01 / Launch briefing

Agentic Secure Group

The first question is not what the model can do.It is where the work breaks.

ASG exists for the moment when legal, security, and delivery stop nodding along and start asking different questions about the same system. The first briefing gets the work framed once. After that, the right company owns the next move.

The team behind ASG includes a former Marine Corps judge advocate and a NeurIPS-published machine learning engineer who built the AI evaluation methodology that AISF now publishes.

15-minute call. No pitch. No retainer required.

Legal review

Can anyone explain what the system sees, cites, stores, and returns without hand-waving?

Security review

Can the team say where it runs, who controls it, and what evidence exists before it ships?

Real deployment

Can operators inherit it without rebuilding the environment or rewriting the workflow from scratch?

Procurement fit

Does the contract vehicle accommodate the cost model, performance period, and scope? Who signs first — prime, CO, or customer?

How the five-company model works

ASG is the routing layer in front of five specialist operators. That split is deliberate: legal trust, governance, model work, product delivery, and constrained deployment should not collapse into one vague AI shop story.

MRI

Defense / Intelligence

IC and defense work with cybersecurity, CMMC, or restricted-environment deployment requirements

IPSA

Legal / Compliance

private legal AI

AISF

Standards / Certification

standards and governance

ASI

Engineering / Infrastructure

IP development and AI product innovation

Agent Xero

Software Engineering / Full-Stack Development

application delivery

5Operating companies with distinct roles
6Entry lanes matched to stakeholder pressure
1Front-door briefing before ownership branches
ExplicitLead responsibility stays visible after handoff
THE PROBLEMSTANFORD LAW RESEARCH

In regulated environments, the review gate matters more than the demo

Published legal-AI research shows that hallucination risk remains material even in tools marketed as reliable. In high-consequence settings, questions about data boundaries, citation integrity, and auditability surface before a pilot becomes production.

The studies cited here are specific to legal tasks, not every AI workflow. But they illustrate the broader review problem: stakeholders will ask where the system runs, how outputs are grounded, and what evidence exists when the answer matters.

Fig. 1 — Peer-reviewed legal AI hallucination ranges

General-purpose legal query testing

58%-88%

ChatGPT 4 to Llama 2 · Specific, verifiable questions about random federal court cases

Dahl et al., 16 J. Legal Analysis 64 (2024)

Legal research tools using RAG

17%-33%

Lexis+ AI and Thomson Reuters tools · Preregistered evaluation of legal research queries

Magesh et al., arXiv:2405.20362 (Stanford CodeX Lab, 2024)

Published peer-reviewed ranges are shown here. This page does not publish an internal ASG benchmark or generalize these results beyond the tasks those studies actually tested.

ASG responseBuild for the constraints

Our response

Build for the constraints, not around them

Data sovereignty by architecture

Private cloud, on-prem, and isolated deployment patterns are part of the menu when the environment requires tighter control.

Confidence-gated outputs

High-stakes workflows can route low-confidence or source-conflicted outputs into human review instead of straight to action.

Compliance as a first-class requirement

Frameworks such as NIST AI RMF, ISO/IEC 42001, and CMMC can shape logging, review, and evidence design early instead of appearing as retrofit work.

Domain adaptation, not prompt tricks

Supervised fine-tuning and other task-specific adaptation methods belong on the table when prompt scaffolding alone will not survive review.

See the stakeholder paths ↓
Comparative modelDefault vendor choices vs ASG

How we build differently

Most vendors make the convenient architectural choice. In regulated environments, that is usually the choice that gets blocked later. This is where our build decisions break from the default.

Six places we part ways with the default build

Model architecture

Others: Generic hosted model plus prompt scaffolding

ASG: Task-specific model adaptation and evaluation when the workflow demands it

Data residency

Others: Sensitive processing outside the boundary your reviewers prefer

ASG: Private cloud, on-prem, or isolated deployment paths when the environment requires them

Deployment model

Others: Vendor-defined SaaS path with provider-managed updates

ASG: Cloud, on-prem, or isolated deployment options shaped to the review context

Hallucination handling

Others: Post-hoc disclaimers after the answer is already out

ASG: Grounding, citations, abstention, and human review where the workflow requires it

Security posture

Others: Shared-tenancy defaults plus perimeter controls

ASG: Private deployment patterns, segmentation, and review-driven security controls

Engagement model

Others: Separate sales motion from the people who ship

ASG: Technical scoping with the team responsible for implementation

02 / Decision scenes

See the briefing take shape before you open it.

