Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
NSA Utilizes Anthropic’s AI Amid Pentagon Ban

NSA Utilizes Anthropic’s AI Amid Pentagon Ban

Posted on April 20, 2026 By CWS

The National Security Agency (NSA) is reportedly employing Anthropic’s advanced AI model, Mythos Preview, despite a ban by the Department of Defense. This development underscores a significant contradiction within the U.S. national security framework, as highlighted in a recent report by Axios.

The Pentagon’s Ban on Anthropic

Back in July 2025, Anthropic secured a $200 million contract with the Department of Defense. The agreement included strict provisions against the use of its Claude AI for widespread domestic surveillance and autonomous weaponry. However, tensions arose in January 2026 when Defense Secretary Hegseth mandated the removal of these safety measures from all AI contracts, a move Anthropic opposed.

In response, the Pentagon labeled Anthropic as a ‘Supply-Chain Risk to National Security’ in February 2026, urging contractors to terminate business dealings with the company. Furthermore, President Trump instructed federal agencies to cease using Anthropic’s technology, with a phase-out period of six months for existing systems.

NSA’s Continued Use of Mythos

Despite the Pentagon’s prohibition, the NSA has continued to deploy Mythos Preview, Anthropic’s latest AI model. According to sources cited by Axios, the model is being utilized extensively within the agency. Currently, Mythos access is highly restricted, with only about 40 organizations having authorization, and the NSA is among those with undisclosed permissions.

The advanced offensive cybersecurity capabilities of Mythos have prompted Anthropic to limit its availability. This secrecy highlights concerns over the potential for the AI to enhance cyberattacks if misused, making the NSA’s adoption noteworthy given its role in cybersecurity and signals intelligence.

Ongoing Legal Disputes and Future Implications

In March 2026, Anthropic initiated legal proceedings in San Francisco, arguing that the Pentagon’s classification was ‘unprecedented and unlawful,’ infringing on free speech and due process rights. While the case progresses, the military contends that Anthropic’s tools pose national security risks while using them internally.

On April 17, Anthropic CEO Dario Amodei met with White House officials to discuss government use of Mythos and potential expansion plans. The NSA’s clandestine use of Mythos, amidst ongoing legal battles, suggests operational needs are taking precedence over official policies within U.S. intelligence.

As AI technology evolves, the disparity between institutional bans and practical use is widening. This raises important questions about governance, oversight, and accountability in deploying advanced AI within national security frameworks.

Cyber Security News Tags:AI governance, AI model, AI regulations, Anthropic, Cybersecurity, Defense, national security, NSA, Pentagon, supply chain risk

Post navigation

Previous Post: Bluesky Faces Major Disruption Amid DDoS Attack
Next Post: Why AI Projects Often Falter Post-Demo

Related Posts

Critical Vulnerability Exposes 50,000 WordPress Sites Critical Vulnerability Exposes 50,000 WordPress Sites Cyber Security News
Critical 0-Day RCE Vulnerability in Networking Devices Exposes 70,000+ Hosts Critical 0-Day RCE Vulnerability in Networking Devices Exposes 70,000+ Hosts Cyber Security News
Microsoft Office Vulnerabilities Let Attackers Execute Remote Code Microsoft Office Vulnerabilities Let Attackers Execute Remote Code Cyber Security News
Fiverr Faces Data Breach Due to Cloudinary Misconfiguration Fiverr Faces Data Breach Due to Cloudinary Misconfiguration Cyber Security News
Microsoft Shares BitLocker Keys with FBI to Unlock Encrypted Laptops in Guam Fraud Investigation Microsoft Shares BitLocker Keys with FBI to Unlock Encrypted Laptops in Guam Fraud Investigation Cyber Security News
Hackers Using Leverage Tuoni C2 Framework Tool to Stealthily Deliver In-Memory Payloads Hackers Using Leverage Tuoni C2 Framework Tool to Stealthily Deliver In-Memory Payloads Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vercel Data Breach, DDoS Takedown, New Android Threats
  • Microsoft’s April 2026 Update Boosts RDP Security
  • Senate Extends Surveillance Program Amidst House Chaos
  • Windows 11 Dev Build Enhances Secure Boot and Storage
  • UK Hacker Admits to Crypto Theft in US Court

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vercel Data Breach, DDoS Takedown, New Android Threats
  • Microsoft’s April 2026 Update Boosts RDP Security
  • Senate Extends Surveillance Program Amidst House Chaos
  • Windows 11 Dev Build Enhances Secure Boot and Storage
  • UK Hacker Admits to Crypto Theft in US Court

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark