MythosWatch

Methodology

What we track and how we label it.

Frontier AI access is a new category of consequential, poorly-documented public fact. MythosWatch exists because journalists, policymakers, and researchers need a citable record that distinguishes confirmed access from reported access from institutional response — without collapsing those distinctions into a single claim.

Entries are included only when they can be tied to a named source, a named institution or disclosed unknown group, and a clear signal label. Rumors without a durable, linkable source are excluded. This first version is intentionally narrow: fewer claims, stronger labels, and no invented precision.

StatusDefinition
Official

The entity is named by Anthropic or another primary source as a participant, partner, evaluator, or access channel.

Reported

A credible news source names the entity, but the entity is not treated as self-confirming in the tracker.

Prepared

Public reporting describes access guardrails, procurement preparation, or a possible deployment path without confirmed use.

Evaluated

Public reporting says a technical or government body evaluated the model directly.

Sidelined

An institution has oversight relevance or public concern, but public reporting does not show direct model testing or access.

Regulatory response

A named regulator or ministry has taken a concrete public or reported action in response to Mythos or directly adjacent cyber-AI capability.

Regulatory watch

A named regulator is monitoring, briefing, or coordinating on possible implications without evidence of direct model access.

Strategic engagement

A country or market has material Claude or AI-governance engagement, but no public Mythos-specific access record.

Exposure indicator

A sourced contextual entry on infrastructure, cyber capacity, or governance participation relevant to Mythos-class capability distribution.

Research watch

A contextual record used to track absence, infrastructure alignment, or strategic relevance. It is not access evidence.

Blocked

Access is denied, unavailable, restricted, or materially contested in public reporting.

Unknown pool

A source discloses a group without naming the individual organizations.

Evidence Handling

Primary-source announcements, wire reporting, named-source journalism, and contextual analysis are labeled separately so each entry can be cited at the appropriate level.

Geography

The European Union is treated as a jurisdictional layer, not a country. Unknown pools are not assigned to a country unless individual entities are named.

Updates

New entries should preserve source URL, publisher, publication date, source type, evidence status, and a short citation note. Rumors without a durable source are excluded.

Sources

Current source entries.

Source links below are the references currently used by the local dataset. They are grouped in data by publisher, source type, and reliability.

Axios / reported / highScoop: Top U.S. cyber agency doesn't have access to Anthropic's powerful hacking modelCNBC / reported / highTrump says Anthropic is shaping up and a deal is 'possible' for Department of Defense useUK AI Security Institute / official / primaryOur evaluation of Claude Mythos Preview's cyber capabilitiesAxios / reported / highCISA cuts, Anthropic lawsuit complicates Trump administration's Mythos responseBloomberg / MarketScreener / wire / highAnthropic's Mythos Model Accessed by Unauthorized Users, Bloomberg News ReportsiTnews / Reuters / reported / highASIC, APRA among regulators monitoring Anthropic's MythosTechCrunch / secondary / mediumNSA spies are reportedly using Anthropic's Mythos, despite Pentagon feudWorld Economic Forum / analysis / mediumAnthropic's Mythos moment: how frontier AI is redefining cybersecurityAxios / reported / highNSA using Anthropic's Mythos despite Defense Department blacklistAssociated Press / wire / highWhite House chief of staff meets with Anthropic CEO over its new AI technologyCSO Online / secondary / mediumWhite House moves to give federal agencies access to Anthropic's Claude MythosAxios / reported / highTrump officials weigh Anthropic Mythos access amid Pentagon blacklistForbes / secondary / mediumWhite House May Give Anthropic Mythos Access To Government Agencies, Report SaysBloomberg / reported / highECB to Scrutinize Anthropic's Mythos on Call With ExecutivesSeoul Economic Daily / reported / mediumKorea Holds Emergency Meetings with Cybersecurity Firms After Mythos ShockThe Decoder / analysis / mediumClaude Mythos is a wake-up call for Europe's AI safety apparatusInsurance Journal / Bloomberg / reported / highBank of England Set to Discuss Anthropic's Mythos With BanksCBS News / reported / highFed Chair Jerome Powell, Treasury's Bessent and top bank CEOs met over Anthropic's Mythos modelBloomberg / reported / highBank of Canada, Major Lenders Meet on Anthropic AI Cyber RiskAnthropic / official / primaryProject GlasswingAnthropic Frontier Red Team / red-team / primaryAssessing Claude Mythos Preview's cybersecurity capabilitiesAtlantic Council / analysis / mediumAmerican AI leadership can open a new chapter for Middle East integrationAnthropic / official / primaryHow Australia Uses Claude: Findings from the Anthropic Economic IndexAnthropic / official / primarySydney will become Anthropic's fourth office in Asia-PacificAssociated Press / wire / highHegseth pressures Anthropic to give military broader access to its AI techAssociated Press / wire / highModi positions India as AI leader at India AI Impact SummitTechAfrica News / secondary / mediumAfrica's Data Centre Capacity Lags Global Growth Despite Surge in InvestmentDigital Watch Observatory / analysis / mediumBuilding Scalable AI Through Global South PartnershipsAnthropic / official / primaryAnthropic and Infosys collaborate to build AI agents for telecommunications and other regulated industriesAfrica Data Centres Association / analysis / mediumData Centres in Africa 2026World Economic Forum / official / primaryCyber-Enabled Fraud Is Now One of the Most Pervasive Global Threats, Says New ReportUNECA / WSIS Forum / analysis / mediumCybersecurity at the center of digital transformation in Africa