Oct 10 2025

Anthropic Expands AI Role in U.S. National Security Amid Rising Oversight Concerns

Category: AI,AI Governance,AI Guardrails,Information Securitydisc7 @ 1:09 pm

Anthropic is looking to expand how its AI models can be used by the government for national security purposes.

Anthropic, the AI company, is preparing to broaden how its technology is used in U.S. national security settings. The move comes as the Trump administration is pushing for more aggressive government use of artificial intelligence. While Anthropic has already begun offering restricted models for national security tasks, the planned expansion would stretch into more sensitive areas.


Currently, Anthropic’s Claude models are used by government agencies for tasks such as cyber threat analysis. Under the proposed plan, customers like the Department of Defense would be allowed to use Claude Gov models to carry out cyber operations, so long as a human remains “in the loop.” This is a shift from solely analytical applications to more operational roles.


In addition to cyber operations, Anthropic intends to allow the Claude models to advance from just analyzing foreign intelligence to recommending actions based on that intelligence. This step would position the AI in a more decision-support role rather than purely informational.


Another proposed change is to use Claude in military and intelligence training contexts. This would include generating materials for war games, simulations, or educational content for officers and analysts. The expansion would allow the models to more actively support scenario planning and instruction.


Anthropic also plans to make sandbox environments available to government customers, lowering previous restrictions on experimentation. These environments would be safe spaces for exploring new use cases of the AI models without fully deploying them in live systems. This flexibility marks a change from more cautious, controlled deployments so far.


These steps build on Anthropic’s June rollout of Claude Gov models made specifically for national security usage. The proposed enhancements would push those models into more central, operational, and generative roles across defense and intelligence domains.


But this expansion raises significant trade-offs. On the one hand, enabling more capable AI support for intelligence, cyber, and training functions may enhance the U.S. government’s ability to respond faster and more effectively to threats. On the other hand, it amplifies risks around the handling of sensitive or classified data, the potential for AI-driven misjudgments, and the need for strong AI governance, oversight, and safety protocols. The balance between innovation and caution becomes more delicate the deeper AI is embedded in national security work.


My opinion
I think Anthropic’s planned expansion into national security realms is bold and carries both promise and peril. On balance, the move makes sense: if properly constrained and supervised, AI could provide real value in analyzing threats, aiding decision-making, and simulating scenarios that humans alone struggle to keep pace with. But the stakes are extremely high. Even small errors or biases in recommendations could have serious consequences in defense or intelligence contexts. My hope is that as Anthropic and the government go forward, they do so with maximum transparency, rigorous auditing, strict human oversight, and clearly defined limits on how and when AI can act. The potential upside is large, but the oversight must match the magnitude of risk.

“AI is already the single largest uncontrolled channel for corporate data exfiltration—bigger than shadow SaaS or unmanaged file sharing.”

Click the ISO 42001 Awareness Quiz — it will open in your browser in full-screen mode

iso42001_quizDownload

Protect your AI systems — make compliance predictable.
Expert ISO-42001 readiness for small & mid-size orgs. Get a AI Risk vCISO-grade program without the full-time cost.

Secure Your Business. Simplify Compliance. Gain Peace of Mind

Check out our earlier posts on AI-related topics: AI topic

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services | Mergers and Acquisition Security

Tags: Anthropic, National security


Feb 14 2025

DOGE: A National Security Cyber Breach

Category: Data Breach,Security Breachdisc7 @ 9:22 am

In a recent series of events, the U.S. government has faced significant security breaches, not from external cyberattacks, but through actions initiated by the Department of Government Efficiency (DOGE), a newly established entity led by a billionaire with an ambiguous governmental role. These breaches have profound implications for national security.

Initially, individuals associated with DOGE accessed the U.S. Treasury’s computer systems, granting them the capability to collect data on and potentially control approximately $5.45 trillion in annual federal payments. Subsequently, unauthorized DOGE personnel obtained classified information from the U.S. Agency for International Development, possibly transferring it to their own systems. Following this, the Office of Personnel Management (OPM), which maintains detailed personal data on millions of federal employees, including those with security clearances, was compromised. Additionally, Medicaid and Medicare records were breached.

In another alarming incident, partially redacted names of CIA employees were transmitted via an unclassified email account. DOGE personnel have also been reported to input Education Department data into artificial intelligence software and have commenced operations within the Department of Energy.

On February 8, a federal judge intervened, prohibiting the DOGE team from further accessing Treasury Department systems. However, given that DOGE operatives may have already copied data and altered software, the effectiveness of this injunction remains uncertain. Without strict adherence to established security protocols by federal employees, further breaches of critical government systems are anticipated.

The systems compromised by DOGE are integral to the nation’s infrastructure. For instance, the Treasury Department’s systems contain detailed blueprints of federal financial operations, while the OPM network holds comprehensive information on government personnel and contractors.

What sets this situation apart is the method of breach. Unlike traditional foreign adversaries who employ stealth and spend years infiltrating government systems, DOGE operatives, with limited experience and oversight, are openly accessing and modifying some of the United States’ most sensitive networks. This not only introduces potential new security vulnerabilities but also involves the dismantling of essential security measures, such as incident response protocols and auditing mechanisms, by replacing seasoned officials with inexperienced personnel.

