Artificial intelligence has been used in recent weeks to impersonate two of the highest ranking members of the US government: Secretary of State Marco Rubio and the White House chief of staff. This tactic uses a rapidly evolving technology that cybersecurity experts say is becoming the “new normal” in terms of simple and inexpensive scams that target high-ranking US officials.
AI tools now take less than 15 seconds of someone’s speech to build a plausible vocal clone, according to Rachel Tobac, CEO of SocialProof Security, a company that educates individuals to protect against such assaults.
Just six months before, required a clear one-to-two-minute sample of someone’s speech with no background noise or music to build a credible voice clone; not anymore. She stated that voice cloning is the new normal (in terms of imitation social engineering tactics).
Rubio told that he anticipates more attempts to mimic him using artificial intelligence.
“You will see me—and other people, for that matter—again. During a trip to Malaysia, Rubio remarked, “Perhaps some of you will be impersonated.”
“Rubio, who is also the national security adviser, noted that within days of taking office, foreign ministers called the State Department to ask whether I had just texted them. This is simply the 21st-century reality of artificial intelligence and fake news.”
An impersonator called at least five individuals in Rubio’s case, including a senator, a governor, and three foreign ministers. According to a State Department cable on the incident last week, the unidentified attacker created an account on the Signal messaging network in mid-June with the display name “marco.rubio@state.gov.”
According to the cable, the actor texted at least two targeted people to invite them to interact on Signal and left voicemails for them on the platform.
Last year, senior US authorities were alerted to the dangers AI may pose to the election process by a robocall that resembled the voice of then-President Joe Biden and attempted to discourage people from casting ballots in a primary.
The cloning process is considerably easier for popular personalities whose opinions are widely heard online, according to Steve Grobman, chief technical officer of cybersecurity company McAfee.
“The biggest worry with AI-powered clones is that seeing—or hearing—is no longer believing, and even skilled professionals can be duped, particularly when a familiar voice makes an urgent request,” Grobman told. We also need more intelligent tools to assist individuals distinguish between what is genuine and what isn’t. Our intuition is no longer reliable.
Rubio and others who heard the call’s audio impersonating him, however, claimed that it didn’t sound exactly like him, indicating that the person who made the call didn’t make a concerted effort to mimic his voice.
What worries some U.S. officials is the ruse’s boldness. The FBI warned in May that anonymous “malicious actors” were posing as high-ranking US officials in order to target their government connections, one month prior to the phony Rubio calls began. The goal was to establish a relationship with the target in order to gain access to their internet accounts. Whether the scheme’s ultimate objective was to steal money or information was not apparent.
One of the government figures being impersonated was White House Chief of Staff Susie Wiles, a close confidante of President Donald Trump, according to the news organizations.
Early in the FBI investigation into the Wiles impersonation, investigators felt the imposter was a criminal rather than a state actor, according to various sources. However, detectives looked into if there was any connection to Iran, considering that Tehran-linked hackers were suspected of previously hacking Wiles’ phone.
Rubio said he informed the FBI and the State Department’s diplomatic security when he learned about it last week.
Employees throughout the federal bureaucracy were attempting to strengthen their phone communications in response to a very different and more advanced threat even before the Rubio and Wiles imposters were made public. Washington claims that last year, hackers with the support of the Chinese government hacked into the largest telecom companies in the United States in an attempt to eavesdrop on top US officials.
Following that incident, the Department of Homeland Security and the FBI advised federal workers to utilize encrypted messaging services to prevent text message eavesdropping.
The creation of phony accounts and the use of any of the twelve free internet programs to mimic someone’s voice cannot be stopped. Therefore, the FBI and the State Department have been advising US diplomats, both in public and privately, to be more cautious while communicating and to alert their network of contacts about impersonation schemes.
According to Tobac, the cybersecurity executive, government organizations “must now focus on defense and catching attackers using deepfakes in action,”. “One way to accomplish that is to confirm identity using a different communication channel before responding to a sensitive request.”






