[ Enter Database → ]
Intelligence Synthesis · May 13, 2026
Research Brief
Investigation: MOSAIC — "Federal threat assessment system accountability gaps appear to result …"

Inference Investigation

Claim investigated: Federal threat assessment system accountability gaps appear to result from both systematic entity conflation in research and structural transparency exemptions in procurement, creating compound obstacles to oversight Entity: MOSAIC Original confidence: inferential Result: WEAKENED → INFERENTIAL

Assessment

The inferential claim is well-supported in its first component (entity conflation is a documented systematic problem for MOSAIC research, as 29 secondary facts attest) but overstated in its second component (structural transparency exemptions in procurement). While fact #14 notes procurement practices that avoid named product licensing, this is described as a 'systematic practice' that is documented only at the inferential level, not through primary contracting records. The claim's strength is that entity conflation demonstrably disperses oversight; its weakness is conflating that documented challenge with a separate, less-evidenced claim about procurement opacity, creating a compound claim that is stronger than its weakest link.

Reasoning: The inferential claim collapses two separable mechanisms into a single 'compound obstacle' framing. The entity conflation component is well-evidenced (secondary facts 5, 8, 13, 15, 16, 26, 29 document systematic research misattribution). However, the procurement transparency exemption component rests on a single secondary fact (#14) that describes a 'systematic practice' for deploying through service contracts rather than product licensing. That claim is itself inferential — no primary source contracting records are cited, and the fact itself notes this creates a 'documented transparency gap,' which is circular. The compound claim that BOTH mechanisms create 'compound obstacles' assumes synergy not independently supported. The strongest evidence for the procurement claim would be a demonstrable pattern of FPDS-NG contracts for threat assessment services that use generic descriptions rather than proprietary names — but no such analysis is presented in the established facts. Therefore the overall claim is weakened relative to what its entity-conflation component alone would support.

Underreported Angles

  • The interaction between FOIA Exemption 7(E) and specific federal procurement codes (FSC/PSC) that allow agencies to classify threat assessment software as 'other services' rather than 'automatic data processing equipment/software,' which removes the procurement from normal transparency tracking — this specific regulatory mechanism is absent from the established facts and is verifiable through the Federal Procurement Data System (FPDS-NG) product/service code analysis.
  • The role of the Federal Protective Service (FPS) within DHS as the specific operational user of the Gavin de Becker MOSAIC system in protective order proceedings — establishing exactly which agency deploys the tool (FPS, not 'federal agencies' generally) would narrow accountability targets and enable targeted FOIA requests. This specificity is absent from the established facts.
  • How the MOSAIC SEC EDGAR filings (fact #4, 6, 19) create a third distinct research hazard: even if researchers correctly identify the Gavin de Becker system, they may encounter the Mosaic Acquisition Corp. financial instrument filings and incorrectly conflate those with the threat assessment tool, creating a false trail toward financial irregularities that leads nowhere.
  • The documented absence of algorithmic admissibility challenges in protective order proceedings (fact #1, 10, 11) may be partially explained by the protective order context itself: respondents in protective order hearings rarely have legal representation adequate to mount Daubert challenges to proprietary algorithmic tools, which is a procedural access-to-justice issue not addressed in the established facts.

Public Records to Check

  • USASpending: Gavin de Becker & Associates contract searches under DHS/FPS To identify whether contracts for the MOSAIC threat assessment system appear under the vendor name 'Gavin de Becker & Associates' or 'GDBA' rather than 'MOSAIC' — confirming the procurement transparency claim requires establishing that the correct vendor name yields contracts not found under the tool name.

  • USASpending: Product/Service Code (PSC) analysis for all DHS threat assessment contracts, filtering for codes ending in '0' (services) vs '7' (IT software) To test the claim that threat assessment software is systematically classified as 'services' rather than 'IT software,' which would effectively remove it from transparency tracking that applies to named software products.

  • court records: Protective order proceedings in federal district courts (particularly D.D.C.) where Federal Protective Service is the petitioner, searching for references to 'MOSAIC' or 'threat assessment' in evidentiary motions To verify the claim about absence of algorithmic admissibility challenges — if even one federal protective order proceeding contains a Daubert challenge to the MOSAIC system, that would contradict fact #10's claim about 'comprehensive judicial precedent' being entirely absent.

  • SEC EDGAR: Mosaic Acquisition Corp. CIK #0001519459, all filings 2004-2017, specifically the August 11, 2006 multi-filing event To independently verify fact #6 about the intensive SEC regulatory activity and determine whether this was a restructuring, an offering, or a compliance event — which could reveal whether the entity conflation risk actually hides legitimate corporate behavior patterns.

  • FOIA.gov: FOIA logs for DHS/FPS searching for requests mentioning 'MOSAIC' or 'Gavin de Becker' from 2018-2024 To test the claim in fact #2 that 'FOIA Exemption 7(E)' blocks access — if no FOIA requests exist at all (not just denied ones), the gap is in researcher behavior, not agency resistance.

  • Lobbying Disclosure Act (LDA): Gavin de Becker & Associates lobbying registrations, 2000-2024, for 'homeland security' or 'protective services' issues To identify whether the vendor has lobbied for continued use of its proprietary system without validation standards, which would directly bear on the accountability gap claim.

Significance

SIGNIFICANT — The claim correctly identifies a real and serious oversight gap (entity conflation dispersing accountability for threat assessment algorithms used in coercive proceedings), but overstates the procurement transparency component. Untangling these two mechanisms matters for designing effective reform: fixing entity disambiguation (through better database tagging) addresses a different problem than fixing procurement opacity (through PSC reclassification requirements). Pursuing the compound framing could misallocate oversight resources toward procurement reforms that don't fix the entity-disambiguation problem, and vice versa.

← Back to Report All Findings →