Each route strips away the rest of the corporate story and shows the exact kind of conversation that should happen next.

Six entry lanes

Stakeholder path distribution — radar chart showing coverage across IC/Defense, Legal, Security, Product, Partners, and General intake

Coverage distribution

Each path represents a different pressure point and review context. The radar shows how capability and complexity distribute across the six entry lanes — no single entity covers everything, and that is the point.

6stakeholder lanes
5specialist operators
1front-door briefing

IC and defense program leaders

Open full path

Will this survive mission, security, and deployment review?

Program leads, mission owners, and security officers trying to scope AI, cybersecurity, or CMMC work for IC and defense environments.

Likely lead

MRI

Mojave Research Inc.

MRI leads when the work sits inside IC or defense programs and carries cybersecurity, CMMC, or controlled deployment requirements.

Visit lead site

What gets blocked first

The conversation usually stalls when security, infrastructure, and mission owners realize the pilot never answered where the model runs, who operates it, and what happens when connectivity disappears.

What has to be true

The system has to match the environment: private when needed, controlled when required, air-gapped when the program demands it, and accountable enough to survive scrutiny after deployment.

Why ASG first

ASG keeps the first call from splitting into parallel threads. The work gets framed once, then MRI owns the part that belongs inside IC and defense delivery.

What gets sorted first

ASG gets mission owners, security stakeholders, and technical constraints aligned before scoping starts.

Primary concerns

  • IC / mission fit
  • Controlled deployment
  • CMMC readiness

Proof in context

Operating signal

MRI's public site lists Reston, VA, CAGE 10S34, and CMMC Registered Practitioner status and frames its work around cybersecurity, controlled delivery, and restricted environments.

Build path

When the program needs model adaptation or private infrastructure, ASI joins the backbone instead of forcing a one-shop story that does not match the work.

Application layer

Operator tools or mission-facing interfaces shift the handoff toward Agent Xero without changing MRI's lead on the constrained environment itself.

Typical next move

Start with ASG. MRI leads the first scope for IC and defense work that includes cybersecurity, CMMC, or restricted-environment deployment requirements, then pulls in ASI or Agent Xero only where the build requires it.

ASI joins when model adaptation, evaluation, or private infrastructure are part of the job. Agent Xero joins if operator tooling or application delivery is in scope.

Best to bring

  • Target environment
  • Security or accreditation constraint
  • What has to work in the field
Read the full path

03 / Ownership ledger

One briefing. Then the right company owns the next move.

ASG is the coordination layer at the front of the conversation. The operating companies remain distinct so ownership stays clear instead of collapsing into one vague generalist offer.

ROUTING TRIGGER — WHAT YOU BRING TO THE BRIEFHANDOFF01Program operates in cleared or controlled environmentMRIIC & DEFENSE02Work involves legal privilege risk or matter-level AIIPSALEGAL AI03Brief requires governance posture or framework alignmentAISFGOVERNANCE04Solution requires model adaptation or AI product workASIPRODUCT05Deliverable is a software product or automated workflowAgent XeroAPPLICATIONS
02

Mojave Research Inc.

IC and defense work with cybersecurity, CMMC, or restricted-environment deployment requirements

When it leads

The work lands in IC or defense and carries cybersecurity, CMMC, or controlled deployment requirements.

Where others join

ASI joins for model and infrastructure work. Agent Xero joins if operator tooling or application delivery enters scope.

Visible proof

MRI's public site lists Reston, VA, CAGE 10S34, and CMMC Registered Practitioner status. It also says cleared personnel for delivery are confirmed during contracting and highlights secure-enclave and air-gapped delivery environments.

