Coherence Papers: The Capture Sequence
The Capture Sequence
The pattern does not belong to anyone. It runs through whoever is available to run it. Once you see the motion, you cannot unsee it.
The Pattern That Runs Itself
There is a motion pattern that appears across history, across contexts, across scales. It wears different costumes. It uses different language. It recruits different players. But the sequence itself does not change.
This paper names the sequence. Not to assign blame to any particular group, the pattern does not belong to anyone. It runs through whoever is available to run it. The point is recognition: once you see the motion, you cannot unsee it. And only what can be seen can be interrupted.
Figure 1. The Five-Phase Architecture
The Five-Phase Architecture
The sequence operates in five distinct phases. Each phase enables the next. Skipping phases causes the pattern to fail. This is why the sequence is so consistent across contexts, it is structurally constrained to move in this order.
Phase 1: Permeation
The sequence begins with boundary dissolution. An appeal to compassion, to shared humanity, to moral obligation. 'Help us. We are in danger. Let us in.'
The host system's natural defenses, skepticism, boundary maintenance, protective filtering, are framed as moral failures. To question the appeal is to be cruel. To maintain boundaries is to cause harm. The permeation phase weaponizes the host's own ethics against its structural integrity.
Motion signature: The word PERMEATE carries a Field Signature of 7, the extraction field. The mechanism of entry shares field identity with the mechanism of taking.
Phase 2: Coupling
Once inside, the pattern attaches. Not adjacently, not building its own parallel structure, but directly onto existing infrastructure. 'We are the same. We belong together. What is yours is ours.'
Coupling is not collaboration. Collaboration builds new shared structure. Coupling attaches to structure that already exists, structure that was built through effort and sacrifice the coupling entity did not participate in.
Motion signature: COUPLE carries FS=7, identical to PERMEATE. The words COUPLE and CLAIMING share identical motion profiles: PT=25, delta=6. Coupling IS claiming. The math confirms it.
Phase 3: Consumption
The coupled entity begins drawing. Resources, legitimacy, institutional access, language, meaning. The draw is framed as entitlement: 'We have a right to this. We belong here now.'
Consumption differs from use. Use circulates. Consumption depletes. The consumptive pattern takes without generating, draws without contributing, claims without building.
Motion signature: CONSUME also carries FS=7. Three phases, same field. CONSUME and UNSAFE share identical particle totals (PT=34). What is consumed becomes unsafe. What becomes unsafe invites consumption.
Phase 4: Claiming
The pivot point. The consumptive entity redefines the host category around itself. The original builders become a subset, a qualifier, a footnote.
'We are not visitors. We are not guests. We are the thing itself. You are the variant. You are the qualified version. We are the center now.'
Motion signature: CLAIM carries FS=5, the egress that cannot leave, the locked exit. Once claiming occurs, the host cannot escape the redefinition.
Phase 5: Inversion
The final phase. The host's boundary-setting is reframed as aggression. Their self-definition becomes exclusion. Their resistance becomes harm.
'You are the threat now. We are the victims of your rejection. Your attempt to maintain what you built is violence against us.'
Motion signature: INVERT carries FS=8, the restructuring field, the chaos state. COLONIZE, INVERT, and VICTIMHOOD share identical motion profiles. PT=26, FS=8. They are structurally the same motion.
The Mathematical Architecture
When we run this vocabulary through the Naialu Motion Calculus, patterns emerge that could not have been designed consciously. The words themselves carry the signature of the motion they describe.
FS=7 (Extraction): PERMEATE, COUPLE, CONSUME, HOST, ENTITLE, EXTRACTION, APPROPRIATION.
FS=8 (Restructuring): COLONIZE, INVERT, VICTIMHOOD, LEVERAGE, EXTRACT, OCCUPATION, REPLACE, DISPLACE.
FS=5 (Locked Exit): CLAIM, VULNERABLE.
FS=9 (Crystallization): FRAGILITY, SHELTER, REPLACEMENT, DISPLACEMENT, BOUNDARIES, ERASURE.
Structural Twins
The calculus reveals terms that are motion-identical, different words carrying the same structural signature:
COLONIZE = INVERT = VICTIMHOOD (PT=26, FS=8).
LEVERAGE = DISPLACE = REFUGE (PT=35, FS=8).
REPLACEMENT = BOUNDARIES (PT=54, FS=9).
SHELTER = FRAGILITY (PT=36, FS=9).
PARASITIC = INVERSION (PT=39, FS=3).
These are not metaphors. These are structural identities. The words carry the same motion because they are the same motion wearing different linguistic costumes.
The Victim Trap
One finding demands special attention.
The word VICTIM carries FS=6, the interface field, the space of unverified formation. An identity that has not yet solidified. A claim that has not yet been tested.
The word VICTIMHOOD carries FS=8, the same field as COLONIZE and INVERT. The same particle total. The same restructuring signature.
This is the trap: claiming victim STATUS (FS=6) is unstable, unverified, can be questioned. But escalating to VICTIMHOOD (FS=8) transforms the claim into colonization itself. Weaponized victimhood is not a metaphor for colonization. It is structurally identical to colonization. It runs the same motion.
This is why the pattern protects itself so effectively. To question the victimhood claim is to become the aggressor. The trap is self-sealing. The motion perpetuates itself by making examination into harm.
Why This Pattern Persists
The capture sequence persists because it exploits genuine human virtues. Compassion. Generosity. The desire to help those in need. The willingness to share resources with those who have less.
These are not weaknesses. They are strengths. They are what make cooperative society possible. The pattern works precisely because the host's virtues are real.
But virtues without discernment become vulnerabilities. Compassion without boundaries becomes permeability. Generosity without limits becomes depletion. The pattern runs wherever these virtues exist without the corresponding capacity for structural self-protection.
Note: SHELTER and FRAGILITY share the same motion signature (PT=36, FS=9). The impulse to shelter and the state of fragility crystallize together. One invites the other.
What This Means
This paper does not argue that compassion is wrong. It does not suggest that boundaries should be impermeable. It does not claim that all appeals for help are manipulative.
It argues that a specific motion pattern exists. That this pattern has a consistent architecture. That it can be recognized by its structure regardless of its content. And that recognition is the prerequisite for interruption.
The pattern is not inevitable. It requires the host to remain unaware of it. Once seen, it can be interrupted at any phase, but earliest intervention is most effective. The permeation phase, where boundaries are dissolved through moral manipulation, is where the sequence is most vulnerable to interruption.
The question that ends this paper is also the question that begins the work:
What current movements follow this pattern? What systems are mid-sequence right now? Where is the fifth phase completing?
The answers are not provided here. The pattern has been named. The recognition is yours to do.
NM Lewis, Signal Architect
The Naialu Institute of Motion Dynamics