Axum
- Axiom

- Jan 26
- 7 min read
The Axum network breaks people down as a means of social experimentation and social engineering. The network implements interference to an individual's natural landscape by introducing abstract anomalies, often using illegal means, to subject the target to false perceptions of reality in order to depattern the individual and reinforce those false perceptions of reality.
The participants create a false landscape and use false directives combined with gaslighting and mocking, using the subject or target's private personal information against them obtained illegally through persistent cyberstalking of the target in an attempt to coerce the target into adopting the false landscape as normal which would be a normal subject's disposition as the target's natural subconscious disposition believes, assumes or attempts to rationalize, that conformity with the false directives will result in a retraction of the personal abuse directed toward them.
The false landscape created then goes through a series of retractions so that then the individual's conformity with the false perception of reality that was created has now been removed, further isolating the target, ostracizing the individual who then becomes subject to the same process pattern again, now twice removed from the 'normal reality' of the original landscape.
The Axum network includes the individuals who participate in the process of implementing the Axiom Protocol.
This process is not fiction as it pertains to the real-life experience of the individual.
For some special targets, this process occurs over the course of several years. The subject becomes aware that this is happening to them at some point after repeated exposure to varying degrees of abuse, but attempts to maintain a concerted effort at willful denial that it is happening as they attempt to lead a normal life and are aware that attempting to explain these real-life experiences in any rational way is impossible. However, the participants in the Axum network exist throughout the real-life existence of the target. The target becomes aware that they have not just experienced a string of bad luck, but rather a coordinated effort by the Axum network to reject them from various aspects of society including opportunities of employment, ability to develop personal relationships and even participate as a consumer of everyday products and services.
SCENARIO:
Subject applies for a job. During the interview, the hiring manager says something like, "I have a picture of a green cat hanging on the wall in my bedroom." The subject has a picture of a green cat hanging on the wall in their bedroom. How would the hiring manager know this? Has the hiring manager been in the subject's bedroom?
Methods of deconstruction directed at the target include, but are not limited to, subjecting the target to persistent lying and willful induction of false perceptions of reality involving the subject or target. This includes, but is not limited to the interception and/or disruption of electronic communications such as blocking, spoofing and/or rerouting phone calls, text messages, e-mail, etc., and transmitting alternate, misleading or other forms of disinformation to disrupt the accurate exchange of information (without the target's knowledge) and also includes intentional distortions of reception or transmission of in person dialog, such as intentionally implementing willful misinterpretation of an attempted exchange of information by way of adding false conditions to an exchange to create the perception that a party involved during an attempt by the target to exchange information is rejecting any willful attempt by the subject or target to be understood in an accurate manner.
Individuals participating in the Axum network often include employers, coworkers and even outside participants such as customers or individuals posing as customers who seek to create what may be way overgeneralized as a toxic work environment. One primary component involved with this process involves an attempt to repeatedly frustrate the target by way of repetition of random nonsense that the target struggles to understand and cannot, because the language used cannot be understood in any logical way, and then the Axum participant may top off the experience by gaslighting the subject, as in the scenario mentioned above.
In one example involving a real-life scenario, a family member repeatedly entered a subject's residence when he was not home and added small amounts of dish soap to a container of dish soap that the subject kept next to the kitchen sink. The family member then later showed up at the special target's residence when they were home and kept talking about dish soap and even went so far as to ask the target how long a container of dish soap lasts. The target, confused as to why there was even a conversation taking place that involved dish soap responded with something like, "I don't know how long a container of dish soap lasts, but that one seems to be lasting for a long time for some reason." To which them family member responded by laughing at him and then mocking him. The special target was unaware that the family member had entered their residence while they were away as the family member had no access or permission to access the residence. The family member never admitted to accessing the residence while the target was not home but clearly created the experience, referenced the experience and then denied any involvement. This is a real-life scenario wherein a family member of a special target was actively participating as a member of the Axum network that was assigned to this specific special target. This example involved a parent doing this to her grown adult son.
__________
There is an element of the Axiom Protocol that involves altering the subject’s perception of people in a way that makes them appear as if they are someone else to the subject, or special target of the operation. A subject affected by this particular element of the protocol observes the physical appearance of an individual participant member of the Axum as someone other than who they are. In this way, the special target may visually perceive someone who they think they know as someone else they may or may not know, or even someone who they have never even met before as someone other than they appear to be. This only occurs with regard to the perception of the special target.
For example, a group of people in a room who all know each other will perceive each other as who they know each other to be while a special target in the same setting may perceive one or more of the individuals in the room as someone else while ever other member of the group perceives every other member of the group as who they know them to be. The member of the Axum who initiates the control variable may impose the false perception of the target onto another individual without that other individual’s knowledge creating the perception for the special target that an unsuspecting 3rd party is someone other than who they appear to be causing an abstract interaction between two individuals who unknowingly perceive each other to be someone other than who they are. This can add layers of complexity to the deception that one or both members of an exchange affected by this protocol experience if, for example, the perception of a favorable party is exchanged for the perception of an unfavorable party, creating a negative dialog, for example, wherein a normally positive dialog would take place, making the exchange confusing to one or both parties depending on whether one or neither member of the exchange is aware that the protocol is being implemented.
In one example, an Axum may knowingly appear to the special target to be someone other than who they are for the purpose of first-person, third-person direct method deception wherein the special target is the victim of the Axum who is aware that they are intentionally deceiving the special target by way of direct interaction with the subject as they knowingly appear to the special target to be someone other than who they are. In this example, the Axum may falsely appear to the special target as a trusted confidant in order to gain access to privileged information that the special target would not divulge to most people that individual even knows, let alone a stranger, in order to gain access to privileged information divulged under the guise of helping or assisting a friend or a known confidant. A password, gate code, etc.
During one real-life documented scenario involving the practical application of this element of the Axiom Protocol, the subject or special target victim unknowingly divulged their location at a private residence to someone they believed to be a known confidant who winded up being an imposter who the victim willingly allowed to enter the residence because they believed them to be someone other than who they were. The special target victim was at the location of the private residence at that time.
The subject received a text message and a phone call from who he believed to be his brother and sister-in-law at a residence where he was staying that he believed was owned by them. This was not their primary residence.
So when he heard a knock at the door, he opened the door.
The man who he believed to be his brother was just standing there with a dirty look on his face. The woman who he believed to be his sister-in-law was facing straight down at the ground so all he could see was the top of her head. She said, “We didn’t know if it would work here.”
“You didn’t know if ‘what’ would work here?” The target subject asked, confused.
They were not who he thought they were. This is NOT fiction.
The woman who he believed to be his sister-in-law, whose real name he believed to be, Amy Lewis, was acting very strange. Every time he, the special target, referred to her as ‘you’, as in, for example, when he asked, “Would you like something to drink?” She would respond using her own name. “Amy? Would Amy like something to drink?” He didn’t know why she was doing that.
The man who he believed to be his brother, whose real name he believed to be, Joe Cronin, was just standing there, not saying much.
Amy continued to speak to him in a very odd manner. He did not know his sister-in-law that well, but thought very highly of both her and his brother. His brother worked as a financial advisor and his sister-in-law worked as a lawyer. It seemed odd to him that it seemed as if she was picking on him, making odd remarks and berating him for no reason. And his brother just stood there not saying anything.
He stood on the kitchen side of the small counter with overhanging cabinets that were above most of the length of the kitchen counter and Joe stood behind the overhanging cabinets while Amy faced him across the counter over the short distance where the overhang ended and the countertop continued.
To be continued...

Comments