PETRONELLA INDUSTRIES / DEFENSE ROBOTICS

Robotics fordefense and DIB primes

DFARS 252.204-7012·CMMC L2·ITAR-aware

THREAT MODEL
Adversary-aware
COMPLIANCE FIT
RPO #1449
NC OPERATOR
Raleigh, NC
One-hour response · NC team · No hard sell
CMMC-AB RPO #1449 | DFARS-aware | ITAR-aware | NC team
The Buyer's Environment

The Landscape We Serve Into

Defense robotics work does not happen in a generic R&D environment. It happens inside a layered procurement stack with Controlled Unclassified Information at the center and a regulator behind every decision. This page describes that landscape from the buyer side - what a Phase II SBIR program manager, a DIB prime subcontract administrator, or an Air Force Research Laboratory principal investigator actually has to plan around when they bring a robotics partner into their data plane.

Honest novelty disclosure. Robotics is a new practice area at Petronella Technology Group. The cybersecurity, CMMC compliance, and private artificial intelligence infrastructure under it have been operational for more than two decades. We are bringing a 24-year cyber and compliance foundation to a younger robotics engineering surface, not the other way around. We say that out loud on every page.

The defense robotics buyer is rarely a single role. On a typical engagement we coordinate with a program manager who answers to a contracting officer, a principal investigator who answers to a research director, an information system security manager who answers to an authorizing official, and a contracts office that answers to legal counsel. Every one of those roles has a different tolerance for risk, a different timeline, and a different vocabulary for the same robotics deliverable. The work of an honest defense robotics partner starts with translating between them before a single line of code is written.

Controlled Unclassified Information sits at the center of every decision. CUI is the federal designation for information that is not classified but still requires safeguarding under federal law, regulation, or government-wide policy. It has subcategories - export-controlled, privacy, proprietary, intelligence, and dozens more - and a defense robotics dataset can carry several at once. A teleoperation log paired with a sensor stream paired with a payload geometry can become export-controlled CUI under the International Traffic in Arms Regulations the moment it touches a regulated subsystem. The handling rules cascade down to every contractor and subcontractor in the chain.

The procurement vehicles that fund defense robotics work also shape the landscape. Small Business Innovation Research and Small Business Technology Transfer grants are the most common entry path for a new robotics capability - a Phase I feasibility study at modest dollar value, a Phase II prototype at substantially higher dollar value, and a Phase III commercialization track that can run for years against a sole-source contract. The Defense Innovation Unit runs a parallel commercial-solutions opening process. The Air Force Research Laboratory, the Army Research Laboratory, the Office of Naval Research, and the Defense Advanced Research Projects Agency each fund directly into university and industry teams under their own contracting structures. A partner who does not understand which vehicle is paying for the work cannot scope it correctly.

Geography matters more than the industry usually acknowledges. North Carolina sits inside one of the densest defense and intelligence corridors in the country. Fort Liberty (the rebranded Fort Bragg footprint) is the largest United States Army installation by population. Seymour Johnson Air Force Base, Camp Lejeune, Cherry Point Marine Corps Air Station, and Pope Army Airfield anchor a Triangle-to-coast network of operational commands. Research Triangle Park hosts a deep bench of defense subcontractors, and our state's universities - North Carolina State, Duke, the University of North Carolina, and North Carolina A&T - have active Department of Defense research programs in autonomy, manipulation, perception, and human-robot teaming. We work in this corridor because we live in it.

The cost of a misstep is asymmetric. A non-defense robotics prototype that ships with a privacy bug becomes a customer-service problem. A defense robotics prototype that ships with a CUI handling gap becomes a contract-default problem, a flow-down problem at every prime above us, and possibly a reportable cybersecurity incident under DFARS. We engineer for that asymmetry from the first kickoff meeting.

