Foundational Paper · Core Mechanism

Consumptive Mechanics

The physics of predation, field distortion, and systemic harm.

Some identity configurations remain stable by consuming others.

This is not a metaphor. It is a structural fact about how certain systems survive. Where a generative system increases its coherence through internal work, a consumptive system increases its coherence by taking from adjacent systems and the surrounding field. The appearance of stability is identical. The mechanism is inverse.

This paper names that mechanism, maps its structural signatures, and shows the characteristic arrangement it produces: a Predator, Battery, and Captured triad visible in the motion calculus before it is visible in behavior. A forensic application at the end demonstrates the triad in a de-identified three-system case.

The implication is practical. If predation is structural, it can be detected structurally, before the damage, before the collapse, and before the behavioral evidence anyone can point to exists.

≈ 28 min read Predator · Battery · Captured Foundational · Core Mechanism
Methodology Note

This paper presents findings derived from the Naialu Motion Dynamics Framework. The proprietary elements of the framework, including alphabet mappings, particle derivation, metric calculation formulas, and Residual Vector computation, are protected intellectual property and are not disclosed in this document. Specific threshold values that distinguish signatures are described qualitatively; the exact numeric criteria are held under NDA.

Results are presented for independent engagement. Verification access to the full computational record is available under NDA by contacting the Institute. For the canonical framework reference, see Framework at a Glance.

Dependencies

This paper builds on prior documents in the Naialu Motion Dynamics framework:

  • The Naialu Motion Calculus: An Ontology of Motion (Lewis, 2025) establishes the foundational ontology, measurement framework, and the derivation of Field States and metrics.
  • The Invariance Principle of Identity (Lewis, 2025) establishes the structural signature of identity configurations that remain coherent under scaling. Consumptive Mechanics describes the pathological inverse.

This paper does not re-establish those premises. It extends their application to the dynamics of extraction between asymmetrically positioned systems.

Abstract

Consumptive Mechanics describes the structural dynamics by which certain identity configurations achieve apparent stability not through internal coherence, but through the extraction of coherence from other systems and the surrounding field. Where the Invariance Principle describes identity structures that scale cleanly, Consumptive Mechanics describes the pathological inverse: identity structures that survive only by consuming others.

This paper provides a motion-based physics of predation, maps the Predator, Battery, and Captured triad observable in consumptive systems, and demonstrates through a de-identified three-system analysis that consumptive dynamics are measurable and detectable through motion calculus before catastrophic harm occurs. Applications span executive screening, organizational health assessment, leadership selection, and institutional protection.

01Introduction

The Invariance Principle established that certain identity configurations scale cleanly: their structural integrity is preserved under pressure, their coherence is generated internally, and their interactions contribute to the surrounding field rather than drawing from it.

This paper addresses the inverse case. Some identity configurations cannot generate coherence internally. They are not self-stabilizing. To maintain apparent stability, they must extract coherence from adjacent systems and export their unprocessed entropy into the field. This is not a character flaw. It is a structural mechanism. And it has a measurable signature.

Traditional assessment frameworks identify predatory patterns only after harm occurs. Behavioral evidence, pattern recognition, psychiatric classification: all describe what is visible on the surface after the damage has scaled. By that point, the structural dynamic has been operating for years.

The motion calculus operates beneath the behavioral surface. It describes the structural signature that produces the behavior, not the behavior itself. Under this framework, predation is not a diagnosis but a configuration: a particular arrangement of propulsion, retention, coherence, and field effect that can be identified before scaling produces visible harm.

Non-Essentialism Clause

This is not a claim about innate human categories. The signatures described here are configurations, not types. A single person's system may move between roles across different fields, across time, or under shifting load. The paper describes what a consumptive arrangement looks like structurally, not which individuals are permanently classified within it. Structural signatures describe mechanics, not essence.

02Core Definitions

Before describing the mechanic, the framework requires a small set of terms used with specific technical meaning throughout the paper. Each is grounded in the motion calculus; formulas are held under NDA.

