19 juin 2019 | International, Aérospatial, Autre défense

Israel’s Rafael integrates artificial intelligence into Spice bombs

By: and

Rafael Advanced Defense System's Spice bombs now have a new technological breakthrough as the Israeli company enables its Spice 250 with artificial intelligence alongside automatic target recognition to be used with scene-matching technology.

The Spice 250, which can be deployed on quad racks under the wings of warplanes like the F-16, has a 75-kilogram warhead and a maximum range of 100 kilometers with its deployable wings.

Its electro-optic scene-matching technology — which involves uploading terrain data onto the bomb and combining it with real-time electro-optic imagery — allows the weapon to work in GPS-denied environments. And the bomb can use this autonomous capability to navigate and correct its location, according to Gideon Weiss, Rafael's deputy general manager of marketing and business development at the company's air and C4I division.

With its AI and “deep learning” technologies, the weapon has the ability to identity moving ground targets and distinguish them from other objects and terrain. This is based on 3D models uploaded to the bomb as well as algorithms. As the weapon identifies and homes in on its target, such as a convoy of vehicles, it separates the convoy of interest from other vehicles it has “learned” to ignore.

“The deep-learning algorithm is indifferent to the actual data fed to it for modeling targets of interest and embedding their pertaining characteristics into the system," Weiss said. "However, the more the data used for modeling is representative of the target of interest, the more robust the recognition probability will be in real life.”

Rafael has completed the development and testing phase of the Spice 250, including flight tests, which have “proven the robustness of the ATA and ATR, so it is mature for delivery,” Weiss said, using acronyms for automatic target acquisition and recognition.

Asked if the ATR algorithm will select a secondary target if the computer cannot find the initial human-selected target, Weiss said: “This goes into the area of user-defined policies and rules of engagement, and it is up to the users to decide on how to apply the weapon, when and where to use it, and how to define target recognition probabilities and its eventuality.”

Automatically selecting a secondary target may eventually become part of the upgrade profile for the munition, if customers express significant interest in the feature.

With a two-way data link and a video-streaming capability, the bomb can be aborted or told to re-target up until a “few second before the weapon hits its target,” Weiss explained. That two-way data-link, enabled by the weapon's mounting on a Smart Quad Rack, or SQR, will enable future deep learning to be based on data extracted from earlier launches. Data recorded will include either live-streaming video or a burst of still images of the entire homing phase up until impact.

“These are automatically and simultaneously recorded on the SQR — enabling two functions: (a) real-time and post-mission BDI (Bomb Damage Indication); (b) post-mission target data extraction for intel updates, etc.," Weiss said. "The ATR capability, including its deep learning updates, must be more agile than the enemy's ability to conceal and/or change its battlefield footprint, tactics, appearance or anything else which might impede the ATR from accurately recognizing and destroying targets.”

The Spice family of weapons is operational with the Israeli Air Force and international customers.

https://www.defensenews.com/artificial-intelligence/2019/06/17/israels-rafael-integrates-artificial-intelligence-into-spice-bombs/

Sur le même sujet

  • Quel plan de relance pour la défense ?

    28 avril 2020 | International, Aérospatial, Naval, Terrestre, C4ISR, Sécurité

    Quel plan de relance pour la défense ?

    Les industriels de la défense, qui sont venus défendre l'idée d'un plan de relance devant les parlementaires le 23 avril dernier, évoquent plusieurs pistes possibles : maintien de la loi de programmation militaire a minima, nouvelles commandes, plan pour l'innovation et implication de la Commission européenne. « Pour la LPM (loi de programmation militaire), nous souhaitons son maintien et que des idées soient données pour ajuster ces programmes dans le but d'alimenter notre industrie de défense, souligne Eric Trappier, président du GIFAS. Il faut être capable de relancer notre économie sinon il y a un risque pour l'emploi et l'activité. Je suis très attaché à l'emploi dans les territoires. Avant de parler de relocalisation, il faut rappeler que l'industrie de défense se situe déjà en France ». La Tribune du 27 avril 2020

  • Space Force awards $88 million in contracts for launch system prototyping

    29 septembre 2021 | International, Aérospatial, C4ISR

    Space Force awards $88 million in contracts for launch system prototyping

    The contracts will help launch providers develop transformational capabilities, according to the Space Force.