Use-Cases Active In This Vertical

Where Defense Robotics Research Is Funded Right Now

These are publicly-documented research programs and lines of effort that shape the defense robotics market. Citations point to the program offices and authorities that publish them. We list them as the literature we read - not as engagements we have personally delivered.

DARPA Autonomy

OFFSET and the swarm autonomy line

The Defense Advanced Research Projects Agency's Offensive Swarm-Enabled Tactics program funded research into swarms of small unmanned systems coordinated through human-on-the-loop tactics interfaces. The published program overview is at darpa.mil/program/offensive-swarm-enabled-tactics. The OFFSET sprints are public-record engineering deliverables that any defense robotics team should be able to read and learn from, even if their own work is downstream of that program.

Adjacent autonomy programs we track include the Robotic Autonomy in Complex Environments with Resiliency line of effort, the Squad X interaction line, and the Air Combat Evolution program. Each one has a different scope but the same core research thesis: how does a human team retain decision authority over an increasingly autonomous robotic teammate.

DARPA AI Next

AI Next Campaign and third-wave autonomy

DARPA's AI Next Campaign, documented at darpa.mil/program/ai-next-campaign, frames a transition from second-wave statistical learning toward third-wave contextual adaptation. For defense robotics that means policies and value functions that can reason about a changing environment without retraining the entire model from scratch. It is the research backdrop for a generation of vision-language-action models that defense PIs are starting to evaluate against constrained edge hardware.

JAIC / CDAO

JAIC and the Chief Digital and AI Officer line of effort

The original Joint Artificial Intelligence Center stood up enterprise artificial intelligence pilots across the Department of Defense. Its successor - the Chief Digital and Artificial Intelligence Office - now coordinates a department-wide artificial intelligence strategy that includes robotics-adjacent capabilities. Public reporting on these programs is consolidated through the Department of Defense Chief Information Officer library at dodcio.defense.gov/Library.

ARL Autonomy

Army Research Laboratory autonomy research

The Army Research Laboratory funds long-running autonomy research lines through its Distributed and Collaborative Intelligent Systems and Technology Collaborative Research Alliance and successor programs. Their published research focuses on multi-agent coordination, contested-environment autonomy, and human-robot teaming under degraded communications. The work is openly cited and frames how robotics primes scope follow-on prototype work.

SBIR / STTR

Small Business Innovation Research robotics topics

Small Business Innovation Research and Small Business Technology Transfer topics under the Department of Defense regularly call for robotics, autonomy, and human-robot teaming prototypes. The canonical entry point is sbir.gov. Phase II awards in the seven-figure range are routinely cited in defense industry trade reporting; we track those topics as a leading indicator of what a defense robotics buyer will be scoping over the next eighteen months.

DIU CSO

Defense Innovation Unit commercial solutions openings

The Defense Innovation Unit runs a Commercial Solutions Opening process that buys commercial technology against operational defense problems on a faster contracting timeline than traditional acquisition. Robotics, autonomy, and human-machine interface opportunities are routinely on the active CSO list. The DIU process is a different procurement vehicle than SBIR but the regulatory floor - DFARS, CMMC, ITAR-awareness - is the same.

We list these programs as the literature that frames the buyer's vocabulary. We do not claim engagements we have not delivered. When we describe what Petronella Technology Group brings to the conversation, the verifiable surface is the cybersecurity, compliance, and private artificial intelligence infrastructure - not a pretend track record on these specific programs. That distinction is the entire point of the honest novelty framing on this page.

Compliance Terrain

The Regulators Behind Every Defense Robotics Engagement

CMMC, DFARS, NIST, and the export-control regime are not optional reading for a defense robotics partner. The frameworks below are the day-one floor of any conversation we have with a Department of Defense Industrial Base buyer.