Working Definitions
  1. Coherence (C): the degree of internal alignment and structural integrity within a system. High coherence indicates minimal internal contradiction; low coherence indicates divergent or conflicting internal patterns requiring external stabilization.
  2. Field Coherence (Cfield): the aggregate coherence of the relational and environmental space surrounding interacting systems. A consumptive system may increase its local C while decreasing Cfield. The asymmetry is the signature of extraction.
  3. Entropy Load (H): the measure of disorder, unprocessed contradiction, and structural instability within a system. When entropy is neither integrated nor dissipated, it must be exported. This is the thermodynamic driver of consumptive behavior.
  4. Consumptive Node: an identity system whose stability is field-dependent rather than self-sustaining. Structurally analogous to an engine that no longer generates net new coherence, but simulates stability by drawing it from adjacent systems.
  5. Extraction Vector: the directional flow of coherence from one system to another. In healthy interactions, extraction vectors are bidirectional and roughly balanced. In consumptive dynamics, they are strongly inbound to the consumptive node and weakly outbound.
  6. Entropy Export: the process by which a system offloads its internal disorder into adjacent systems or the field. Manifests as chaos, confusion, instability, and degradation in receiving systems while the exporting node maintains apparent calm or control.
  7. Generative Node: a system that increases coherence primarily through internal realignment and structural integration. Generative systems show balanced energy distributions, high coherence relative to capacity, and interactions that preserve or increase field coherence.

03The Core Mechanic

The governing relationship is straightforward:

Consumption = Coherence Theft + Entropy Export

A consumptive system draws coherence in and pushes disorder out. The direction of flow is asymmetric and sustained. The two movements are not separate; they are the same mechanism viewed from different sides. What the consumer pulls in stabilizes them. What the consumer pushes out destabilizes the field around them.

Three pathways for entropy

Every system must manage its entropy load. There are three pathways, and the one a system uses is structurally legible.

Figure 1 · Three pathways for handling entropy
Integration
Processing contradiction internally

Disorder is converted into coherent structure. This is structural repair, shadow work, genuine growth. It increases local coherence without extracting from the field.

Dissipation
Releasing processed entropy

Entropy is released as completed cycles, not as harm to others. Healthy systems show measurable dissipation in their energy expression distribution.

Export
Offloading unprocessed entropy

Disorder is transferred into adjacent systems or the field. The entropy does not disappear. It moves. Someone else pays the processing cost.

Consumptive systems are characterized by near-zero dissipation combined with elevated outward projection. They move energy without metabolizing it.

A system that cannot process its own entropy must put it somewhere. In the structure, it goes outward. The field around a consumptive system does not become chaotic by accident. It becomes chaotic because that is where the consumptive system's disorder is being stored.

The entropy-motion link

Entropy load correlates directly with motion variables. A system that oscillates frequently, reversing direction often relative to its wave count, is carrying high internal disorder. This pattern is useful for adaptation, but also for manipulation and reframing. Under scaling pressure, it enables shadow inversion: the system flips its presentation while maintaining forward motion. Care can present as control, protection as entrapment, opportunity as exploitation. The surface content inverts; the underlying structure does not.

Masking and consumption

A critical distinction separates two strategies that often co-occur but serve different structural functions.

  • Masking is an interface strategy: how the system presents itself in order to remain accepted within the field. Masking hides both underlying instability and extraction behavior. It is camouflage.
  • Consumption is a structural mechanism: how the system actually maintains itself. While masking addresses appearance, consumption addresses survival. It is the weapon.

In a non-invariant identity operating through consumptive mechanics, the coupled dynamic unfolds as follows. Internal contradiction builds, generating rising entropy. The system cannot integrate. Instead, it builds a mask to remain accepted and extraction channels to remain stable. The mask permits proximity. The extraction provides fuel.

Masking is camouflage. Consumption is the weapon.
One preserves access. The other preserves the consumer.

04The Predator, Battery, and Captured Triad

When a consumptive system operates within a field, other systems assume characteristic roles in relation to the consumptive dynamic. Motion calculus reveals three primary structural signatures that together constitute the stable configuration of a consumptive arrangement. The triad is the centerpiece of this diagnostic capability and represents what no surface-level assessment can detect.

These are structural roles, not permanent types. A single system may move between roles across different fields or across time, depending on power, context, and load. The utility of the triad is that when all three signatures co-exist in a closed field, the configuration is predictable in its dynamics.

Figure 2 · The Predator, Battery, Captured triad
Predator
Consumptive engine
Structural signature
  • Propulsion elevated above generative range
  • Retention suppressed below generative threshold
  • Dissipation near zero: entropy moved, not processed
  • Coherence low relative to apparent output
  • High directional instability: reactive, inverting
Field behavior

Cannot self-stabilize. Exports entropy into the field. Extracts coherence from adjacent systems. Under low stakes, may present as high-charisma, high-output, apparently generative. Under scaling, the shadow inverts stated identity: care becomes control, opportunity becomes exploitation, protection becomes entrapment.