  • For the Navy’s hospital ships, networking is yet another challenge

    22 avril 2020 | International, Naval, C4ISR

    For the Navy’s hospital ships, networking is yet another challenge

    Andrew Eversden When the Navy hospital ship Comfort deployed to Haiti in 2010 following devastating earthquakes, media organizations broadcasting in the area ate up so much satellite bandwidth that the ship had to revert to paper processes and adjust its satellite communications for some ship-to-shore messaging. While the outages weren't a widespread issue, said Sean Kelley, who served as the ship's top IT officer at the time, the problem highlighted a challenge these ships face: broadband. Now, the hospital ships Mercy and Comfort are deployed to Los Angeles and New York, respectively, and are in the national spotlight as symbols of the coronavirus pandemic relief effort. But security and IT experts say the ships' mission presents the Navy with distinct networking problems, from cybersecurity to network connection for patients. Onboard devices When disaster strikes, the Navy's hospital ships deploy in a matter of days, mobilizing with a crew of about 100-1,200 personnel. But the influx of staff also leads to an incursion of devices, all of which must be secure and require bandwidth. “You have a lot of different people going to a lot of different places that now have to be acclimated to this environment,” said Kelley, now executive vice president at Unissant, an IT and cybersecurity company. “So that's really one of the biggest challenges, is getting all those things turned on, all those things activated, making sure that they are all compliant with the latest patches and fixes, and making sure they're good.” This process can be a “nightmare,” said retired Rear Adm. Danelle Barrett, former deputy chief information officer of the Navy and cybersecurity division director. “The challenging part is always in the first couple days whenever this happens,” said Barrett, who oversaw communications and cyberspace for Operation Unified Response, the U.S. military's mission in Haiti following the 2010 earthquake. “The team is coalescing about how they want to operate, and they're getting their feet wet, getting new accounts on networks ... [getting] their logins.” Cybersecurity aboard the ships is also complex. Both ships have 1,000 beds, 12 operating rooms, blood banks, labs, medical devices and a multitude of other “internet of things” devices connected to hospital beds. According to a 2018 survey by health care IoT security company Zingbox, each bed can have as many as 10-15 IoT devices. “They have to be cyber-ready, or the mission of the Mercy is considered [degraded],” said Dean Hullings, global defense solutions strategist at Forescout, which handles Comply to Connect — a Defense Department framework created to ensure the cybersecurity of new devices — for the USNS Mercy. Ensuring connectivity For the devices to function, they need connectivity. When the ships arrived in ports in late March, technology firm CenturyLink “donated” connectivity to the Mercy, while Verizon provided connectivity to the Comfort. Former and current Navy officials told C4ISRNET that adequate broadband is the most challenging IT consideration faced by these ships. “Obviously you're going to be transferring imagery of X-rays or things like that that are more dense and require a ... higher data rate, so that bandwidth in port is important,” Barrett said. And with the introduction of patients, bandwidth needs become more complex. “The greatest communications challenge we are going to face during this deployment is the increased need for patients to communicate off the ship during their stay,” Tom Van Leunen, a spokesman for Military Sealift Command, told C4ISRNET. “Our hospital ships are designed to support official communication for the ship's crew and embarked medical community to complete their job. Adding a capability for patients to reach loved ones increases the risk of saturating the bandwidth off the ship.” Aboard both ships, the Navy doubled the bandwidth, he said, adding that Navy personnel also set up separate networks for patients' communications. While this solves one networking problem, it can also create an increased cybersecurity risk. Securing the ships Cybersecurity on the hospital ships follows the same standard practices as the rest of the Navy fleet. Since those aboard are largely Navy medical staff and personnel, they know what activities are acceptable on the network, Barrett said. “You can't just go and plug anything into that network because of potential vulnerabilities that that system may bring that could affect not just the ship, but remember, the ship is then connected to the rest of the [Department of Defense Information Network],” Barrett said. “So risk by one is shared by all.” ForeScout's Hullings said a hospital environment “epitomizes” why the Comply to Connect program is necessary. The ship has desktops, servers, routers, printers and other networks equipment, as well as mobile devices, such as tablets, that health care providers use to track patient care. “The truly unique stuff is the mission systems of the hospital, like X-ray machines, MRI machines, the beds themselves in the post-operative recovery rooms, that are all sensors. And they are all passing data. They have to be protected,” Hullings said. A spokesperson for the Navy told C4ISRNET that the ships are prepared for the cybersecurity challenges associated with their missions, but declined to address what additional cybersecurity challenges are introduced with the addition of private citizens. “These ships have routinely deployed in humanitarian assistance missions such as Pacific Partnership (USNS Mercy) and Continuing Promise (USNS Comfort) that required them to operate in partner nation ports, with foreign national patients being brought to and from the ship,” said Cmdr. Dave Benham, a spokesman for the Navy's 10th Fleet. “In all operating locations, we take appropriate precautions to keep our networks secure, and we do not discuss specific measures in order to protect operational security.” Cybersecurity on the hospital ships follow the same protocols as any other Military Sealift Command ship, said Benham. “Protecting our networks is a continuous challenge, and the overarching concern is to ensure that the right information gets to the right place at the right time with the right level of protection,” he explained. Cybersecurity aboard the hospital ships follow similar efforts to those recommendations made by the Centers for Disease Control and Prevention: Wash your hands. “It's ‘wash your hands' with your computer, too,” Barrett said. “Do good hygiene with your computer.” https://www.c4isrnet.com/it-networks/2020/04/21/for-the-navys-hospital-ships-networking-is-yet-another-challenge/

Toutes les nouvelles