CMMC Final Rule (32 CFR Part 170)

The Cybersecurity Maturity Model Certification program was finalized in the Federal Register on October 15, 2024 (32 CFR Part 170). The published rule is at federalregister.gov. CMMC creates three certification levels with rolling enforcement on Department of Defense contracts. Level 1 covers Federal Contract Information only. Level 2 covers Controlled Unclassified Information and aligns with NIST Special Publication 800-171. Level 3 adds advanced controls drawn from NIST Special Publication 800-172.

  • Level 1 (Foundational): FCI scope, self-assessed
  • Level 2 (Advanced): CUI scope, third-party assessed by C3PAO
  • Level 3 (Expert): CUI plus advanced persistent threat, government-led assessment

Petronella consults across all three CMMC levels. Defense robotics work routinely sits at Level 2 because the Controlled Unclassified Information surface is the controlling factor.

DFARS 252.204-7012 and the cyber-incident clauses

The Defense Federal Acquisition Regulation Supplement clause 252.204-7012, "Safeguarding Covered Defense Information and Cyber Incident Reporting," is the contract-flow-down clause that pulls every covered subcontractor into the same set of safeguarding obligations. The canonical text lives at acquisition.gov/dfars/252.204-7012. Companion clauses 252.204-7019 and 252.204-7020 require an NIST SP 800-171 self-assessment score in the Supplier Performance Risk System and the right of the government to assess that score.

NIST SP 800-171 r3

National Institute of Standards and Technology Special Publication 800-171 Revision 3, "Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations," is the canonical control baseline that CMMC Level 2 implements. The final version was published in May 2024 and lives at csrc.nist.gov/pubs/sp/800/171/r3/final. Revision 3 reorganized the family structure and added overlay support for tailored implementations - a non-trivial migration for any contractor coming off the Revision 2 baseline. Defense robotics prototypes that touch CUI will be assessed against this revision.

NIST SP 800-218 SSDF

The Secure Software Development Framework, NIST Special Publication 800-218, codifies practices for producing secure software across the development life cycle. The publication is at csrc.nist.gov/pubs/sp/800/218/final. For a defense robotics prototype the SSDF guidance maps directly into how we structure the build pipeline, the dependency review, and the artifact-signing posture for any code that becomes a contract deliverable.

ITAR and EAR awareness

The International Traffic in Arms Regulations and the Export Administration Regulations together govern export-controlled defense articles, services, and dual-use technology. We are ITAR-aware - we recognize when a robotics dataset, payload geometry, or sensor stream crosses into United States Munitions List territory and we route the conversation to qualified export-control counsel before any technical work proceeds. We are not an export-control compliance shop and we do not pretend to be. The recognition floor is the deliverable.

CISA SBOM and supply-chain transparency

The Cybersecurity and Infrastructure Security Agency's Software Bill of Materials guidance, at cisa.gov/sbom, is the operational standard for documenting the components that ship inside a software deliverable. Defense robotics prototypes pull in open-source robotics middleware, machine learning frameworks, and third-party libraries; an SBOM is the artifact that lets a contracting officer verify the supply-chain posture of what we ship. Petronella generates SBOMs as part of every engagement deliverable.

The frameworks above interlock. CMMC L2 cites NIST SP 800-171 r3. DFARS 252.204-7012 references NIST SP 800-171 directly. CMMC L3 cites NIST SP 800-172. The CISA SBOM guidance is referenced inside emerging federal acquisition language. Treat them as one ecosystem, not as six separate audits, and the engagement gets simpler. Buyers who want the deeper compliance-only conversation can read the CMMC compliance pillar.

What Petronella Brings

A 24-Year Cyber Foundation Under A New Robotics Practice

The credible part of the value proposition is the foundation, not the novelty. Petronella Technology Group was founded in 2002, holds a Better Business Bureau A+ rating since 2003, and is a CMMC-AB Registered Provider Organization (RPO #1449, verifiable at cyberab.org/Member/RPO-1449). Founder Craig Petronella holds CMMC-RP, CCNA, CWNE, and a North Carolina Licensed Digital Forensics Examiner credential (DFE #604180). The full team is CMMC Registered Practitioner certified. That credential stack is what defense buyers actually verify before they sign a non-disclosure agreement.