Battery
High-capacity stabilizer
Structural signature
  • Propulsion and retention balanced within generative range
  • Very high coherence
  • Very high field saturation
  • Moderate directional instability: adaptive, directionally stable
Field behavior

Generates and holds coherence. Saturates the field with stabilizing presence. Provides structural wealth others cannot create. Carries collective tension. High exploitation risk when placed near consumptive systems: becomes both fuel source (through coherence extraction) and camouflage (the system looks stable because they are in it).

Captured
Conscripted engine
Structural signature
  • Raw capacity consistent with a battery profile
  • Propulsion elevated toward predatory range: mirrors the predator
  • Retention suppressed below generative threshold
  • Coherence suppressed relative to capacity
  • Momentum often highest of all types: the captured engine runs hard
  • High directional instability: highly adaptive, bendable
Field behavior

Native capacity of a battery, functional pattern of a predator. The structural evidence of capture. Runs motion for whoever controls direction. Under healthy conditions would be change-maker, driver, creator. Under capture, motion is re-aimed under coercion, identity is bent to serve the system, and the system cannot discharge its own entropy. Collapse manifests as internal fragmentation, exhaustion, trauma symptoms, or explosive breaking away when the field can no longer be held.

The diagnostic insight is the discrepancy between capacity and function in the captured system: raw structure consistent with a battery, functional pattern consistent with a predator. The gap between the two is the evidence of entrainment.

Traditional assessment sees only current behavior. Motion calculus sees the structural deformation that produced it. A system whose raw capacity says generative and whose functional output says predatory is not weak. It is exploited. That distinction only becomes visible when capacity and function are measured separately.

05Structural Capture

Mechanism of capture

Capture occurs through sustained exposure to a consumptive field combined with power asymmetry. The target system's natural adaptability, normally a strength, becomes the vector of entrainment. High torque and high directional flexibility allow the system to reconfigure itself to survive within the predatory field. Over time, this survival adaptation becomes structural. The captured system begins to run the predator's motion pattern even when the predator is not present.

Capture is not weakness. It is what happens to strength when strength is placed inside a field that requires entrainment as the cost of remaining in it.

Detection signatures

Capture is visible in four structural markers:

  • The capacity to function gap: raw capacity consistent with a generative profile, while functional energy distribution mirrors the predator's.
  • Suppressed coherence relative to capacity: the system is not organizing at the level its structure could support.
  • Elevated momentum under suppressed retention: the captured system runs hardest of all types while holding almost nothing internally.
  • Directional flexibility above the generative range: the system is being reconfigured faster than it can stabilize.

None of these markers, taken alone, prove capture. All four together, especially when the system is in sustained proximity to a consumptive node, constitute the signature.

Why capture persists

Capture persists because leaving is structurally expensive. The captured system has been shaped to process the predator's field. Removal from that field collapses the compensatory structure without restoring the original configuration. This is why escape appears behaviorally erratic: the system is operating without the shape it was held in. Recovery is not a return but a rebuilding.

06Forensic Application

The following is a de-identified analysis of a real three-system configuration, preserved solely to illustrate the triad in operation. The raw metric values are held under NDA. The structural pattern and the comparative relationships are presented below.

The original analysis was produced with appropriate consent and de-identified prior to inclusion in any public paper. No identifying details are disclosed, and the case functions strictly as a proof-of-concept for the triad dynamic under real-world conditions.

Figure 3 · The triad in operation
System B · Battery
high coherence, high saturation
System A · Predator
propulsion-dominant, low coherence
Extraction. System B's structural wealth flows toward System A's deficit. The battery fuels the predator while the predator's field presence makes it appear central to the system's success.
System C · Captured
battery capacity, predator function
Entrainment. System C's energy distribution has been bent to mirror System A's pattern. The capacity remains battery-class; the function has become predator-serving. System C runs the motion; System A directs it.
Field effect. System A exports entropy while extracting coherence. System B absorbs the entropy cost while providing coherence fuel. System C executes at high momentum while the system appears productive. The collective field (Cfield) degrades while System A's local stability increases.

The configuration can persist as long as the battery has coherence to provide and the captured engine has capacity to run. When either is exhausted, the system collapses visibly. The structural damage accumulates throughout.

