Page 11 - The Indian EYE 052926
P. 11

OPINION                                                                   MAY 29, 2026     |  The Indian Eye 11



        Mythos an unprecedented challenge
        to  the  Indian  financial  system,  the
        Finance Minister instructed banks
        to secure their IT infrastructure
        and protect customer data, and em-
        phasised the need for a system that
        allows real-time sharing of threat in-
        telligence among banks and cyberse-
        curity agencies. Additionally, a panel
        has been set up under State Bank of
        India Chairman C.S. Setty to assess
        risks arising from the AI platform
        Mythos and develop mitigating mea-
        sures.
            India is not alone in recognising
        Mythos as a national security con-
        cern; there has been a broader trend
        of countries viewing the emergent
        capability with some trepidation. In-
        dia does  face unique  constraints in
        any decision regarding access to ad-
        vanced AI cybersecurity capabilities
        or protection against them. The issue
        of access has been at the forefront
        for Indian entities such as the Na-
        tional Payments Corporation of In-
        dia (NPCI) and Paytm, as evidenced
        by their engagement with Anthropic   The issue of access has been at the forefront for Indian entities such as the National Payments Corporation of India (NPCI) and Paytm (File photo)
        and the US Government to secure
        early access.                       systems offers sovereign control   also poses a major vulnerability. In-  compresses the timeline for existing
            The Indian banking system also   over systems and the pacing of   stead of focusing dialogue solely on   threats, even as the resources, infra-
        faces structural issues that predate   their updates, which can be syner-  Mythos,  it is  necessary to  invest  in   structure, and capability to cope with
        Mythos. India has been pursuing last-  gised against the threat landscape   and strengthen cybersecurity capac-  them remain lagging. India is at an
        mile connectivity, financial inclusion,   for India.                ity  for critical  sectors,  particularly   unenviable crossroads with no easy or
        and the digitisation of governance   • Sovereign Deployment of AI mod-  by building a clearer view of which   perfect choice; each path has a cost,
        structures, bringing millions of Indi-  els may strike a balance in the   software those institutions run versus   and none guarantees immediate and/
        ans into the fold of formal banking   current scenario. As seen in the   what they need, and gradually retir-  or durable security. Modernising cur-
        through the JAM trinity and the Uni-  examples from Vidoc and AISLE,   ing older systems.             rent systems and accelerating patch-
        fied Payments Interface (UPI). How-  lower-end models can be orient-    The dialogue around Mythos    ing timelines in India are as critical as
        ever, such large-scale programmes   ed to achieve results that closely   has largely shaped it as a threat, and   pursuing frontier capabilities that do
        have come at a cost: India’s Core   parallel those of Mythos. India   while it has real potential for harm,   not force a choice between security
        Banking System (CBS) has been       can leverage indigenous AI efforts   its capability can also be viewed as a   and sovereignty. The emergence of
        supported by centralised technolog-  such  as  BharatGen,  Sarvam,  and   forcing function. After all, Mythos   Mythos, therefore, should not gen-
        ical structures that are notoriously   the  IndiaAI  Mission  to  build  se-  was not designed as a cybersecuri-  erate panic but rather evoke caution
        slow-moving and difficult to change.  curity  assets  specific  to  its  needs.   ty tool. Anthropic built it as a gen-  about the nascent stage of AI devel-
            India also has a record of a rel-  While they may lag in raw com-  eral-purpose  model  with  extended   opment, characterised by the dilu-
        atively sluggish pace in patching   pute and cybersecurity capabilities   autonomous reasoning capabilities   tion of human oversight, inequitable
        vulnerabilities,  even  in  critical  sys-  in the near term, it may help India   across scientific research, legal anal-  access to capabilities, and collapsing
        tems. Wannacry Attacks had proven   develop the necessary scaffolding   ysis, strategic synthesis, and complex   timelines.
        to  be  an  illuminating  example:  the   to  grow its cybersecurity  assets.   systems modelling. The cybersecurity   Meghna Pradhan is a Research Analyst
        Windows  vulnerability  exploited  by   For aspects where the indigenous   capability surfaced during the evalu-  at the Manohar Parrikar Institute for
        the ransomware had been discov-     model may not suffice, open mod-  ation of those reasoning capabilities,   Defense Studies and Analysis, New
        ered and patched by Microsoft two   els available internationally may   and Anthropic chose to highlight it in   Delhi. She is currently pursuing her
        months before the attack.           serve as a stopgap.             its subsequent disclosures. The infa-  PhD at the Department of East Asian
            Within these constraints, India’s   Whichever one (or mix) of these   my Mythos has acquired is therefore   Studies, University of Delhi, with
        response space is structured by three   choices India opts for, getting hold of   not a product of deliberate design   her thesis focused on how emerging
        principal options, each with charac-  better tools is only half the answer.   intent, but of inadvertent capabilities   technologies such as AI affect political
        teristic costs.                   Indian institutions also need to make   the model came to exhibit. This is a    processes
        • Full purchase of Mythos-class and   better use of the tools they already   critical inflexion point. As AI systems   Views expressed are of the author and
          any potential Mythos-audited soft-  have. A scan that flags a vulnerability   become more capable, any sufficient-  do not necessarily reflect the views of
          ware  systems is one  of  the  seem-  is only useful if the patch reaches the   ly developed system, regardless of   the Manohar Parrikar IDSA or of the
          ingly obvious and most disadvanta-  actual machine. Critical institutions   the purpose for which it was built,   Government of India.
          geous options for India.        often lack full awareness of their   may develop properties that its de-
        • Collaboration is another option,   software systems and the personnel   signers did not intend. Still, the wider   The full version of this article first ap-
          specifically  with  companies  that   to respond quickly when issues are   world is left to confront and absorb.  peared in the Comments section of the
          are already part of the Glasswing   flagged.  The  use  of  legacy  systems,   For India, Mythos is not an issue   website (www.idsa.in) of Manohar Par-
          project.                        especially when their operators do   because it creates a novel vulner-  rikar Institute for Defense Studies and
        • Indigenisation  of critical  software   not always issue security updates,   ability,  but  because  it  significantly   Analyses, New Delhi, on May 19, 2026


                                                               www.TheIndianEYE.com
   6   7   8   9   10   11   12   13   14   15   16