The infrastructure side is what most robotics shops do not bring. Petronella operates a private artificial intelligence cluster on owned NVIDIA Elite Partner Channel hardware (DGX-class, HGX-class, and RTX PRO compute, located in our Raleigh data plane). Robotics policies, vision-language-action models, and reinforcement-learning workloads can be trained and inferenced entirely on infrastructure that we own. No public cloud is required and no client data has to leave a defined enclave. Read the full architecture at private artificial intelligence solutions.

The robotics side is operational and small. We acquired a Reachy Mini - the open-source desktop expressive humanoid built by Pollen Robotics and acquired by Hugging Face in April 2025 - and run it in our Raleigh, North Carolina lab. Reachy Mini is the entry hardware platform for a research program that builds on the open-source Hugging Face LeRobot stack. Hardware specs, software stack, and the lab posture live on the Reachy Mini hardware page. We are participants in the LeRobot open-source ecosystem and we own the Reachy Mini in our lab. We do not claim a Pollen Robotics partnership we have not been granted.

The deliverable that ties cyber, compliance, and robotics together is what defense buyers cannot find anywhere else in the market. Most custom-robotics-development shops are platform specialists who do not market a CMMC posture. Most CMMC consultants do not run a robotics lab. Petronella sits in the intersection - cyber foundation, compliance fluency, private artificial intelligence compute, and an operational robotics workbench - and that is the wedge we offer to a defense robotics buyer who needs all four under one engagement contract. The pillar pages that anchor each of those four legs are cybersecurity, CMMC compliance, private artificial intelligence, and Reachy Mini hardware.

Engagement Archetypes We Offer

Three Shapes A Defense Robotics Engagement Takes

These are templates we offer, not engagements we have personally delivered for a named defense client. The shape is the deliverable; the sponsoring program is the buyer's to bring.

ARCHETYPE 01

SBIR Phase II demo prototype

A small business with a Phase I award contracts Petronella to scope, build, and document a prototype that satisfies the Phase II milestone schedule. The deliverable stack is the architecture document, the working hardware-and-software demo, the security plan that maps to NIST SP 800-171 r3, the Software Bill of Materials, and the technical narrative the program manager can defend at the Phase II review. We coordinate on the contracting officer's schedule and we do not invent timeline. The buyer keeps the intellectual property; we ship documentation that survives a Phase III award conversation.

ARCHETYPE 02

Secure teleoperation study

A research-grade teleoperation prototype that lets a remote operator drive a robotic platform across a constrained network with controlled-latency video, redundant command channels, and full audit logging of every operator-issued command. Built on the open-source Hugging Face LeRobot stack and the Reachy Mini hardware platform in our Raleigh lab; designed so the architecture can transplant onto a larger client-owned platform. Threat model, secrets handling, and audit-evidence stack are deliverable artifacts, not afterthoughts.

ARCHETYPE 03

On-prem agent integration

A defense buyer with an existing autonomy platform contracts Petronella to integrate an on-premises artificial intelligence agent layer - vision-language-action policies, retrieval-augmented planning, or a reasoning module - that runs entirely on client-owned compute. The artifact stack includes the integration architecture, the data-plane diagram, the secrets vault topology, the audit-logging configuration, and a tabletop-tested incident response runbook. No client data moves to a public cloud at any phase of the engagement.

Each archetype is scoped on a time-and-materials or fixed-phase basis. We do not publish defense pricing on this page because procurement realities for a Department of Defense Industrial Base buyer differ from a commercial conversation; we discuss scope and cost on a call. What is fixed across all three archetypes is the security-and-compliance overlay - CUI handling, secrets vault, audit logging, and a documented authorization-to-operate posture - regardless of which shape the engagement takes.