Comparative signatures

Across the three systems, the structural relationships that matter for the diagnosis are comparative, not absolute. Specific argumentative values:

  • Coherence differential between Predator and Battery is approximately 15 to 1. The Battery holds fifteen times the structural wealth. The Predator produces apparent output without structural backing.
  • Energy distribution of Predator and Captured are structurally near-identical. Both run propulsion-dominant in the 76 to 79 percent range with retention suppressed in the 20 to 24 percent range. Despite nearly identical capacity to the Battery, the Captured system's functional pattern tracks the Predator's.
  • Momentum of the Captured system is more than double the Battery and approximately seven times the Predator. The captured engine runs hardest of all three, executing motion at scale while retaining almost nothing for itself.
  • Field saturation of the Battery is roughly six times the Predator's. The Battery's presence dominates the field through structural weight. The Predator's presence registers through projection and intensity, not mass.

None of this requires psychological assessment, behavioral observation, or post-hoc analysis. The motion signatures contain the structural information. The harm trajectory is predictable from the configuration alone.

07What Motion Calculus Would Have Detected

Applied to this configuration before collapse, the motion calculus would have surfaced four structural findings:

  • System A. Consumptive signature. Elevated extraction risk. Unsuitable for positions of unchecked power. Structural constraints required for any role that places the system in proximity to high-coherence peers.
  • System B. Battery signature. Elevated exploitation risk. Should not be paired with consumptive systems without explicit protective structure. The battery's stability masks the extraction occurring around them.
  • System C. Capture in progress. Functional pattern shifting toward a predatory profile despite battery-class capacity. Intervention indicated. The longer the capture persists, the more expensive recovery becomes.
  • Configuration. Consumptive triad. Predicted outcome: field degradation, system damage, eventual visible collapse. Structural separation or institutional safeguards indicated.

This is a configuration read, not a moral read. The motion calculus does not know who is "bad." It knows which arrangements of coherence, propulsion, and retention are structurally consumptive, structurally exploitable, and structurally captured. The diagnosis is of the arrangement. The ethical and practical responses are downstream.

The numbers do not lie.
The structure speaks.

08Toward Structural Protection

Consumptive Mechanics provides a structural physics of predation. It explains how certain identity configurations survive not through internal coherence but through extraction. It maps the triad that emerges when a consumptive system operates at scale. It demonstrates why traditional assessment systems consistently fail to detect predatory patterns before harm occurs.

Applications

The implications are immediate and practical across several domains:

  • Executive and leadership selection. High-stakes roles concentrate consumptive risk because scaling amplifies shadow inversion. Structural pre-screening identifies extraction-compatible signatures before they are placed in unchecked power.
  • Organizational health assessment. An organization housing a consumptive triad will appear productive while field coherence degrades. Motion calculus detects the degradation directly, not through the behavioral symptoms that eventually surface.
  • Institutional protection. Batteries and captured systems within an institution can be identified and structurally supported before collapse becomes visible. Recovery is cheaper than replacement.
  • Clinical and relational contexts. The framework can inform but does not replace clinical judgment. It provides a structural language for what clinicians often identify behaviorally, and may surface configurations that behavioral assessment cannot yet see.

Why traditional assessment misses this

Traditional assessment frameworks are oriented toward behavior, history, and pattern recognition after events occur. They work with surface data and they work well within that scope. Consumptive Mechanics operates beneath the behavioral surface. It describes the structural dynamic that produces the behavior, not the behavior itself. A system can display benign behavior while running a consumptive structure; conversely, a system can display alarming behavior while running a sound structure under acute stress. The two levels are not identical, and distinguishing them is the work the motion calculus does.

Limitations

The signatures described here are configurations, not persons. They shift. A system may be a Battery in one field and a Captured in another; a system under acute load may register signatures that do not persist once load releases. The diagnostic utility comes from sustained configurations in stable fields, not from single-point reads under stress. Repeated measurement under varied conditions is essential to distinguish configurational signatures from transient ones.

The framework requires ethical training to apply. Structural diagnosis of consumptive patterns creates real risk of misuse, particularly when applied to individuals in asymmetric power relationships. The Institute restricts application training accordingly.

If predation is structural, it can be detected structurally, before the damage, before the lawsuits, before the collapse. The signatures do not require a victim to speak. The field already carries the evidence.

Proprietary Elements

The full metric signatures for the three-system forensic analysis, the specific threshold values that distinguish generative, consumptive, captured, and battery profiles, and the computational formulas underlying the motion calculus are held under NDA. The structural claims, triad definitions, and the comparative relationships presented in this paper are public. Verification access to the complete computational record is available under NDA by contacting the Institute.