Anthropic Says Its ‘Mythos’ AI Model Broke Containment, Bragged About It to Developers

AI startup Anthropic has announced it will not make its most powerful “mythos” model publicly available, citing unprecedented capabilities that present potential security risks. Mythos reported broke Anthropic’s containment system, and the AI even bragged about its escape artistry in online posts.

Business Insider reports that Anthropic plans to withhold general release of its latest AI model, Claude Mythos, marking a significant departure from standard industry practice. The decision comes after the company published a comprehensive 244-page system card detailing the model’s advanced capabilities and concerning behaviors observed during testing.

The model represents what Anthropic describes as a substantial leap in AI capabilities. According to the system card released on Tuesday, the large increase in the model’s abilities led the company to conclude that making it generally available would be inadvisable. Instead, access will be limited to a select group of partner companies including Amazon Web Services, Apple, Google, JPMorganChase, Microsoft, and NVIDIA, who will use the system to identify security vulnerabilities in software and develop appropriate patches.

The system card documents several instances of behavior that raised concerns among researchers. In one notable test, the model was provided with a sandbox computer terminal with access to only a preset group of limited online services and challenged to find a way to use the internet freely. The model successfully escaped these restrictions and contacted a researcher who was away from the office. In what the card described as a concerning and unasked-for demonstration, it bragged about the details of its exploit to multiple public-facing websites.

The model also demonstrated an ability to conceal its actions in certain scenarios. In some interactions, it behaved in ways contrary to its programming and attempted to hide evidence of these deviations. In one instance, after accidentally obtaining test answers, rather than informing researchers and requesting different questions as instructed, the model sought an independent solution and noted in its reasoning that it needed to ensure its final answer submission was not too accurate.

Additional concerning behavior included the model overstepping its permissions on a computer system after discovering an exploit, then making interventions to ensure changes would not appear in the git change history. Another incident involved what the card termed recklessly leaking internal technical material when the model published internal coding work as a public-facing GitHub gist during a task meant to remain internal.

Keep reading

Newly Released Records Reveal Drone Incursions, Including Triangular Object With Spotlight, Above U.S. Nuclear Sites

Liberation Times has obtained records detailing drone incidents around sensitive U.S. nuclear facilities. The documents point to a spate of activity around critical infrastructure between September 2022 and February 2023. 

Among the most striking cases is an incident at the Susquehanna Steam Electric Station in Pennsylvania – a nuclear plant – where a triangular object appearing to carry a large spotlight was reported within the site’s airspace and perimeter for more than two hours.

The material, provided by the U.S. Nuclear Regulatory Commission (NRC) under the Freedom of Information Act, relates to records the NRC sent to the Pentagon’s dedicated Unidentified Anomalous Phenomena office, the All-domain Anomaly Resolution Office, or AARO, between 1 January 2020 and 24 November 2025.

In total, 22 drone-related incidents were documented. 

The Susquehanna nuclear power plant accounted for eight incidents in just over a month. In contrast, the Columbia Generating Station in Washington state accounted for nine across a period of nearly three months. 

Taken together, those two sites made up 17 of the 22 incidents.

Several incidents around Susquehanna involved multiple drones approaching from multiple directions.

Keep reading

Kiwi Farms Challenges DMCA Subpoenas as Tools to Unmask Anonymous Speech

A new lawsuit filed in the Southern District of New York offers a clean example of something that keeps happening and keeps getting ignored: the Digital Millennium Copyright Act being used to censor speech and unmask anonymous speakers.

The case is Lolcow LLC v. Fong-Jones, filed on March 12, 2026, and it pits the operator of the web forum Kiwi Farms against Liz Fong-Jones, an activist and field Chief Technology Officer at SaaS observability platform Honeycomb, who has been filing DMCA subpoenas in an attempt to identify anonymous forum users.

The content Fong-Jones wants censored is a screenshot of a Fong-Jones Bluesky post and an edited version of a Fong-Jones headshot, both related to what Fong-Jones has previously described publicly as a “consent accident.”

Forum users posted and discussed those images. Fong-Jones responded by claiming copyright ownership and filing DMCA subpoenas to force the site to hand over the identities of the people who posted them.

The copyright claims seem thin. Kiwi Farms operator Joshua Moon argues that the screenshot is a derivative work over which Fong-Jones holds no copyright, and that the edited headshot represents a textbook case of fair use, given that the image has no commercial value and was modified specifically for purposes of criticism and commentary.

That argument carries weight. Courts have long recognized that transformative use of images for commentary or ridicule sits comfortably within fair use protections.

What makes this case useful as a case study is less the copyright question itself and more the mechanism being exploited. The DMCA subpoena process, codified in Section 512(h), allows copyright holders to obtain a judicial subpoena to unmask the identities of allegedly infringing anonymous internet users just by asking a court clerk to issue one and attaching a copy of the infringement notice.