For a parallel view of the deliverable side of any of these shapes, see the robotics prototyping solutions page which describes the engagement phases in more detail.

Security & Data-Handling

How Defense Data Is Handled Inside Our Plane

Defense robotics work involves Controlled Unclassified Information almost by default. The handling stack below is the floor we run for every defense engagement, not a premium add-on.

  • CUI scoping and marking

    Every dataset, document, model artifact, and code repository inbound from the buyer is reviewed for Controlled Unclassified Information markings on receipt. Anything that arrives unmarked but is plausibly CUI is treated as CUI until the buyer confirms otherwise. CUI subcategories - export-controlled, privacy, proprietary, intelligence - are tracked separately because the handling rules differ.

  • On-prem inference and training

    Robotics policies, vision-language-action models, and reinforcement-learning workloads execute on Petronella-owned GPU compute located in our Raleigh data plane. No public cloud inference path exists for defense engagements. The private artificial intelligence cluster is described in detail at private artificial intelligence solutions.

  • Secrets vault and key management

    API keys, signing keys, certificate material, and client-supplied credentials live inside an audited secrets vault with role-based access control and short-lived token issuance. Secrets never appear in source-control history; commit-time scanning blocks accidental disclosure. Vault telemetry feeds the same security operations pipeline that handles incident detection.

  • Audit logging and immutable evidence

    Every privileged action - vault access, model artifact retrieval, deployment command, teleop session start - writes to a tamper-evident audit log retained for the duration of the engagement plus the contractually required retention window. The evidence stack is designed to satisfy the recordkeeping expectations of a CMMC Level 2 assessment.

  • SBOM and supply-chain hygiene

    Every deliverable ships with a Software Bill of Materials in a CISA-aligned format. Open-source dependencies are pinned to specific versions and continuously scanned for new vulnerabilities. The dependency review pipeline is documented as part of the secure software development framework alignment we maintain per NIST SP 800-218.

  • Incident response and DFARS reporting

    If a covered cyber incident touches a defense engagement, our response runbook is pre-aligned to DFARS 252.204-7012 reporting timelines. Tabletop exercises rehearse the notification path before any real incident lands. We are a forensics-capable shop - the same digital forensics team that supports active investigations sets the response posture for our defense clients.

How We Work With Defense

Procurement Vehicles And Engagement Mechanics

Defense procurement is not commercial procurement. We coordinate around the buyer's contracting structure, not the other way around. Petronella works as a subcontractor to a Department of Defense Industrial Base prime, as a teaming partner to a small business preparing a Small Business Innovation Research proposal, as a direct contractor against a Defense Innovation Unit Commercial Solutions Opening, and as a research subcontractor to a university principal investigator funded by an Air Force Research Laboratory or Army Research Laboratory grant. Each of those vehicles has its own contracting clauses, its own flow-down language, and its own milestone calendar. We read those documents before we scope work.

Communications posture defaults to non-classified, NIPRNet-aware coordination. We do not host a sensitive compartmented information facility. For defense engagements that need above-controlled-unclassified handling, we coordinate with the buyer's authorizing official and route work to the buyer's own classified environment. The wedge we own is the regulated-but-unclassified slice of the defense robotics market - which is where the overwhelming majority of Phase II and Phase III prototype work actually lives.

Grant-alignment work is part of the engagement. For a research university partnering with a defense sponsor, the principal investigator's grant proposal is the document that scopes the next eighteen months of work. We read the proposal, map the milestone schedule into the engineering calendar, and build the security plan that the sponsoring program office will accept. A sibling page, research universities cybersecurity, describes the academic-side anxieties and the buyer-identity layer for that vertical.

General Services Administration and Multiple Award Schedule context comes up. Petronella is not a GSA Schedule holder today - we say that out loud rather than pretend otherwise. For engagements that require GSA contracting we either subcontract under a teaming partner who holds an appropriate Schedule or coordinate with the buyer to use an alternative procurement vehicle. The honesty floor is non-negotiable; misrepresenting a Schedule status would itself be a contract-default risk.

