Skip to content

Defense Department signs OpenAI for $200 million 'frontier AI' pilot project

Technology
3 3 0
  • OpenAI Public Sector LLC, San Francisco, California, has been awarded a fixed amount, prototype, other transaction agreement (HQ0883-25-9-0012) with a value of $200,000,000. Under this award, the performer will develop prototype frontier AI capabilities to address critical national security challenges in both warfighting and enterprise domains. The work will be primarily performed in the National Capital Region with an estimated completion date of July 2026. Fiscal 2025 research, development, test and evaluation funds in the amount of $1,999,998 are being obligated at time of award. Office of the Secretary of Defense Chief Digital and Artificial Intelligence Office, Washington D.C., is the contracting activity.

  • OpenAI Public Sector LLC, San Francisco, California, has been awarded a fixed amount, prototype, other transaction agreement (HQ0883-25-9-0012) with a value of $200,000,000. Under this award, the performer will develop prototype frontier AI capabilities to address critical national security challenges in both warfighting and enterprise domains. The work will be primarily performed in the National Capital Region with an estimated completion date of July 2026. Fiscal 2025 research, development, test and evaluation funds in the amount of $1,999,998 are being obligated at time of award. Office of the Secretary of Defense Chief Digital and Artificial Intelligence Office, Washington D.C., is the contracting activity.

    the performer will develop prototype frontier AI capabilities to address critical national security challenges in both warfighting and enterprise domains.

    So they want to let the plagiarism-machine conduct war now? Cool cool cool.

  • OpenAI Public Sector LLC, San Francisco, California, has been awarded a fixed amount, prototype, other transaction agreement (HQ0883-25-9-0012) with a value of $200,000,000. Under this award, the performer will develop prototype frontier AI capabilities to address critical national security challenges in both warfighting and enterprise domains. The work will be primarily performed in the National Capital Region with an estimated completion date of July 2026. Fiscal 2025 research, development, test and evaluation funds in the amount of $1,999,998 are being obligated at time of award. Office of the Secretary of Defense Chief Digital and Artificial Intelligence Office, Washington D.C., is the contracting activity.

    $200 million doesn't cover the first billion in losses OpenAI inflicts upon itself, but I'm not a fan of this bailout regardless.

  • the illusion of human thinking

    Technology technology
    2
    0 Stimmen
    2 Beiträge
    1 Aufrufe
    H
    Can we get more than just a picture of an Abstract?
  • 2 Stimmen
    1 Beiträge
    0 Aufrufe
    Niemand hat geantwortet
  • 99 Stimmen
    47 Beiträge
    1 Aufrufe
    P
    One of the greatest videos ever.
  • 119 Stimmen
    34 Beiträge
    2 Aufrufe
    S
    A fairer comparison would be Eliza vs ChatGPT.
  • Palantir Revisited: Who’s Us in Us vs. Them? | naked capitalism

    Technology technology
    1
    1
    15 Stimmen
    1 Beiträge
    2 Aufrufe
    Niemand hat geantwortet
  • 138 Stimmen
    16 Beiträge
    5 Aufrufe
    H
    My ports are on the front of the router. No backdoors for me, checkmate Atheists.
  • 1 Stimmen
    8 Beiträge
    5 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 44 Stimmen
    4 Beiträge
    4 Aufrufe
    G
    It varies based on local legislation, so in some places paying ransoms is banned but it's by no means universal. It's totally valid to be against paying ransoms wherever possible, but it's not entirely black and white in some situations. For example, what if a hospital gets ransomed? Say they serve an area not served by other facilities, and if they can't get back online quickly people will die? Sounds dramatic, but critical public services get ransomed all the time and there are undeniable real world consequences. Recovery from ransomware can cost significantly more than a ransom payment if you're not prepared. It can also take months to years to recover, especially if you're simultaneously fighting to evict a persistent (annoyed, unpaid) threat actor from your environment. For the record I don't think ransoms should be paid in most scenarios, but I do think there is some nuance to consider here.