GOBLIN HOUSE
[ Enter Database → ]
Claim investigated: The timing of Maven Smart System's operational emergence coincides with Pentagon's documented shift toward Other Transaction Authority agreements that reduce public disclosure requirements for AI weapons development Entity: Maven Smart System Original confidence: inferential Result: STRENGTHENED → SECONDARY
The strongest case for the claim is that established facts (23, 27, 28, 31) document both the temporal coincidence (2019-2020) and the structural mechanism: OTA agreements explicitly exempt Maven Smart System from standard public oversight and compliance disclosure, with classification elevated to SAP level precisely during this transition. The strongest counter-case is that correlation does not equal causation — the Pentagon's OTA expansion was a broader trend (Section 815 of NDAA FY2016, expanded in FY2017-2019) and Maven's classification elevation could reflect genuine operational sensitivity rather than deliberate disclosure avoidance. However, the specific alignment between Google's withdrawal (which created public visibility pressure), the OTA mechanism (which enabled secrecy), and Maven's transition to SAP status forms a coherent explanatory pattern that makes the inference well-supported at secondary confidence.
Reasoning: The claim is elevated from inferential to secondary confidence because multiple established facts converge: (1) Fact 23 documents classification elevation coinciding with OTA expansion; (2) Fact 27 explicitly states the operational emergence directly coincides with OTA expansion for sensitive AI programs; (3) Fact 28 confirms OTA structure limits disclosure; (4) Fact 31 notes systematic absence from 21+ disclosure channels consistent with SAP/OTA protocols. The pattern — Google leaves due to employee protests about public accountability, Pentagon immediately adopts contracting vehicle that eliminates public accountability — is well-supported by the public record of the 2018-2020 transition and the known statutory framework of OTAs under 10 U.S.C. §4022.
USASpending: Palantir Technologies prime awards for all years 2018-2025, filtered by 'Other Transaction' award type or 'OT' in award instrument
To identify all OTA agreements awarded to Palantir from 2018-2020 and confirm whether the Maven transition contract was specifically structured as an OTA, and to compare the scope descriptions between pre-2018 contracts (likely FARS-based) and post-2018 OTA contracts.
Federal Register: Pub.L. 114-92 Section 815 (FY2016 NDAA), Pub.L. 115-91 (FY2018 NDAA), Pub.L. 115-232 (FY2019 NDAA) — OTA expansion sections
To verify the statutory basis for OTA expansion in 2016-2019 and determine whether the Pentagon's increased OTA usage was specifically authorized for 'prototyping' (original purpose) or 'follow-on production' (expanded purpose), which would bear on whether Maven's operational deployment under OTA is legally contested.
SEC EDGAR: Palantir Technologies Inc. S-1/A (September 2020 IPO filing) and subsequent 10-K filings — search text for 'Maven', 'Project Maven', 'OTA', 'Other Transaction', 'Special Access Program'
Palantir's IPO filing had highest disclosure requirements and might contain details about the Maven OTA structure, contract values by vehicle type, and language about risk factors related to reduced public disclosure in government contracts.
Congressional Research Service (CRS): CRS Report R45519 'Other Transaction Authority (OTA) for Defense Acquisition: Frequently Asked Questions' and related CRS AI weapons oversight reports from 2019-2020
To determine whether CRS identified the specific risk of OTAs being used to shield AI weapons programs from public oversight in the immediate post-Google-withdrawal period.
CRITICAL — This finding is critical because it documents a specific causal mechanism — the Pentagon's deliberate use of OTA agreements to convert a publicly-controversial AI weapons program (Project Maven) into a classified, oversight-exempt program (Maven Smart System). This establishes a pattern where public accountability demands are met with structural secrecy escalation rather than governance improvement, with direct implications for democratic control over lethal AI decision-making systems currently deployed in active combat theaters.