Every conversation starts with a one-hour introductory call. There is no charge, no obligation, and no hard sell on that call. The output is either a clear path to a scoped engagement or a clear "this is not where we add value" - and the second outcome is just as honest a result as the first.

Looking for the deliverable side of robotics prototyping?

This page is the buyer-identity view of defense robotics: the program landscape, the regulatory floor, and what a defense buyer should expect from a partner. The deliverable view describes engagement phases, deliverable artifacts, hardware and compute environment, and security overlay in detail.

See the robotics prototyping solutions page →
First-Call Depth

What A Defense Buyer Actually Asks In The First Call

The introductory call is short. The questions are not. This section walks through the conversation the way it actually goes, because every defense buyer who has been through a procurement cycle asks the same eight questions in roughly the same order.

One. Who exactly is on your side of the table? Buyers want to know whether they are speaking with the engineer who will do the work or with a salesperson who will hand the project off after signature. Petronella Technology Group is small enough that the founder, Craig Petronella, is on the kickoff call for every defense engagement, and the engineering lead who will own the deliverable is on the call before scope is signed. We do not run a sales-engineer-to-delivery handoff. The person describing the work on the call is the person who will execute it. Buyers who have been burned by sales-engineering bait-and-switch in past procurements relax visibly when this question lands cleanly.

Two. What is the actual breadth of your CMMC posture? The Registered Provider Organization status (RPO #1449, verifiable at cyberab.org/Member/RPO-1449) is the headline answer. The longer answer is that we have walked clients through Level 1 self-assessment, Level 2 readiness work in advance of a Certified Third-Party Assessment Organization audit, and Level 3 conversations for clients facing the higher-tier control set drawn from NIST SP 800-172. We do not sit a CMMC L2 third-party assessment ourselves; that is a regulatory separation that the CMMC ecosystem enforces. We prepare the buyer for that assessment and then we step aside while the C3PAO does its work. The honesty of that scope boundary is a feature, not a bug.

Three. What does your data-flow diagram look like? Defense buyers who have been audited know that the first artifact a contracting officer asks for after a covered cyber incident is the data-flow diagram - which systems hold Controlled Unclassified Information, which network segments those systems live on, which user identities can reach those systems, and which audit logs prove that access. We bring a template diagram into the first call, walk through the variant we would build for the buyer's engagement, and answer the underlying question of "could you defend this if a contracting officer asked tomorrow." If the answer is no, we do not take the engagement until the diagram is ready.

Four. What happens to our intellectual property? The buyer keeps the intellectual property. Petronella does not retain background rights in client deliverables on defense engagements. The engagement contract reads that way and the deliverable artifacts ship that way. For buyers pursuing a Phase III sole-source award off a Phase II prototype we built, that intellectual property posture is the difference between a clean Phase III conversation and a contract dispute. We refuse to take the engagement on terms that compromise the buyer's Phase III position.

Five. What is your incident response under DFARS 252.204-7012? Our runbook covers detection through reportable-incident notification. Tabletop exercises rehearse the path before any live incident lands. The same digital forensics team that supports active investigations - including investigations that go to court under expert-witness scrutiny - sets the response posture for our defense clients. That is not a marketing claim, it is a verifiable statement: Craig Petronella holds a North Carolina Licensed Digital Forensics Examiner credential (DFE #604180), is listed on the North Carolina Office of Indigent Defense Services forensics registry, and has testified in court as an expert witness. The incident response runbook reflects that operational discipline.

Six. Where does the artificial intelligence inference run? On Petronella-owned compute, in our Raleigh, North Carolina data plane, on hardware sourced through the NVIDIA Elite Partner Channel. There is no public cloud inference path for defense engagements. Robotics policies, vision-language-action models, and reinforcement-learning workloads run on our cluster from training through deployment. The buyer can request the data-plane diagram and the audit-log topology before signing scope. The full architecture is described at private artificial intelligence solutions.

