Back to news

July 3, 2018 | International, C4ISR

DoD stands up its artificial intelligence hub

By:

WASHINGTON – The Defense Department has formally ordered the creation of a new hub for artificial intelligence research with Dana Deasy, the Pentagon's new chief information officer, taking the lead.

Deputy Secretary of Defense Patrick Shanahan ordered the move in a June 27 memo. The Pentagon's goal is to launch a series of AI projects known as National Mission Initiatives within 90 days – as well as taking over the controversial Project Maven.

The office will be known as the Joint Artificial Intelligence Center (JAIC), with the goal of enabling “teams across DoD to swiftly deliver new AI-enabled capabilities and effectively experiment with new operating concepts in support of DoD's military missions and business functions,” according to DoD spokeswoman Lt. Col. Michelle Baldanza.

Put another way, the group will have the “overarching goal of accelerating the delivery of AI-enabled capabilities, scaling the Department-wide impact of AI, and synchronizing DoD AI activities to expand Joint Force advantages,” according to a copy of the memo posted by Breaking Defense.

“This effort is a Department priority. Speed and security are of the essence,” Shanahan wrote. “I expect all offices and personnel to provide all reasonable support necessary to make rapid enterprise-wide AI adoption a reality.”

Deputy Secretary of Defense Patrick M. Shanahan directed the DoD Chief Information Officer to standup the Joint Artificial Intelligence Center (JAIC) in order to enable teams across DoD to swiftly deliver new AI-enabled capabilities and effectively experiment with new operating concepts in support of DoD's military missions and business functions.

The JAIC marks the second major initiative Pentagon leaders handed over to Deasy, a former CIO with JPMorgan Chase who has only been at the Pentagon for a few weeks. Deasy also is in charge of managing the department's JEDI cloud computing contract.

The idea of standing up an AI center was first confirmed by Secretary of Defense Jim Mattis on April 12, but it has been championed by the Defense Innovation Board, a group of outside experts ho advice the secretary on potential updates to how the Pentagon handles evolving technologies.

According to Michael Griffin, the head of Pentagon research and engineering, the department counts 592 projects as having some form of AI in them. However, Griffin said in April 18 testimony that he did not believe every one of those projects makes sense to roll into some sort of AI hub.

That concern appears to be reflected in Shanahan's memo, which orders that any AI project with a budget of $15 million or more should be coordinated with the services in order to ensure “DoD is creating Department-wide advantages.”

In terms of budget, Shanahan ordered the Pentagon's comptroller to find options for funding during the current fiscal year, but the major focus is on driving resources for fiscal year 2019 and beyond. Given the support for artificial intelligence research on the Hill, it is likely the final version of the National Defense Authorization Act for FY19 will include some funding for the new office.

The movement of Project Maven to the JAIC is notable. A DoD initiative to accelerate the integration of big data and machine learning, largely drawing on video feeds from unmanned systems, Maven in the last month has become a poster child for the clash of cultures between the defense department and Silicon Valley.

Google was working hand-in-hand with the Pentagon on the project, until a backlash from the company's employees, who argued in an open letter signed by more than 3,000 workers that it did not want to “build warfare technology.” Moving the program to the JAIC may be an attempt to keep the project underway without Google's participation.

https://www.c4isrnet.com/it-networks/2018/06/29/dod-stands-up-its-artificial-intelligence-hub/

On the same subject

  • Défense : le battle lab Terre va expérimenter son premier drone armé

    October 7, 2022 | International, Aerospace

    Défense : le battle lab Terre va expérimenter son premier drone armé

    Depuis un an et demi, DGA Techniques Terrestres (DGA TT) planche à Bourges sur le premier drone armé destiné au Battle Lab de l'Armée de Terre.