Visit site
03

IPSA Intelligent Systems Inc.

private legal AI

When it leads

The immediate question is legal usefulness under private control, with privilege and review trust still intact.

Where others join

ASI joins only when the legal workflow needs deeper private infrastructure, hardening, or model integration work.

Visible proof

IPSA's public site positions private-cloud or on-prem legal AI for research and matter workflows, with coaching and evaluation up front and source-grounded outputs at the core of the product story.

Visit site
04

AI Security Foundation

standards and governance

When it leads

The first blocker is governance posture, control language, or the assurance story around the system.

Where others join

MRI and ASI join when the conversation moves from standards into implementation, validation, or operational hardening.

Visible proof

AISF was formally incorporated as a 501(c)(6) in November 2025. It houses the AI security standards work already underway through MRI's IC and defense engagements, and is building an AI Security Controls Matrix mapped to NIST AI RMF, MITRE ATLAS, ISO/IEC 42001, and OWASP guidance. Manbir Gulati, founding director and president, authored the AI evaluation methodology AISF now publishes as open standards.

Visit site
05

Agentic Secure Inc.

IP development and AI product innovation

When it leads

The hard part lives in model behavior, private infrastructure, training pipelines, or deployment architecture.

Where others join

Agent Xero joins when the system also needs a product surface, operator workflow, or application delivery track.

Visible proof

ASI is the IP development and innovation engine within the ASG operating model — taking ideas into top-end AI products, owning the intellectual property, and building the systems that move from concept into production-grade delivery.

06

Agent Xero

application delivery

When it leads

The pressure is on the application layer: operator UX, product logic, shipping cadence, or full-stack delivery.

Where others join

ASI joins when the application depends on deeper model and infrastructure work underneath the product surface.

Visible proof

Agent Xero's public site centers private software delivery, code review, and custom builds for teams that need product and application execution rather than infrastructure work alone.

Visit site
Domain
MRI
IPSA
AISF
ASI
Xero
Defense / IC delivery
·
·
·
·
Legal AI (privilege-safe)
·
·
·
·
AI standards & assurance
·
·
·
·
Agentic systems / AIOPS
·
·
·
Automated ops & workflow
·
·
·
·
Compliance framing
·
·

Fig. 2 — Operating entity coverage by domain. Filled = primary lead. Dot = supporting role.

The split is deliberate. One front-door briefing is useful only if the ownership after that briefing is unmistakable.

Review supporting materials

04 / Briefing questions

Questions people ask before they open the gate

The point of the first briefing is to clarify ownership and next steps quickly, not to perform a long generic discovery ritual.

01

Initial contact

One email or form submission — no intake form, no pre-qualification.

02

ASG reads the context

Ownership, data constraints, and delivery model are assessed before a reply.

03

Entity handoff

The right operating company takes the next call — MRI, IPSA, AISF, ASI, or Agent Xero.

04

Delivery begins

Lead responsibility stays visible. No repeat briefings required.

01

Why is this structured as five separate companies?

Because the same system can simultaneously be a legal liability, a security boundary, and a procurement challenge — and no single generalist handles all three without diluting one of them. The five-entity model exists so the attorney reviewing privilege risk and the engineer building the deployment control don't report to the same commercial incentive. When ownership is explicit, accountability is explicit. That is what makes the handoff defensible. Each entity carries distinct authority, liability, and expertise. A defense contractor under CMMC obligations cannot share compliance scope with a legal AI firm whose privilege controls must stay inside the firm. A standards body whose credibility depends on independence cannot also be the operator selling systems against those standards. The five-entity structure is the answer to a structural conflict problem, not a holding company with divisions. Each entity — MRI, IPSA, AISF, ASI, and Agent Xero — is separately responsible for its own work, its own compliance, and its own delivery.

02

Why start with ASG?

Because the hard part is rarely the demo. It is getting the right reviewers into the same conversation before the work stalls. ASG organizes that first read and routes the next call cleanly.

03

Do I need to pick the right entity myself?

No. Use the path that feels closest, or use the general path if the lane is mixed. ASG sorts out who should lead, who should support, and who needs to be on the next call.