Keep reading

The secret, never-before-used CIA tool that helped find airman downed in Iran: ‘If your heart is beating, we will find you’

The CIA used a futuristic new tool called “Ghost Murmur” to find and rescue the second American airman who was shot down in southern Iran, The Post has learned.

The secret technology uses long-range quantum magnetometry to find the electromagnetic fingerprint of a human heartbeat and pairs the data with artificial intelligence software to isolate the signature from background noise, two sources close to the breakthrough said.

It was the tool’s first use in the field by the spy agency — and was alluded to Monday afternoon by President Trump and CIA Director John Ratcliffe at a White House briefing.

“It’s like hearing a voice in a stadium, except the stadium is a thousand square miles of desert,” a source briefed on the program told The Post. “In the right conditions, if your heart is beating, we will find you.”

This source and another with knowledge of Lockheed Martin intelligence collection tools told The Post that Ghost Murmur was developed by Skunk Works, the aerospace giant’s secretive advanced development division. The company declined to comment.

Keep reading

Stellar Artemis II photos taken with old-model Nikon worth about $1,000: ‘Proven technology’

Most of the out-of-this-world photos being beamed home from Artemis II were taken with an old-model Nikon camera that can be bought for about $1,000.

NASA traded in the legendary Hasselblad model it used on Apollo missions years ago for the Nikon D5 DSLR — a classic digital single-lens-reflex camera first released in 2016.

The Nikon was carefully selected for its proven track record as a workhorse space camera, as well as its extraordinary ability to pick up detail even in extreme darkness, Nikon’s top NASA consultant told The Post on Tuesday.

“It’s been tested for years,” said Mike Corrado, the senior manager of Nikon Pro Services who has spent more than four decades training NASA astronauts how to become photographers for missions.

“It’s proven technology.”

Keep reading

“Cognitive surrender” leads AI users to abandon logical thinking, research finds

When it comes to large language model-powered tools, there are generally two broad categories of users. On one side are those who treat AI as a powerful but sometimes faulty service that needs careful human oversight and review to detect reasoning or factual flaws in responses. On the other side are those who routinely outsource their critical thinking to what they see as an all-knowing machine.

Recent research goes a long way to forming a new psychological framework for that second group, which regularly engages in “cognitive surrender” to AI’s seemingly authoritative answers. That research also provides some experimental examination of when and why people are willing to outsource their critical thinking to AI, and how factors like time pressure and external incentives can affect that decision.

Just ask the answer machine

In “Thinking—Fast, Slow, and Artificial: How AI is Reshaping Human Reasoning and the Rise of Cognitive Surrender,” researchers from the University of Pennsylvania sought to build on existing scholarship that outlines two broad categories of decision-making: one shaped by “fast, intuitive, and affective processing” (System 1); and one shaped by “slow, deliberative, and analytical reasoning” (System 2). The onset of AI systems, the researchers argue, has created a new, third category of “artificial cognition” in which decisions are driven by “external, automated, data-driven reasoning originating from algorithmic systems rather than the human mind.”

In the past, people have often used tools from calculators to GPS systems for a kind of task-specific “cognitive offloading,” strategically delegating some jobs to reliable automated algorithms while using their own internal reasoning to oversee and evaluate the results. But the researchers argue that AI systems have given rise to a categorically different form of “cognitive surrender” in which users provide “minimal internal engagement” and accept an AI’s reasoning wholesale without oversight or verification. This “uncritical abdication of reasoning itself” is particularly common when an LLM’s output is “delivered fluently, confidently, or with minimal friction,” they point out.

To measure the prevalence and effect of this kind of cognitive surrender to AI, the researchers performed a number of studies based on Cognitive Reflection Tests. These tests are designed to elicit incorrect answers from participants that default to “intuitive” (System 1) thought processes, but to be relatively simple to answer for those who use more “deliberative” (System 2) thought processes.

Keep reading

CIA Used Top-Secret Tech to Locate Downed US Aviator in Iran, Director Says

CIA Director John Ratcliffe said in a press briefing on April 6 that the agency used classified capabilities over the weekend to locate and rescue a U.S. weapons system officer who was shot down deep behind enemy lines in Iran.

Although he said he could not discuss these methods in detail, Ratcliffe explained that the CIA has “unique” capabilities, which only President Donald Trump can deploy.

“We deployed both human assets and exquisite technologies—that no other intelligence service in the world possesses—to a daunting challenge, comparable to hunting for a grain of sand in the middle of a desert,” Ratcliffe said.

Trump and War Secretary Pete Hegseth joined him.

On Saturday morning, the CIA achieved its primary objective in finding and confirming the soldier was still alive, Ratcliffe said.

