A recent attempt to impersonate U.S. Secretary of State Marco Rubio using artificial intelligence has raised alarm within diplomatic and cybersecurity circles. The U.S. State Department confirmed that AI-generated voice and text messages were sent to at least five high-level individuals, including three foreign ministers, a U.S. senator, and a state governor.
The impersonation campaign used voice cloning and relevant tech to send communications via platforms like Signal, SMS, and voicemail. The State Department described the messages as unsophisticated and unsuccessful. However, despite this, it took the matter seriously and issued a global cable on July 3 warning U.S. embassies and consulates about potential risks.
Note that there was a similar scheme earlier in May 2025 involving Susie Wiles, the Chief of Staff of Donald Trump. The scheme used her contact list to spread AI-generated messages designed to deceive prominent individuals. No breaches of systems were reported, but officials emphasized the potential threat posed by social engineering via artificial intelligence.
Cybersecurity experts explained that AI tools now require only 15 to 20 seconds of recorded audio to create realistic voice clones. This capability presents a new challenge for governments and organizations, as malicious actors can impersonate public figures with increasing accuracy and speed, creating opportunities for fraud, phishing, and geopolitical manipulation.
The FBI had previously issued alerts regarding this growing threat. Intelligence agencies are now emphasizing the importance of validating communication sources. This is especially true for sensitive matters. The incident underscores the urgency of updating cybersecurity protocols and educating stakeholders on the risks posed by artificial intelligence impersonation.
Officials are still working to identify the perpetrators behind the Rubio impersonation. However, investigations are ongoing, and both domestic and international partners have been advised to remain vigilant. The situation serves as a cautionary example of how emerging technologies can be weaponized to undermine trust and stability in international relations.