Etymon Explorer / hijacking

subversive seizure of systemic sovereignty, where an external entity insinuates itself within a control structure, co-opting its protocols and redirecting its purpose towards novel objectives, often through surreptitious manipulation or strategic infiltration of key interfaces and feedback loops.