  • F-35 Proposal Submitted To Swiss Government

    November 20, 2020 | International, Aerospace

    F-35 Proposal Submitted To Swiss Government

    Fort Worth, Texas, November 19, 2020 /PRNewswire/ - On Nov. 18, the U.S. government and Lockheed Martin (NYSE: LMT) submitted an F-35 proposal to the Swiss government in support of Switzerland's New Fighter Aircraft (NFA) competition. The F-35 proposal is a total package offering that includes up to 40 F-35A aircraft, a sustainment solution tailored to Swiss autonomy requirements, and a comprehensive training program. The offering includes an industrial package providing Swiss industry substantial F-35 work opportunities. Should the F-35 be selected as the new fighter for Switzerland, this industrial work would take place in all Swiss regions. Swiss industry has the opportunity to compete for direct production of components for use on all F-35s produced, sustainment projects focused on supporting the Swiss Air Force and enhancing Swiss autonomy, and cyber security projects directly related to the F-35. The offer uses the F-35 Global Support Solution for sustainment to ensure Switzerland benefits from the European F-35 economies of scale to realize lower sustainment costs for the Swiss Air Force. It also includes a six-month spares package to ensure the Swiss Air Force has the ability to conduct autonomous operations, if needed. Lockheed Martin is also offering an option for the assembly of four aircraft in Switzerland to ensure the Swiss Air Force and Swiss industry gain an understanding of how to maintain the F-35 airframe and its advanced capabilities for the life of the program. "We are confident that our F-35 offer is the best and most affordable solution for the Swiss NFA competition," said Greg Ulmer, F-35 Program vice president and general manager. "We are offering the only 5th generation fighter at the cost of 4th generation aircraft while offering Switzerland an aircraft that will protect Swiss sovereignty for decades to come." To date, the F-35 has been selected by 13 nations and operates from 26 bases worldwide, with nine nations operating F-35s on their home soil. There are more than 585 F-35s in service today, with more than 1,190 pilots and 9,750 maintainers trained on the aircraft. For additional information, visit www.f35.com About Lockheed Martin Headquartered in Bethesda, Maryland, Lockheed Martin is a global security and aerospace company that employs approximately 110,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services. For additional information, visit our website: www.lockheedmartin.com Please follow @LMNews on Twitter for the latest announcements and news across the corporation. View source version on Lockheed Martin: https://news.lockheedmartin.com/2020-11-19-F-35-Proposal-Submitted-to-Swiss-Government

  • The Cybersecurity 202: Hackers just found serious vulnerabilities in a U.S. military fighter jet

    August 19, 2019 | International, Aerospace

    The Cybersecurity 202: Hackers just found serious vulnerabilities in a U.S. military fighter jet

