{"id":97317,"date":"2026-05-21T17:26:32","date_gmt":"2026-05-21T14:26:32","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=97317"},"modified":"2026-05-21T17:30:13","modified_gmt":"2026-05-21T14:30:13","slug":"pentagon-forms-task-force-to-deploy-advanced-hacking-ai-models","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/pentagon-forms-task-force-to-deploy-advanced-hacking-ai-models\/","title":{"rendered":"Pentagon Forms Task Force to Deploy Advanced Hacking AI Models"},"content":{"rendered":"<p>The Pentagon&#8217;s cyber warfare division has established a special task force to expedite the integration of advanced AI tools with potent hacking capabilities, according to <a href=\"https:\/\/www.politico.com\/news\/2026\/05\/20\/nsa-cyber-command-ai-task-force-mythos-00930786\">Politico<\/a>, citing sources.<\/p>\n<p>The initiative will bring together representatives from Cyber Command and the <span data-descr=\"National Security Agency\" class=\"old_tooltip\">NSA<\/span> to explore how the Pentagon can safely implement leading models across all aspects of its operations.<\/p>\n<p>This involves assessing the potential use of neural networks in &#8220;high-level&#8221; systems that contain some of the most classified information.<\/p>\n<p>The initiative underscores the Pentagon&#8217;s concern over the sudden emergence of privately developed neural networks capable of identifying vulnerabilities in digital systems faster than the world&#8217;s best hackers.<\/p>\n<p>Amid these concerns, the Trump administration is preparing an executive order on AI oversight in cybersecurity. The document may introduce a voluntary scheme for AI developers to collaborate with U.S. authorities.<\/p>\n<p>According to media reports, companies will be asked to submit their developments to the government 90 days before public release. Another proposal involves early access for critical infrastructure operators, including banks.<\/p>\n<p>Discussion intensified after the <a href=\"https:\/\/forklog.com\/en\/news\/anthropic-restricts-public-access-to-ai-model-mythos-after-laboratory-escape\">release<\/a> of Mythos by Anthropic. In April, the company announced that a preview version of the model had identified thousands of high-severity vulnerabilities, including in major operating systems and browsers.<\/p>\n<p>Instead of a public release, the firm launched Project Glasswing\u2014an initiative involving AWS, Apple, Broadcom, Cisco, CrowdStrike, Google, JPMorgan Chase, Linux Foundation, Microsoft, Nvidia, and Palo Alto Networks to test the tool in secure environments.<\/p>\n<p>In April, it <a href=\"https:\/\/forklog.com\/en\/news\/nsa-utilizes-anthropics-mythos-model-amid-pentagon-dispute\">was revealed<\/a> that the NSA is using Mythos, despite the startup&#8217;s conflict with the Pentagon. It is unknown how the agency employs the company&#8217;s AI, but others use it to scan their own environments for vulnerabilities.<\/p>\n<p>Disagreements between Anthropic and the Pentagon arose from the firm&#8217;s reluctance to allow the use of AI models for mass surveillance of U.S. citizens and the development of autonomous weapons. Consequently, Trump <a href=\"https:\/\/forklog.com\/en\/news\/us-government-to-cease-use-of-anthropic-technologies\">ordered<\/a> all federal agencies to completely cease using the firm&#8217;s technologies within six months.<\/p>\n<p>Earlier in May, the U.S. Army <a href=\"https:\/\/forklog.com\/en\/news\/us-army-enlists-top-contractors-for-ai-integration-in-weaponry\">convened<\/a> leading contractors to integrate AI into weaponry.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Pentagon&#8217;s cyber warfare division has formed a task force to accelerate the deployment of advanced AI tools with powerful hacking capabilities.<\/p>\n","protected":false},"author":1,"featured_media":97318,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"Pentagon forms task force for advanced AI hacking tools.","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[438,1824],"class_list":["post-97317","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-artificial-intelligence","tag-pentagon"],"aioseo_notices":[],"amp_enabled":true,"views":"4","promo_type":"1","layout_type":"1","short_excerpt":"Pentagon forms task force for advanced AI hacking tools.","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/97317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=97317"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/97317\/revisions"}],"predecessor-version":[{"id":97319,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/97317\/revisions\/97319"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/97318"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=97317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=97317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=97317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}