The Michael Shermer Show

A Former Spy Explains How AI is Changing Espionage

November 4, 2025

Key Takeaways Copied to clipboard!

  • The history of American intelligence is defined by three major revolutions, with the current, fourth revolution being driven by the rise of Artificial Intelligence and the geopolitical focus shifting toward China. 
  • Intelligence officers are motivated by a strong sense of mission to protect national security, and their daily reality involves significant administrative work (like expense reports) alongside operational duties. 
  • Authoritarian regimes like Russia and China suffer from intelligence failures because internal fear prevents subordinates from communicating accurate, dissenting information to leaders, a structural advantage the open American system possesses through dissent and debate. 
  • All human organizations are imperfect, and individuals within them, including government agencies, must strive to improve the system despite inherent brokenness. 
  • The modern information landscape, amplified by AI, means that ordinary citizens are now involuntarily participants in espionage, making them targets for data harvesting and influence operations. 
  • To combat the erosion of truth caused by information overload and synthetic media, society must adopt the critical thinking and verification tools used by intelligence officers, philosophers, and scientists, starting education from grade school. 

Segments

Spy Identity and Officer Life
Copied to clipboard!
(00:02:01)
  • Key Takeaway: Intelligence officers maintain secrecy about their roles, often only revealing their status upon reaching senior positions like CTO of NGA.
  • Summary: The guest, Anthony Vinci, confirms he was an intelligence officer, a role historically kept secret, only publicly acknowledging it when he became CTO of the National Geospatial-Intelligence Agency (NGA). The core mindset for intelligence officers is having a daily mission focused on protecting national security. For a case officer, this involves identifying, meeting, recruiting a source, obtaining secret information, and then spending significant time writing reports and filing expense receipts.
Classification Levels Explained
Copied to clipboard!
(00:04:28)
  • Key Takeaway: Within US intelligence, the primary classification level is Top Secret, with higher secrecy achieved through compartmentation via Special Access Programs (SAPs).
  • Summary: While the military uses ‘Secret,’ intelligence work primarily deals with ‘Top Secret’ information. Above this level, information is controlled through compartmentation, known as Special Access Programs (SAPs) or Compartmented Access Programs (CAPs), which restrict access to smaller and smaller groups of people, sometimes down to only a dozen individuals across the entire government.
Intelligence Agency Building Security
Copied to clipboard!
(00:05:47)
  • Key Takeaway: Intelligence facilities are highly secure with perimeter defenses, but internal aesthetics vary widely from institutional to modern and airy.
  • Summary: Intelligence buildings feature real security measures like tall fences and cameras, making entry difficult. Architecturally, some older facilities feel institutional, while newer ones, like the NGA building, are modern and light-filled, resembling movie sets. Contrary to cinematic depictions, most personnel work in standard offices on computers, rarely seeing the large, dramatic ‘war room’ screens.
Motivation for Intelligence Service
Copied to clipboard!
(00:08:00)
  • Key Takeaway: Service motivation often stems from family military history or a strong desire to serve following major national events like 9/11.
  • Summary: Many intelligence officers have a background of military service in their family, fostering a sense of duty. For the guest, the 9/11 attacks provided a strong motivation to serve, leading him to field intelligence work because his personality favored international travel and meeting diverse people. This career path is demanding on families due to frequent travel and time abroad.
Recruiting Sources in the Field
Copied to clipboard!
(00:11:23)
  • Key Takeaway: Recruiting sources relies heavily on patriotism and shared goals rather than coercion or financial incentives alone, and US intelligence avoids using sexual favors or blackmail.
  • Summary: The most effective sources are those motivated by their own patriotism or a desire to solve a problem, such as stopping terrorism or opposing a harmful government. While money can help, core motivations like fear or patriotism are stronger drivers for long-term cooperation. US intelligence explicitly avoids methods seen in movies, such as using ‘honeypots’ (sexual seduction) or blackmail to recruit assets.
