Another general technique: attacks on computing systems. (Both takeover / subversion (dropping an email going ‘um this is a problem’) and destruction (destroy the US power infrastructure using Russian-language programs)).
These don’t tend to be sufficient in and of themselves, but are “classic” stepping-stones to e.g. buy time for an AI while it ramps up.
Another general technique: attacks on computing systems. (Both takeover / subversion (dropping an email going ‘um this is a problem’) and destruction (destroy the US power infrastructure using Russian-language programs)).
These don’t tend to be sufficient in and of themselves, but are “classic” stepping-stones to e.g. buy time for an AI while it ramps up.