    By Joseph Marks LAS VEGAS — In a Cosmopolitan hotel suite 16 stories above the Def Con cybersecurity conference this weekend, a team of highly vetted hackers tried to sabotage a vital flight system for a U.S. military fighter jet. And they succeeded. It was the first time outside researchers were allowed physical access to the critical F-15 system to search for weaknesses. And after two long days, the seven hackers found a mother lode of vulnerabilities that — if exploited in real life — could have completely shut down the Trusted Aircraft Information Download Station, which collects reams of data from video cameras and sensors while the jet is in flight. They even found bugs that the Air Force had tried but failed to fix after the same group of hackers performed similar tests in November without actually touching the device. “They were able to get back in through the back doors they already knew were open,” Will Roper, the Air Force's top acquisition official, told me in an exclusive briefing of the results. The hackers lobbed a variety of attacks — including injecting the system with malware and even going at it with pliers and screwdrivers. When I saw it, the metal box that's usually secure on the aircraft had wires hanging out the front. The hackers briefed Roper on the findings on Saturday afternoon. He was surrounded by discarded pizza boxes, iced coffee drinks — and the hotel's drinking glasses filled with screws, nuts and bolts removed from five fully dismantled TADS devices, which run about $20,000 a pop. He'd expected the results to be about this bad, Roper told me on a private tour of the hacking event. He pinned the weaknesses on decades of neglect of cybersecurity as a key issue in developing its products, as the Air Force prioritized time, cost and efficiency. He's trying to turn that around, and is hopeful about the results of the U.S. government's newfound openness to ethical hackers. He'd come straight from Def Con's first-ever Aviation Village, which the Air Force helped establish, and was wearing a gray T-shirt with the words “No, Mr. Bond, I expect you to hack,” emblazoned on the front — a riff on a classic line from the 1964 James Bond film “Goldfinger.” This is a drastic change from previous years, when the military would not allow hackers to try to search for vulnerabilities in extremely sensitive equipment, let alone take a literal whack at it. But the Air Force is convinced that unless it allows America's best hackers to search out all the digital vulnerabilities in its planes and weapons systems, then the best hackers from adversaries such as Russia, Iran and North Korea will find and exploit those vulnerabilities first, Roper told me. “There are millions of lines of code that are in all of our aircraft and if there's one of them that's flawed, then a country that can't build a fighter to shoot down that aircraft might take it out with just a few keystrokes,” he said. Roper wants to put his military hardware where his mouth is. During next year's Def Con conference, he wants to bring vetted hackers to Nellis or Creech Air Force bases near Las Vegas where they can probe for bugs on every digital system in a military plane, including for ways that bugs in one system can allow hackers to exploit other systems until they've gained effective control of the entire plane. He also wants to open up the ground control system for an operational military satellite for hacker testing, he said. “We want to bring this community to bear on real weapons systems and real airplanes,” Roper told me. “And if they have vulnerabilities, it would be best to find them before we go into conflict.” Those hacking challenges will also be useful for the private sector because military planes and satellites share many of their computer systems with the commercial versions of those products, Roper said, and the Air Force can share its findings. The seven hackers probing the TADS devices were all brought to Vegas by the cybersecurity company Synack, which sells the Pentagon third-party vulnerability testing services, under a contract with the Defense Digital Service, a team of mostly private-sector technology stars who try to solve some of the Pentagon's thorniest technology problems during short-term tours. The Defense Digital Service started by organizing large-scale hacking competitions in 2016, with names such as “Hack the Pentagon” and, eventually, “Hack the Air Force.” These were open to almost anybody — but included only public-facing hacking targets such as military service websites and apps. Shortly after, they also began opening more sensitive systems to a smaller number of vetted hackers who sign nondisclosure agreements. DDS has run about a dozen of those more sensitive hacking competitions so far, but this is the first time it has offered up the same system for hacking twice, said Brett Goldstein, DDS's director, who earned a reputation in technology as Open Table's IT director and chief data officer for the city of Chicago. “That's important because security is a continuous process,” he told me. “You can't do an exercise and say, ‘Oh, we found everything' and check the box. You need to constantly go back and reevaluate.” They also allowed the hackers to be more aggressive this time and to physically disassemble the TADS systems to get a better idea of what kinds of digital attacks might be effective, Goldstein said. That meant the hackers could simulate a cyberattack from adversaries that had infiltrated the vast network of suppliers that make TADS components and had sophisticated knowledge about how to compromise those elements. They could also advise the Air Force about flaws in how the TADS hardware was built that make it more susceptible to digital attacks. Moving forward, Roper told me, he wants to start using that knowledge to mandate that Air Force vendors build better software and hardware security controls into their planes and weapons systems upfront so the Air Force doesn't have to do so much cybersecurity work on the back end. He's up against an arcane and byzantine military contracting process, however, that's going to make those sorts of fundamental reforms extremely difficult, he acknowledged. In some cases, the company that built an Air Force system owns the software embedded in that system and won't let the Air Force open it up for outside testing, he says. In other cases, the Air Force is stuck with legacy IT systems that are so out of date that it's difficult for even the best technologists to make them more secure. “It's difficult to do this going backward, but we're doing our best,” Roper told me. “I can't underscore enough, we just got into the batter's box for what's going to be a long baseball game.” https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2019/08/14/the-cybersecurity-202-hackers-just-found-serious-vulnerabilities-in-a-u-s-military-fighter-jet/5d53111988e0fa79e5481f68/

All news