Intelligence Role: Diplomacy vs. War
Copied to clipboard!
(00:14:25)
  • Key Takeaway: The primary goal of intelligence collection is to prevent war by providing decision-makers with better risk assessment and negotiation leverage.
  • Summary: Intelligence collection ideally keeps the nation out of war by enabling better decision-making and offers, thereby avoiding the need for ‘boots on the ground.’ Covert action, authorized primarily by the CIA, is a separate activity historically used to uphold security through means like covert influence or arming opposition groups, ideally as an alternative to large-scale military intervention.
The Four Intelligence Revolutions
Copied to clipboard!
(00:22:04)
  • Key Takeaway: The Fourth Intelligence Revolution is defined by the adversary being China and the driving technology being Artificial Intelligence.
  • Summary: The first revolution was the creation of the centralized OSS in WWII; the second was the professionalization of intelligence into permanent peacetime agencies like the CIA post-WWII (the ‘golden age’ of human espionage). The third revolution followed 9/11, focusing on counter-terrorism using networks and cell phones after previous over-compartmentalization failed. The fourth revolution is characterized by the primary adversary being China and the key technology being AI.
Intelligence Failures and Surprises
Copied to clipboard!
(00:25:53)
  • Key Takeaway: Intelligence failures often stem from either information overload (post-9/11) or an inability to predict disruptive technological breakthroughs like ChatGPT.
  • Summary: Failures like Pearl Harbor and 9/11 resulted from an inability to connect dots or process information quickly enough, leading to the need for centralized agencies. Conversely, the post-9/11 era saw data overload, exemplified by commercial satellite imagery from companies like Planet becoming impossible for human analysts to process, necessitating the turn to AI. The surprise release of ChatGPT was also an intelligence failure, as few predicted the speed and societal impact of that specific AI breakthrough.
Authoritarian Intelligence Weaknesses
Copied to clipboard!
(00:37:47)
  • Key Takeaway: Authoritarian leaders like Putin often misjudge situations because subordinates are too afraid of retribution to deliver accurate, unwelcome intelligence.
  • Summary: The danger in authoritarian societies is that information flow is suppressed; officials fear telling the leader anything that contradicts expectations, leading to massive strategic miscalculations like the initial invasion of Ukraine. Open societies benefit from redundancy and dissent within their intelligence structures, ensuring decision-makers receive varied opinions, which is absent in closed systems like Russia or China.
Asymmetric Threats and Economic Espionage
Copied to clipboard!
(00:45:48)
  • Key Takeaway: Adversaries like Al-Qaeda (terrorism) and China (economic statecraft) use asymmetric methods to harm the US because direct military confrontation is impossible.
  • Summary: Al-Qaeda used low-cost terrorism (like 9/11, costing $500k) to provoke a trillion-dollar, 20-year military response, which was a major win for them. China’s asymmetric approach involves massive economic espionage, stealing intellectual property to undercut US companies and using government influence to acquire strategic global assets like ports. The US system struggles to counter this because it strictly separates government and economy, unlike China.
Whistleblowing and Integrity
Copied to clipboard!
(00:50:44)
  • Key Takeaway: Edward Snowden committed treason by illegally leaking classified information, bypassing established, lawful whistleblower channels designed to address agency overreach.
  • Summary: The core requirement for an intelligence officer is integrity, as lives depend on their decisions when operating alone. Lawful mechanisms exist for whistleblowers to report concerns, such as going to an Inspector General or elected officials, which Snowden failed to utilize. The proper democratic response to intelligence overreach, like the NSA’s surveillance programs revealed by Snowden, is public debate and legislative change, not unauthorized disclosure.
Government Service Reality
Copied to clipboard!
(01:02:11)
  • Key Takeaway: Most government employees are dedicated citizens trying their best, despite organizational flaws.