Seven. What is your relationship to Hugging Face and Pollen Robotics? Petronella is a customer and a community participant. Hugging Face acquired Pollen Robotics in April 2025 and announced the Reachy Mini hardware platform in July 2025. We acquired a Reachy Mini, run it in our Raleigh lab, and build prototypes on the open-source Hugging Face LeRobot stack. We are not a Pollen Robotics authorized partner because no public Pollen authorized-partner program currently exists; we are not Hugging Face certified or endorsed because no Hugging Face certification program exists in this domain. We say that out loud rather than imply a relationship that has not been granted.

Eight. Why should we trust a robotics practice that is new? The honest answer: because the robotics work is the new application of a 23-year-old foundation that you can verify line by line. Founded in 2002. Better Business Bureau A+ since 2003. CMMC-AB Registered Provider Organization #1449 verifiable on the CyberAB website. North Carolina Licensed Digital Forensics Examiner credential. Cisco-certified network professional. Cisco Wireless Networking Expert credential. Forensic registry listing on the North Carolina Office of Indigent Defense Services site. Five-thousand-plus pages of public technical writing on cybersecurity and compliance topics. The novelty surface is the robotics engineering. The trust surface is the foundation under it. Pretending the robotics work is older than it is would damage the trust surface, so we do not pretend.

The first call is forty-five minutes. The eight questions take the first thirty. The remaining fifteen minutes are spent on scope, sponsor program, and timeline. If the conversation reveals a fit, we follow up with a written engagement summary within forty-eight hours. If the conversation reveals that we are not the right partner for the buyer's specific need, we say so on the call and refer the buyer to a more appropriate shop where we can. The honesty floor on the first-call posture is what produces the trust required to sign a defense engagement contract.

Why The Wedge Holds

Why Sovereign Robotics Prototyping Is The Defensible Position

The defense robotics market is not under-served by robotics shops. It is under-served by robotics shops that also bring a verifiable cybersecurity, compliance, and private artificial intelligence infrastructure surface. The shops that lead with motion planning, manipulation research, or platform integration are excellent at what they do; the buyers who hire them often hire a separate compliance vendor and a separate cloud-AI integrator and a separate cyber response team to round out the engagement. The integration tax is real. A buyer running a Phase II prototype with three external partners spends a meaningful percentage of the program budget on coordination overhead.

Petronella collapses three of the four lanes into a single contract. The robotics engineering lane is a new lane for us; we are operationally small in that lane and we say so. The cybersecurity lane is a 23-year-old discipline. The compliance lane is a CMMC-AB Registered Provider Organization function we have built since the CMMC framework existed. The private artificial intelligence lane is a multi-year investment in owned NVIDIA Elite Partner Channel hardware that we run in our own Raleigh data plane. A buyer who hires us is hiring three operational lanes plus one new-but-supportable lane under one engagement contract, not four separate vendors.

The geographic wedge holds independently. North Carolina is one of the densest defense corridors in the country. Fort Liberty is the largest United States Army installation by population. Seymour Johnson Air Force Base, Camp Lejeune, Cherry Point Marine Corps Air Station, and Pope Army Airfield round out the state's operational footprint. Research Triangle Park hosts a deep bench of defense subcontractors and a research-university stack with active Department of Defense funding. The buyer who needs a CMMC-aligned robotics partner with feet on the ground in North Carolina has limited options today. We intend to be the obvious one.

The honesty discipline reinforces the wedge instead of weakening it. Defense buyers have been pitched by enough vendors that the room reads marketing language for what it is. A vendor who claims a partnership it has not been granted, a credential it does not hold, or a track record it cannot verify gets caught - sometimes after signature, sometimes during a Phase II review when an auditor follows up on a claim. Petronella refuses to make claims that cannot survive that audit. The output is a slower-growing pipeline and a much higher trust floor with the buyers who actually call. We will take that trade.

