in EDGAR's live system, the claim cannot be elevated. A primary-confidence assessment would require direct confirmation via EDGAR's API or public index search.
SEC EDGAR: Search EDGAR Full-Text for 'NSO Group' and 'Q Cyber Technologies' under all form types (including 13F, ADV, K, S-1, D) from 2021-01-01 to 2026-12-31
Would confirm whether any filings with these exact entity names exist with valid accession numbers, definitively verifying or falsifying the source data
SEC EDGAR: Search EDGAR CIK Index for CIK numbers 0001950881 (possible NSO-related entity) and check filing history
CIK-based search bypasses name-based query issues and shows all filings by that filer, including accession-number metadata
SEC EDGAR: Search for Israeli defense/spyware companies' U.S. subsidiaries: Verint Systems (0001002127), Palo Alto Networks (0001327567), NICE Ltd (0001003935) - cross-reference if NSO appears in their filings as an acquired entity or joint venture
NSO Group may file secondary filings as a subsidiary of a U.S.-listed parent company, which would explain fragmented EDGAR records
Lobbying Disclosure Act database: Search Senate LDA database for 'NSO', 'Q Cyber', 'Pegasus' from 2015-2025, and cross-reference with filer employer names of Israeli government lobbying firms (e.g., Arnold & Porter, Squire Patton Boggs)
Would confirm whether any U.S. lobbying activity occurred on behalf of NSO, and whether indirect representation explains the zero-disclosure finding
CRITICAL — If the claim of missing accession numbers is true, it would reveal either systematic data fabrication or a critical flaw in how EDGAR data is being scraped and presented as evidence. Since the original source is claimed to show SEC filings for a sanctioned foreign intelligence contractor, verifying the integrity of those filings is essential before any investigator or journalist acts on the data. This directly affects the reliability of all downstream inferences about NSO Group's U.S. financial footprint.