  • Summary: Ninety-nine percent of government workers go to work daily believing they are doing their best, often choosing public service over higher-paying private sector jobs. The speaker, a former case officer, returned to government service at the NGA at a senior level, finding the organization deeply broken. Success in such environments is defined by achieving a small fraction of intended improvements, such as a one-third success rate on initiatives.
Omaha Steaks Advertisement
Copied to clipboard!
(01:03:37)
  • Key Takeaway: Omaha Steaks offers gourmet, high-quality gifts guaranteed to impress for holiday entertaining.
  • Summary: Omaha Steaks provides tender, juicy filet mignons and gourmet sides, making holiday entertaining effortless. Every cut is aged, hand-trimmed by master butchers, and guaranteed to impress. Listeners can save 50% site-wide during the Sizzle All the Way sale using promo code FLAVOR for an extra $35 off at Omahasteaks.com.
Historical Skepticism of Spying
Copied to clipboard!
(01:04:35)
  • Key Takeaway: Historical figures like Henry Stimson demonstrated skepticism toward peacetime intelligence gathering but embraced it during wartime.
  • Summary: Henry Stimson, former Secretary of State and War, shut down the peacetime intelligence agency known as the Black Chamber because he disliked the idea of reading mail. However, he immediately reinstated the agency during wartime, admitting the necessity of using all available means. This historical precedent shows a recurring tension between privacy concerns and wartime intelligence needs.
Citizens’ Role in Espionage
Copied to clipboard!
(01:05:36)
  • Key Takeaway: American citizens are now inherently involved in the intelligence game, facing risks from foreign data exploitation.
  • Summary: The current situation is not a formal war like WWII, but American citizens are part of the intelligence game where their everyday information is being taken, even that of children, as exemplified by TikTok data concerns with China. Listeners likely have social media information influenced by foreign adversaries or malware created by cyber mercenaries. As Trotsky’s quote suggests, even if one is not interested in espionage, espionage is interested in them.
Navigating Truth in the AI Age
Copied to clipboard!
(01:06:56)
  • Key Takeaway: The goal of authoritarian societies may be to foster distrust by proving that no objective truth exists, necessitating critical thinking skills.
  • Summary: The challenge today is that truth can be changed by flooding the zone with information or by creating convincing synthetic media that undermines visual evidence. This environment leads to cynicism, where the goal is not to own the truth but to convince people that nothing can be trusted. Society must learn to trust again by employing tools like triangulation, critical thinking, and using multiple sources, skills that should be taught from grade school.
Government Transparency and Pre-bunking
Copied to clipboard!
(01:10:36)
  • Key Takeaway: Government transparency and teaching critical thinking skills, including pre-bunking, are essential defenses against future information warfare.
  • Summary: Transparency, such as providing raw data alongside recommendations, is the best way for government agencies to offset public distrust, allowing citizens to make their own calls. Teaching innate critical thinking skills, similar to how cybersecurity is taught, can help society function better amidst dissonance. Pre-bunking involves proactively informing people about anticipated misinformation tactics before they are deployed by adversaries.
Goldbelly Advertisement
Copied to clipboard!
(01:12:00)
  • Key Takeaway: Goldbelly ships iconic, famous foods nationwide, serving as a perfect gift solution.
  • Summary: Goldbelly allows users to order famous foods from restaurants across the country, including Chicago deep dish pizza and Maine lobster rolls. It is presented as the most perfect gift option for food lovers. New customers can receive 20% off their first order using the promo code GIFT at goldbelly.com.
Cornerstone AI Productivity Tools
Copied to clipboard!
(01:12:35)
  • Key Takeaway: Cornerstone Galaxy AI agents boost productivity by personalizing learning and automating administrative tasks.
  • Summary: Cornerstone Galaxy AI agents transform static content into smart conversations and handle administrative duties within existing workflows. This technology allows humans to focus on their strengths while AI manages repetitive tasks. Businesses can visit Cornerstoneondemand.com to see how AI can modernize their workforce development.