FAQ

Defense Buyer Questions

Are you a Department of Defense prime contractor?
No. Petronella Technology Group works as a subcontractor under DIB primes, as a teaming partner to small businesses pursuing SBIR or STTR awards, and as a direct contractor on Defense Innovation Unit Commercial Solutions Openings where the contracting vehicle permits. We are not a prime today and we say so plainly. Our wedge is the regulated-but-unclassified robotics-and-AI engineering slice, not the prime-contractor management slice.
Are you CMMC certified?
Petronella is a CMMC-AB Registered Provider Organization (RPO #1449, verifiable at cyberab.org/Member/RPO-1449). The full team holds CMMC Registered Practitioner credentials. We consult across all three CMMC levels (Level 1, Level 2, and Level 3). A defense robotics engagement that requires Level 2 third-party assessment is conducted by a Certified Third-Party Assessment Organization separate from us; we prepare the buyer for that assessment.
Do you handle ITAR-controlled work?
We are ITAR-aware, which means we recognize when a robotics dataset, payload geometry, or sensor stream crosses into United States Munitions List territory and route the conversation to qualified export-control counsel before technical work proceeds. We are not a registered exporter and we do not represent ourselves as an export-control compliance shop. The recognition floor is real and is part of the engagement; the technical export-control determination belongs to qualified counsel and the buyer's compliance office.
Do you have a Facility Clearance or run a SCIF?
We do not currently hold a Facility Clearance and we do not operate a Sensitive Compartmented Information Facility. The wedge we work in is regulated-but-unclassified - the controlled unclassified information slice that covers the overwhelming majority of Phase II and Phase III defense robotics prototype work. For engagements that require classified handling, the buyer routes that portion of the work into their own cleared environment and we coordinate around it.
Where does our data physically live during the engagement?
For defense engagements, every piece of client data, every model artifact, and every training run lives on Petronella-owned compute in our Raleigh, North Carolina data plane. The private artificial intelligence cluster is built on owned NVIDIA Elite Partner Channel hardware. There is no public cloud inference path. Audit logs, SBOMs, and a documented data-flow diagram are part of the deliverable stack so the buyer can verify the topology rather than take our word for it.
What does an engagement actually cost?
We do not publish defense pricing on this page because procurement realities for a Department of Defense Industrial Base buyer differ substantially from a commercial conversation. Engagement scope, contracting vehicle, milestone schedule, and security overlay all factor into the cost model. Pricing is discussed on the introductory call. Phone (919) 348-4912 or use our contact page.
How do you handle a covered cyber incident under DFARS 252.204-7012?
Our incident response runbook is pre-aligned to the DFARS 252.204-7012 reporting timeline. The runbook covers detection, containment, evidence preservation, contractual notification to the buyer, and the rapid reporting path to the Department of Defense if the buyer determines the incident is reportable. Tabletop exercises rehearse the path before any real incident occurs. The same digital forensics team that supports active investigations sets the response posture for our defense clients.
Talk to a defense robotics specialist

Bring a 24-year cyber foundation to your robotics prototype

Petronella Technology Group has served the Department of Defense Industrial Base region of North Carolina since 2002. The robotics practice is new; the cyber, compliance, and private artificial intelligence infrastructure under it is operational. Free introductory call. No hard sell.

5540 Centerview Dr., Suite 200, Raleigh, NC 27606
Petronella Robotics / Lead

Get the Secure Robotics Development Brief

Tell Petronella Technology Group about your robotics project. We will reply within 4 business hours with a CMMC-RP led scoping conversation and the early-access edition of our Secure Robotics Development Brief covering CUI handling, on-prem AI inference for robotics, and CMMC-aligned development practices. No obligation. No sales pressure.

CMMC-RP team. We reply within 4 business hours. Privacy policy. Or call (919) 348-4912.