04

Does ASG replace the operating companies?

No. MRI, IPSA, AISF, ASI, and Agent Xero remain responsible for their own work. ASG handles the first read and the handoff.

05

Who handles IC, defense, or restricted-environment AI?

Mojave Research Inc. leads IC and defense work with cybersecurity, CMMC, and restricted-environment deployment requirements. Its public site lists CMMC Registered Practitioner status and notes that cleared delivery is confirmed during contracting.

06

Who handles private legal AI?

IPSA Intelligent Systems Inc. leads private legal AI matters where privilege, firm control, and matter-specific workflow design are non-negotiable.

07

Who handles AI governance and standards?

AI Security Foundation handles standards, control language, and assurance framing. When the work turns operational, MRI and ASI step in where needed.

08

What does ASI do behind the scenes?

Agentic Secure Inc. is the IP development and innovation engine — it takes ideas into top-end AI products, owns the intellectual property, and builds the systems that move from concept into production-grade delivery.

09

Does MRI hold CMMC practitioner status?

Yes. Mojave Research Inc. lists CMMC Registered Practitioner status on its public site. Specific assessment scopes, certification levels, and cleared delivery arrangements are confirmed at the contracting stage rather than in the briefing phase.

10

What is the CAGE code for the defense entity?

Mojave Research Inc. holds CAGE code 10S34 and is based in Reston, VA. Federal buyers and primes can use this to verify MRI's entity registration in SAM.gov before engaging.

11

How does ASG engage on federal programs or contract vehicles?

MRI is the operating entity for federal and defense work. Engagement path, contract vehicle, and scope — including CUI handling, controlled environment requirements, and compliance obligations — are confirmed during the briefing and contracting phase. Use the defense path or the general path to start.

12

What about Controlled Unclassified Information and data handling?

CUI handling requirements are addressed at the contracting level with MRI. When a program carries CUI, ITAR, or other controlled data obligations, MRI handles the scope and delivery model. Raise it in the briefing so the right operating entity can confirm the arrangement.

13

What does a briefing cost?

The initial briefing is a working conversation, not a sales call — there is no charge for the first session. Engagements are scoped and priced after the briefing, when the right entity has been identified and the work is defined. MRI works on government contract vehicles and T&M arrangements; IPSA and Agent Xero typically work on fixed-scope retainers.

14

How long does a typical engagement run?

The briefing itself runs 30–60 minutes. From there, timelines depend on the entity and the work: IPSA legal-AI evaluations are typically scoped over 4–8 weeks; MRI security and deployment engagements follow program timelines. The first output is a clear decision — not a discovery phase that extends indefinitely.

15

How do you handle sensitive or potentially classified information?

The briefing operates at the unclassified level and does not require sharing controlled information to frame the problem. If the work requires controlled or classified environments, MRI leads delivery with cleared personnel and private infrastructure. Specific access arrangements are confirmed at the contracting phase.

16

Do I need a clearance to brief with ASG?

No. The first conversation is unclassified. If the program has clearance requirements, bring them to the briefing — MRI will address them in the engagement structure.

17

Can you work alongside our existing vendors or prime contractor?

Yes. The routing model is designed to insert cleanly into existing team structures, not to displace them. MRI, IPSA, and the other entities can operate as subcontractor, teaming partner, or independent assessor depending on the contract vehicle and scope.

Next step

Bring the live problem in as it is.

ASG sorts the lane, the ownership, and the next move. The right company takes it from there.

Review briefing materials

— end of brief. next steps below.

What happens when you reach out

You will not get routed through layers of qualification before the real team shows up. The first response comes from people who can test fit, scope the work, and pull in whoever should own it.

One good briefing. Clear ownership after that.

No repeat briefings. No guessing who owns the next move.

How it works

  1. 01

    Brief the problem

    what has to work, what has to stay inside your boundary

  2. 02

    Direct response

    from people who can scope the work and pull in the right team

  3. 03

    Lead team + build path

    owner, deployment model, and supporting teams

  4. 04

    Clear next move

    proposal, follow-on briefing, or direct introduction