Back to news

September 1, 2023 | International, Land

Exclusive: US to send depleted-uranium munitions to Ukraine | Reuters

The Biden administration will for the first time send controversial armor-piercing munitions containing depleted uranium to Ukraine, according to a document seen by Reuters and separately confirmed by two U.S. officials.

https://www.reuters.com/world/us-send-its-first-depleted-uranium-rounds-ukraine-sources-2023-09-01/

On the same subject

  • A la recherche de l'IA hybride

    April 3, 2020 | International, Aerospace

    A la recherche de l'IA hybride

    Vice-président recherche, technologie, innovation du groupe Thales, David Sadek intervenait jeudi 24 octobre à Toulouse au Forum Innovation IA, un événement organisé par Sciences et Avenir pour le groupe Challenges. Explicabilité, validité, intégrité... " Pour une IA de confiance " : c'était l'intitulé de l'intervention de David Sadek, le vice-président recherche, technologie, innovation du groupe Thales. "Nous aimerions tous pouvoir toujours faire confiance à tous nos outils technologiques. Mais en réalité tout dépend du contexte. Dans le cas des outils reposant sur l'IA, si Netflix me recommande un film que je trouve détestable, ce n'est pas bien grave, on s'en remettra. Mais dans le cas des systèmes critiques tels que l'on en conçoit régulièrement chez Thales pour des applications défense, espace et aéronautique, la question de la confiance est primordiale". David Sadek énonce trois impératifs, qui sont autant d'axes stratégiques de la feuille de route IA chez Thales, pour aller vers cette " IA de confiance ". Pour qu'une application de l'IA soi digne de confiance, il faut d'abord qu'elle soit capable d'expliquer. Si elle se contente de proposer ou décider sans être capable de dire pourquoi et comment elle est arrivée à cette proposition ou décision, la défiance s'installera. Elle doit donc être capable de répondre à la question : " Pourquoi ? ". "Si par exemple un copilote IA recommande au pilote humain de virer à 45°, et que ce dernier demande " pourquoi ", le copilote doit pouvoir répondre par exemple : " parce qu'il y a un problème météo (ou une menace ...) droit devant ". Il ne s'agit pas de simplement tracer la décision, de pouvoir indiquer à ses concepteurs quels neurones, quelles couches de neurones, ont fait pencher la balance dans un sens ou un autre, mais bien d'expliquer dans une langue compréhensible immédiatement par le pilote". Ce qui indique qu'à l'aspect intelligence artificielle s'ajoute celui de " l'interaction homme-machine ". IA connexionniste et IA symbolique Cela implique, en restant sur cet exemple, une capacité de compréhension et de génération du langage naturel. Mieux, le pilote appréciera de pouvoir dialoguer dans un langage mixte, reposant sur l'oral et le geste (pour désigner un point sur une carte, etc.). Deuxième impératif selon David Sadek : il faut pouvoir démontrer la validité d'une application de l'IA. C'est-à-dire sa conformité aux spécifications. "Le système développé doit faire tout ce l'on attend de lui et rien que ce que l'on attend de lui. Ce qui suppose que l'on sache spécifier très proprement". On connait l'exemple d'un jeu de bataille navale, un " serious game " destiné à former des officiers de la marine, qui gagnait à tous les coups, parce qu'il sacrifiait systématiquement chaque vaisseau touché, pour ne pas ralentir la flotte. Aucune règle ne prévoyait, n'interdisait ce cas de figure, passablement inacceptable. Troisième impératif pour une " IA de confiance ", selon David Sadek, la responsabilité des systèmes reposant sur l'IA. C'est-à-dire leur conformité aux cadres légaux, réglementaires et moraux. On connait le tendon d'Achille des réseaux de neurones : ce sont des boîtes noires, on voit ce qui entre et ce qui sort, mais on ne sait pas (trop) ce qu'il se passe à l'intérieur. C'est pourquoi David Sadek insiste sur le fait qu'il faut s'intéresser aussi à " l'autre IA ", l'IA symbolique, celle qui repose sur des règles et des raisonnements et qui s'oppose à l'IA connexionniste des réseaux de neurones. Cette IA symbolique, qui fait moins les gros titres, qui n'a pas connu les progrès fulgurants de l'IA des réseaux de neurones, est plus à même de répondre à ces trois exigences : expliquer, valider, responsabilité. C'est pourquoi la réponse à cette triple exigence passe sans doute, entre autres, par " l'IA hybride ", une IA tirant parti de ces deux branches de l'intelligence artificielle. Par Pierre Vandeginste https://www.sciencesetavenir.fr/high-tech/intelligence-artificielle/ia-pvdg_138526