A fundamental security principle, known as “separation of duties,” has been undermined in these instances. This principle ensures that no single individual has unchecked power over critical systems, requiring multiple authorized personnel to collaborate on significant actions. The erosion of this safeguard poses a substantial risk to national security.

For further details, access the article here

Elon Musk’s DOGE Posts Classified Data On Its New Website

Anyone Can Push Updates to the DOGE.gov Website

‘Experts left database open’: Hackers mock Elon Musk after easily defacing his DOGE site

DOGE Team Raises Major Cyber Security Concerns

Young engineers pose ‘the single greatest insider threat risk the Bureau has ever faced’ as experts warn of cybersecurity breaches

 Congressman Robert Garcia makes ‘A Minor’ Barb At DOGE

The Data Protection Guidebook: A Survey of U.S. Federal and State Laws, Statutes, and Regulations Governing Data Breach Notification, Biometric Information, Cybersecurity, and Data Privacy

Hackers are getting quicker—48 minutes is all it takes for a breach.

A Hacker’s Mind: How the Powerful Bend Society’s Rules, and How to Bend them Back

New regulations and AI hacks drive cyber security changes in 2025

Hackers will use machine learning to launch attacks

VNC Is The Hacker’s New Remote Desktop Tool For Cyber Attacks

InfoSec services | InfoSec books | Follow our blog | DISC llc is listed on The vCISO Directory | ISO 27k Chat bot | Comprehensive vCISO Services | ISMS Services | Security Risk Assessment Services

Tags: Cyber Intrusion, data breach, data privacy, data protection, DOGE, National security


Mar 26 2022

FCC adds Kaspersky to Covered List due to unacceptable risks to national security

Category: Antivirus,Information Security,Information WarfareDISC @ 9:53 pm

The Federal Communications Commission (FCC) added Kaspersky to its Covered List because it poses unacceptable risks to U.S. national security.

The Federal Communications Commission (FCC) added multiple Kaspersky products and services to its Covered List saying that they pose unacceptable risks to U.S. national security.

“The Federal Communications Commission’s Public Safety and Homeland Security Bureau today added equipment and services from three entities – AO Kaspersky Lab, China Telecom (Americas) Corp, and China Mobile International USA Inc. – to its list of communications equipment and services that have been deemed a threat to national security, consistent with requirements in the Secure and Trusted Communications Networks Act of 2019.” reads the FCC’s press release.

The Covered List, published by Public Safety and Homeland Security Bureau published, included products and services that could pose an unacceptable risk to the national security of the United States or the security and safety of United States persons.

The US commission also added Chinese state-owned mobile service providers China Mobile International USA and China Telecom Americas to the list. Below is the list of Covered Equipment or Services added on March 25, 2022:

  • Information security products, solutions, and services supplied, directly or indirectly, by AO Kaspersky Lab or any of its predecessors, successors, parents, subsidiaries, or affiliates.
  • International telecommunications services provided by China Mobile International USA Inc. subject to section 214 of the Communications Act of 1934.
  • Telecommunications services provided by China Telecom (Americas) Corp. subject to section 214 of the Communications Act of 1934.

FCC banned Kaspersky security solutions and services supplied by Kaspersky or any linked companies.

“The FCC’s decision to add these three entities to our Covered List is welcome news. The FCC plays a critical role in securing our nation’s communications networks, and keeping our Covered List up to date is an important tool we have at our disposal to do just that. In particular, I am pleased that our national security agencies agreed with my assessment that China Mobile and China Telecom appeared to meet the threshold necessary to add these entities to our list. Their addition, as well as Kaspersky Labs, will help secure our networks from threats posed by Chinese and Russian state backed entities seeking to engage in espionage and otherwise harm America’s interests.” said FCC Commissioner Brendan Carr. “I applaud Chairwoman Rosenworcel for working closely with our partners in the Executive Branch on these updates. As we continue our work to secure America’s communications networks, I am confident that we will have more entities to add to our Covered List.”

In Mid March, the German Federal Office for Information Security agency, aka BSI, recommended consumers uninstall Kaspersky anti-virus software. The Agency warns the cybersecurity firm could be implicated in hacking attacks during the ongoing Russian invasion of Ukraine.

According to §7 BSI law, the BSI warns against the use of Kaspersky Antivirus and recommends replacing it asap with defense solutions from other vendors.

Tags: FCC, kaspersky, National security


Jun 14 2011

Hacker Groups Attacks US Senate WebSite

Category: cyber security,Security BreachDISC @ 11:04 pm

Seal of the United States Senate.

Image via Wikipedia

US Senate Hacked! “We Don’t Like The U.S. Government Very Much” LULZ Security

The video states some reasons in significant rise of hack attack by Lulz Security on US information assets including critical assets (US senate) which is a growing threat to national security.

Leon Penetta warned in last week hearing that next Pearl Harbor might very well be a cyber attack which may affect power grid, financial system or government system.

“The Computer systems of exective branch agencies and the congress were probed or attacked on an average of 1.8 billion times per month last year” Sen. Susan Collins (R-ME)

http://www.youtube.com/watch?v=aFD3W6LhO04

Cyber War: The Next Threat to National Security and What to Do About It




Tags: Bethesda Softworks, Federal government of the United States, National security, Pearl Harbor, Sony, Susan Collins, United States, United States Senate