Preparation
AI-Assisted Capability Development
Archive Data
Authorization Token Staging
Boot Order Manipulation
CCTV Enumeration
Circumventing Security Controls
Data Obfuscation
Data Staging
Delegated Preparation via Artificial Intelligence Agents
Device Mounting
Email Collection
External Media Formatting
File Download
File Exploration
Hardware-Based Remote Access (IP-KVM)
Impersonation
Increase Privileges
IT Ticketing System Exploration
Joiner
Media Capture via External Device
Mover
Network Scanning
On-Screen Data Collection
Oversight Circumvention and Control Degradation
Persistent Access via Bots
Physical Disk Removal
Physical Exploration
Physical Item Smuggling
Private / Incognito Browsing
Read Windows Registry
Remote Desktop (RDP)
Security Software Enumeration
Social Engineering (Outbound)
Software Installation
- Installation of Dark Web-Capable Browsers
- Installing Browser Extensions
- Installing Browsers
- Installing Cloud Storage Applications
- Installing FTP Clients
- Installing Messenger Applications
- Installing Note-Taking Applications
- Installing RDP Clients
- Installing Screen Sharing Software
- Installing SSH Clients
- Installing Virtual Machines
- Installing VPN Applications
Software or Access Request
Suspicious Web Browsing
Testing Ability to Print
VPN Usage
- ID: PR038
- Created: 15th April 2026
- Updated: 15th April 2026
- Contributor: Kasey Olbrych
AI-Assisted Capability Development
A subject uses artificial intelligence systems to acquire knowledge and understanding that enables them to bypass controls, exploit systems, or perform actions outside of their legitimate business needs.
This behavior involves interacting with AI tools, such as browser-based assistants or integrated software features, to obtain explanations, procedural guidance, or technical instruction that can be directly applied within the organizational environment. Through iterative prompting, the subject refines their understanding, resolves uncertainties, and develops the capability required to execute actions they would not otherwise be able to perform.
Unlike traditional research methods, which rely on static sources and require independent interpretation, AI systems provide responsive, context-aware assistance that accelerates comprehension and reduces the effort required to translate knowledge into action. This allows subjects to overcome technical barriers quickly and operate beyond their expected level of expertise.
The defining characteristic of this behavior is the development of actionable capability through AI-assisted understanding, specifically where that capability can be used to defeat controls, circumvent safeguards, or misuse access. The subject is not simply gathering information, but actively building the means to act in a way that conflicts with organizational policy or intent.
This preparation technique may support a wide range of downstream behaviors across the matrix, including unauthorized access, data manipulation, process circumvention, or anti-forensic activity. The AI system functions as an on-demand technical guide, enabling the subject to operationalize intent without formal training or prior experience.