  • What’s changing in the cyber domain? We ask industry experts

    September 3, 2019 | International, Security

    What’s changing in the cyber domain? We ask industry experts

    By: Andrew Eversden “What are you talking about now in cybersecurity that you weren't talking about six months ago?” Fifth Domain posed this question to cybersecurity experts at Black Hat, a cybersecurity conference in Las Vegas, Nevada, that ran from Aug. 3-8. With the cyber domain rapidly evolving, we wanted to know how conversations within the cyber community are changing. Some pointed to a new focus on utility systems and web-connected devices that sit on critical infrastructure. “It's only a matter of time until there's another major disruption in an electric utility somewhere in the world, probably not in the U.S., but elsewhere,” Sergio Caltagirone, threat intelligence director at Dragos, said at the conference Aug. 5. “But oil and gas has the higher likelihood of a major destructive and loss-of-life event. And I think most people did not realize how close to that we actually were.” Caltagirone was referring to the TRISIS event, malware that struck industrial control systems at a Saudi Arabian petrochemical plant and could've caused physical harm. He said that in the aftermath of that attack, threat researchers diving into the details realized just how bad it could've been. “We started finding a lot of stuff which hadn't been found before,” Caltagirone said. “Which made us realize very quickly how close that space is to a major event.” Dave Weinstein, chief security officer at Claroty, pointed to an “explosion” of devices connected to the internet of things.. “It's really a product of this general consensus among industrial organizations that the benefits exceed the costs in terms of embracing this type of digital transformation," Weinstein said Aug. 8, adding that organizations must be “mindful” of these devices and have a plan to mitigate their potential vulnerabilities. Brian Costello, a senior vice president at Flashpoint, told Fifth Domain on Aug. 8 that he is more often than before focusing on targeted cyberattacks from bad actors. That's a shift away from “campaign-based” attacks that tracked. There's “more planning out, more scoping out of targets and taking long-term planning to go after [a] particular target with a specific asset in mind,” Costello said. Along that same vein, Julian Zottl, a senior cyber architect at Raytheon, said he's noticing more inclusion of all-source intelligence in threat analysis. “We're looking at ... all the sources and trying to figure out indicators,” Zottl said Aug. 7. “[We're] even trying to do predictive analytics now, where it's like, ‘Oh, we see this threat might be coming.' I think that's something that we're starting to talk about more and more.” Several cybersecurity professionals interviewed by Fifth Domain said the U.S. government is moving away from the classic cyber kill chain and over to the MITRE ATT&CK framework, which dives deeper into potential threats to information security. “They used to think the hackers would just come in to steal secrets, conduct espionage and then leave,” said Tom Kellermann, chief cybersecurity officer at Carbon Black and a former commissioner on the Commission on Cyber Security for then-President Barack Obama. “In fact, they're maintaining persistence in these systems. They're manipulating the integrity of data and then they're using federal government agencies themselves and personnel's devices themselves to target anyone who implicitly trusts that person, that agency, that department.” he told Fifth Domain on Aug. 6. Chris Kennedy, chief information security officer at AttackIQ and a former official with the Treasury Department and the Marine Corps, said these new frameworks in use along with federal continuous monitoring programs allow for more attacker emulation, essentially simulating the attack agencies could face. “Agencies are starting to realize the value of attacker emulation as a way to measure and benchmark the effectiveness of their security controls,” Kennedy said on Aug. 7. And with government agencies in different stages of cloud migration, agencies will need to learn how that fits into their cybersecurity posture. Marten Mickos, CEO of white hat hacking company HackerOne, said this a new discussion. He also said the conversation surrounding the use of ethical hackers in government environments has evolved: The word “hacker” is becoming more accepted. “I do think it signals a shift in mindset," Michos said. There's a realization that "those people who portray themselves as hackers are actually those who will rescue us, not those who will destroy us.” Despite all the changing technology and evolving threats, one aspect of cybersecurity remains set in stone, said M. K. Palmore, a field chief security officer for the Americas at Palo Alto Networks and a recently retired FBI cyber agent. “It's about adhering to cybersecurity fundamentals,” Palmore said. “That message hasn't changed regardless of my position or where I'm located.” https://www.fifthdomain.com/show-reporters/black-hat/2019/08/30/whats-changing-in-the-cyber-domain-we-ask-industry-experts