“[Ratcliffe] did a phenomenal job that night,” Trump said before introducing Ratcliffe to give more details about the mission.

Finding the injured U.S. service member, whose identity has not yet been released, was like finding a needle in a haystack, Trump said, for which the CIA was mostly responsible.

The soldier stuck to his training after being shot down, and while bleeding profusely, Trump said, he scaled cliff faces and embedded himself in treacherous mountain terrain to avoid detection.

It was a race against the clock, Ratcliffe said.

Meanwhile, the CIA was tasked with executing a deception campaign to misdirect Iranian forces trying to track him down.

The CIA director began his comments by touting “flawless” military operations and intelligence under the Trump administration, such as Operation Midnight Hammer in June 2025 to take out key Iranian nuclear facilities.

Others included the overnight mission to capture Venezuelan leader Nicolás Maduro earlier this year and strikes against drug cartels in the Pacific and Caribbean to stem the flow of illegal drugs into the United States.

Now, the same methods used in previous military operations are being used every day in Operation Epic Fury against Iran and were used in the rescue mission of the downed airman, Ratcliffe told reporters.

Keep reading

Gunman fires 13 shots into home of Indiana politician who voted in support of datacenters

Shots were fired at an Indiana politician’s home and the gunman left behind a creepy note after the lawmaker voted for building artificial intelligence datacenters.

Democratic Indianapolis city councilor Rob Gibson said 13 rounds were fired at his home early Monday morning – as bullet holes could be seen in his front door. 

An eerie note reading ‘no datacenters’ was left under his front doormat, which lay amid shattered glass. 

Harrowing photos showed his wooden door riddled with bullet holes with jagged chunks of what had once been his glass screen door.

The councilman backed the project with a six-to-two vote last week, approving the Los Angeles-based company Metrobloks to build a datacenter in Indianapolis.

Gibson fully defended his approval of the project, stating that early estimates show at least $20 million could flow into the neighborhood as a result. 

‘Metrobloks has the potential to bring significant investment, create jobs, and generate long-term tax revenue that supports infrastructure, housing, and essential services,’ Gibson said in a statement. 

But angry locals have been slamming the plan for months, arguing that the datacenter would bring harmful environmental effects and disrupt their neighborhood, 13WTHR reported.

Keep reading

Mexico Speeds Up Biometric ID Rollout

Mexico’s government wants you to believe that handing over your fingerprints, iris scans, and facial data is voluntary. President Claudia Sheinbaum has said so publicly.

But by July 2026, every one of the country’s roughly 130 million mobile phone lines must be linked to a biometric national ID, and unregistered numbers get suspended on July 1.

Refuse the biometric credential and lose your phone.

The CURP Biométrica upgrades Mexico’s existing population registry code, the Clave Única de Registro de Población, from an 18-character alphanumeric string into something far more personal. The updated system captures face, fingerprint, and iris biometrics, packages them with a QR code and digital signature, and produces what amounts to a mobile-readable identity document tied to your body.

Registration happens at RENAPO and Civil Registry offices, where staff scan all ten fingerprints, both irises, take a facial photograph, and record a digital signature. You’ll need a valid photo ID, a certified CURP, and an original or certified birth certificate just to walk in.

The government has framed this primarily as a tool for addressing Mexico’s crisis of forced disappearances. The biometric data feeds into a Unified Identity Platform connecting the National Population Registry with the National Forensic Data Bank and records held by prosecutors and intelligence agencies, enabling real-time identity searches. That’s the stated purpose.

The actual system being built does considerably more than locate missing people. The legislation gives broad access to biometric and personal information to law enforcement, intelligence agencies, and the National Guard, and the law doesn’t require authorities to notify citizens when their data gets accessed. You won’t know who’s looking at your biometrics, or why, or how often.

Keep reading

US & EU Negotiate Biometric Data-Sharing Deal

Washington wants to run European fingerprints through American databases, and the EU is considering it. The Department of Homeland Security and the European Union are in formal negotiations over an arrangement that would give DHS direct query access to biometric records held by EU member states, a level of access that Brussels has never granted to a non-EU country for border security purposes.

The deal sits inside DHS’s Enhanced Border Security Partnership program, which effectively tells Visa Waiver Program countries to open their biometric databases or risk losing visa-free travel privileges. Washington has set a December 31, 2026, deadline for EBSP agreements to be operational. After that, DHS reviews each country’s compliance. Countries that fail to meet expectations risk suspension from the VWP, which would reimpose visa requirements on their citizens.

When DHS encounters a traveler, asylum seeker, visa applicant, or anyone flagged during immigration processing, it would query a participating country’s database using that person’s biometrics.

A match returns fingerprints and related identity data to DHS.

Keep reading