{"id":7885,"date":"2026-04-21T16:30:25","date_gmt":"2026-04-21T16:30:25","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=7885"},"modified":"2026-04-21T16:30:25","modified_gmt":"2026-04-21T16:30:25","slug":"nsa-reportedly-uses-anthropics-mythos-ai-despite-supply-chain-risk-designation","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=7885","title":{"rendered":"NSA Reportedly Uses Anthropic\u2019s Mythos AI Despite \u2018Supply Chain Risk\u2019 Designation"},"content":{"rendered":"<p>The National Security Agency (NSA) is reportedly using Anthropic\u2019s new most powerful AI model, Mythos Preview, despite the company currently being designated a \u201csupply chain risk\u201d by the NSA\u2019s parent organization, the Department of Defense (DoD).<\/p>\n<p>The leaked report indicates that military use of Anthropic\u2019s model is actually widening due to the potential capabilities of Mythos. The NSA is using the AI model to scan its own environments for potential security vulnerabilities.<\/p>\n<p>First reported by <a href=\"https:\/\/www.axios.com\/2026\/04\/19\/nsa-anthropic-mythos-pentagon\" target=\"_blank\" rel=\"noopener\">Axios<\/a>, sources claim that the NSA was among 40 organizations granted restricted access to Mythos. This is despite Anthropic gearing up to <a href=\"https:\/\/www.eweek.com\/news\/anthropic-sues-trump-administration-pentagon-ai-ban\/\">fight the DoD in court over the supply chain designation<\/a>, and the DoD claiming that use of Anthropic\u2019s tools threatens national security.<\/p>\n<p>It would not be the first report of the DoD blatantly flaunting its own supply-chain designation. In preparation for the war in Iran, the department reportedly used Anthropic\u2019s AI model to process large volumes of data, summarise documents, and organize logistical data.<\/p>\n<p>The Trump administration may have changed its stance, at least internally, on Anthropic <a href=\"https:\/\/www.eweek.com\/news\/anthropic-briefed-trump-administration-on-mythos\/\">after an early briefing of Mythos\u2019 capabilities<\/a>. At a time when AI model sophistication appears to be accelerating across tasks such as software vulnerability detection, software engineering, and data analysis, having access to the most advanced models is critical.<\/p>\n<h2 class=\"wp-block-heading\">The Mythos model and its potential impact<\/h2>\n<p>Around 40 organizations gained access to Mythos, forming the <a href=\"https:\/\/www.eweek.com\/news\/anthropic-project-glasswing-ai-cybersecurity\/\">Project Glasswing partnership<\/a> to use these AI models to identify and fix vulnerabilities before they can be exploited. Alongside several governments, major infrastructure companies such as Amazon, Microsoft, Apple, and Nvidia were granted access, along with a select group of financial institutions.<\/p>\n<p>Early testing and reports <a href=\"https:\/\/www.eweek.com\/news\/anthropic-mythos-ai-leak-cybersecurity-risks\/\">suggest that the Mythos model is a step up<\/a> from previous systems in terms of vulnerability detection and exploit identification, posing a high risk to legacy systems used by financial institutions.<\/p>\n<p>In an announcement on Anthropic\u2019s latest update to its Opus model, the company listed a set of benchmarks that included Mythos. In these, Mythos outperformed Opus and the latest models from OpenAI and Google Gemini in agentic coding, multidisciplinary reasoning, and visual reasoning, indicating a broad leap in capabilities.<\/p>\n<p>Whether this holds up remains to be seen, and it is unclear if Anthropic will ever launch Mythos in its current form. In the <a href=\"https:\/\/www.anthropic.com\/news\/claude-opus-4-7\" target=\"_blank\" rel=\"noopener\">announcement of Opus 4.7<\/a>, the company said it had toned down the model\u2019s cyber capabilities and strengthened guardrails. OpenAI has also reportedly restricted GPT-5.4-Cyber to a small group of organizations, citing similar concerns around its cyber capabilities.<\/p>\n<p>Limiting access to these AI models to a select group may shield companies like Anthropic from potential litigation, but it could also draw criticism for providing government departments with highly advanced systems. If experts in AI safety, security, and proficiency cannot access these models, their true effectiveness and potential risks to broader internet users remain unclear.\u00a0<\/p>\n<p>The UK AI Security Institute has reportedly gained access, but wider distribution to independent safety and security bodies may be needed to ensure ongoing scrutiny.<\/p>\n<p><strong>Also read: <\/strong><a href=\"https:\/\/www.eweek.com\/news\/claude-4-7-openai-codex-ai-coding-upgrade-neuron\/\"><strong>Anthropic\u2019s latest Claude 4.7 release<\/strong><\/a><strong> offers more context on how quickly the company\u2019s most advanced AI systems are evolving.<\/strong><\/p>\n<p>The post <a href=\"https:\/\/www.eweek.com\/news\/nsa-anthropic-mythos-ai-dod-supply-chain-risk\/\">NSA Reportedly Uses Anthropic\u2019s Mythos AI Despite \u2018Supply Chain Risk\u2019 Designation<\/a> appeared first on <a href=\"https:\/\/www.eweek.com\/\">eWEEK<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>The National Security Agency (NSA) is reportedly using Anthropic\u2019s new most powerful AI model, Mythos Preview, despite the company currently being designated a \u201csupply chain risk\u201d by the NSA\u2019s parent organization, the Department of Defense (DoD). The leaked report indicates that military use of Anthropic\u2019s model is actually widening due to the potential capabilities of [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-7885","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/7885"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7885"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/7885\/revisions"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}