  • Contract Awards by US Department of Defense - January 4, 2019

    January 4, 2019 | International, Aerospace, Naval, Land, C4ISR, Security

    Contract Awards by US Department of Defense - January 4, 2019

    ARMY Avon Protection Systems, Cadillac, Michigan, was awarded a $92,670,255 firm-fixed-price contract for the joint service aircrew mask, engineering support, special tooling and spare parts. One bid was solicited with one bid received. Work locations and funding will be determined with each order, with an estimated completion date of Dec. 21, 2024. U.S. Army Contracting Command, Aberdeen Proving Ground, Maryland, is the contracting activity (W911SR-19-D-0002). AIR FORCE Lockheed Martin, Santa Maria, California, has been awarded a $52,700,000 indefinite-delivery/indefinite-quantity, cost-plus, and award-fee type, modification (P0009) to contract FA8818-17-D-0001 for engineering, development and sustainment services supporting the Air Force Multi-Mission Satellite Operation Center. This increase provides for continuous services to operate experimental and demonstration satellites; act as the focal point and center of expertise for Department of Defense experimental and demonstrations space and missile operations; support space and missile research, development, test and evaluation and initial operational test and evaluation. Work will be performed in Kirtland Air Force Base, Albuquerque, New Mexico, and is expected to be completed by Jan. 5, 2019. This modification is for work within scope of the contract. Fiscal 2019 other procurement funds will fund this contract. Space and Missile Systems Center, Kirkland Air Force Base, New Mexico, is the contracting activity. NAVY Advanced Management Strategies Group LLC,* Dumfries, Virginia (M00264-19-D-0001); Atkinson Aeronautics and Technology Inc.,* Fredericksburg, Virginia (M00264-19-D-0002); Emerging Technology Support LLC,* Mooresville, North Carolina (M00264-19-D-0003); Get It Done Solutions LLC,* Fredericksburg, Virginia (M00264-19-D-0004); Strategic Ventures Consulting Group LLC,* Falls Church, Virginia (M00264-19-D-0005); and Vickers and Nolan Enterprises LLC,* Stafford, Virginia (M00264-19-D-0006), are each awarded indefinite-delivery/indefinite-quantity contracts with five-year ordering periods and an option to extend services for up to six months for technical, analytical, and engineering support for the Marine Corps Capabilities Development Directorate. The estimated aggregate ceiling of the contracts is a combined $43,891,128. If the option is exercised, the contract value will be $48,280,241. Each company will have an opportunity to compete for individual firm-fixed-price task orders. The majority of work will be performed at the contractor facilities in Mooresville, North Carolina; Dumfries, Virginia; Fredericksburg, Virginia; Falls Church, Virginia; and Stanford, Virginia, as determined by task orders awarded. Work is expected to be completed in January 2024. With the option exercised, work will continue through July 2024. No funds will be obligated at the time of award. Fiscal 2019 operations and maintenance (Marine Corps); and research and development (Navy) funds will be obligated on individual task orders as they are issued. These contracts were competitively procured via solicitation on the Federal Business Opportunities website, with nine proposals received. The Marine Corps Installations Command, National Capital Region, Regional Contracting Office, Quantico, Virginia, is the contracting activity. Coffin Turbo Pump Inc., Englewood, New Jersey, is awarded a $15,523,669 indefinite-delivery/indefinite quantity, firm-fixed-priced contract, for up to 33 turbine driven main feed pumps for LHD-1 class main propulsion boilers. The Naval Surface Warfare Center, Philadelphia Division requires the production of a non-commercial main feed pump unit that will be driven by a steam turbine on a common solid shaft (no couplings). The main feed pump unit is designed to provide feed water to the Navy LHD-1 class main propulsion boilers. Work will be performed in Englewood, New Jersey, and is expected to be complete by January 2024. Fiscal 2017 other procurement (Navy) funding in the total amount of $1,299,325 will be obligated at time of award and will expire at the end of the current fiscal year. This contract was competitively procured via the Federal Business Opportunities website, with two offers received. The Naval Surface Warfare Center, Philadelphia Division, Philadelphia, Pennsylvania, is the contracting activity (N64498-19-D-4004). Fairbanks Morse Engine, Beloit, Wisconsin, is awarded a $13,552,041 cost-plus-fixed-fee, indefinite-delivery/indefinite-quantity contract with firm-fixed-priced ordering provisions for engineering, logistics and program management services in support of the Navy diesel engine systems. Work includes engineering and technical services, logistics support, engine training, and program management services. Work will be performed in Beloit, Wisconsin, (52 percent); San Diego, California (30 percent); and Norfolk, Virginia (18 percent), and is expected to be complete by January 2024. Fiscal 2019 operations and maintenance (Navy) funding in the amount of $720,000 will be obligated at time of award and will expire at the end of the current fiscal year. This contract was not competitively procured in accordance with 10 U.S. Code 2304(c)(1) - only one responsible source and no other supplies or services will satisfy agency requirements. The Naval Surface Warfare Center Philadelphia Division, Philadelphia, Pennsylvania is the contracting activity (N64498-19-D-4001). *Small business https://dod.defense.gov/News/Contracts/Contract-View/Article/1724565/

All news