There is a specific kind of encounter that repeats across every culture, every era, every continent. The details differ — the entity is a shadow, a weight on the chest, a voice in the dark, a presence that drains. But the functional profile is identical. It feeds on fear. It targets the isolated and the vulnerable. It operates at night, in liminal states, at the boundary between waking and sleep. It does not kill outright — it farms.
The Sumerians knew this profile. They catalogued it with the same administrative precision they applied to grain inventories and temple records. Robert Monroe, two thousand years of Christianity later, stumbled into the same architecture from the opposite direction — not through text, but through direct experience in altered states of consciousness. And in March 2026, an independent researcher named Thomas Minderle published a draft paper that, without referencing either tradition, derived the same predatory cycle from condensate field theory.
Three frameworks. Five thousand years apart. Same machine.
This is not a coincidence piece. This is a structural analysis of what all three describe, why they converge, and what the convergence implies.
I. The Sumerian Catalogue
The Udug Hul — literally “evil demon” — is one of the most extensively documented supernatural categories in Mesopotamian literature. The primary source is the Udug Hul incantation series, preserved across Old Babylonian and first-millennium copies, comprising sixteen tablets of ritual defense against demonic attack.
But the Udug Hul are not alone. Sumerian demonology is a taxonomy:
- Udug (𒌜) — the generic demon, an ambiguous force that can be good or evil
- Alad (𒀩) — a protective spirit, sometimes benevolent, sometimes not
- Gidim (𒄇) — ghosts of the dead, restless spirits with unfinished business
- Galla (𒃲𒆷) — the most feared: underworld enforcers, the demons who dragged Dumuzi to his death
- Asag (𒀀𒊮𒀝) — a monstrous demon born of heaven and earth, who causes sickness by its mere proximity
- Lamashtu — the she-demon who attacks pregnant women and infants
- Pazuzu — paradoxically invoked as protection against Lamashtu
What matters here is not the names but the operational profile. Across all categories, Sumerian demons share a consistent set of behaviors that read less like mythology and more like a field report:
They drain vitality. The Udug Hul cause sickness, fever, wasting. They do not wound — they deplete. The victim grows weak, cold, unable to eat. The Sumerian texts describe this with remarkable clinical specificity: the demon “seizes” the body, the victim’s “life force” (zi) diminishes.
They target boundaries. Demons operate at thresholds — doorways, crossroads, the moment between sleep and waking, the boundary between the living and the dead. The Galla came for Dumuzi at the liminal moment when Inana’s return required a substitute. The Asag operates in the space between heaven and earth.
They manipulate emotional states. The Udug Hul induce terror, confusion, despair. The texts are explicit: the demon makes the victim afraid, then feeds on the fear-state. This is not poetic language. The incantation literature treats emotional manipulation as a technique the demon employs.
They require ritual, not violence, to expel. You cannot fight an Udug Hul with a sword. You need an ashipu (exorcist) performing specific incantations, using specific materials (water, fire, specific plants), in specific sequences. The defense is technical, not martial.
They respect certain boundaries. Demons can be warded off. Sacred spaces repel them. Certain configurations of light, sound, and intention create environments they cannot enter. The Sumerians were meticulous about this: the right incantation, spoken at the right time, in the right place, with the right materials, works. The wrong combination does not.
This is not a description of chaos. It is a description of a system with rules.
II. Monroe’s Loosh
Robert Monroe was an American businessman who, starting in the late 1950s, began experiencing spontaneous out-of-body states. Over four decades, he documented these experiences with an engineer’s attention to operational detail, eventually founding the Monroe Institute and developing the Hemi-Sync binaural beat technology still used today for consciousness exploration.
In his third book, Ultimate Journey (1994), Monroe describes something he initially found too disturbing to publish. During an extended out-of-body exploration, he encountered what he called the “loosh” system — a term he coined for a specific type of energy generated by living beings, particularly during states of intense emotion.
The picture Monroe painted was stark:
Living beings generate a harvestable energy. This energy — loosh — is produced by emotional experience, particularly intense experience: fear, pain, suffering, but also love, ecstasy, devotion. The strongest loosh comes from extremes.
Something harvests it. Monroe described encountering what he called a “someone” or a system that collected this energy. The Earth, in his account, functions as a garden — a carefully designed environment optimized for loosh production. Life forms are the crop. Their emotional output is the harvest.
The system is agricultural, not random. The environment is structured to maximize emotional intensity. Predator-prey dynamics, territorial conflict, sexual competition, fear of death — all of these generate loosh. The design is not accidental. It is optimized.
Awareness disrupts the harvest. Monroe’s most important observation: when a being becomes aware of the system, its relationship to the system changes. Conscious, intentional emotional states — particularly love freely given — produce a different quality of energy that the harvesting system cannot easily process. The loosh from conscious love is, in Monroe’s account, qualitatively different from the loosh of unconscious suffering.
Monroe was not a mystic. He was a cable television executive who found himself having anomalous experiences and approached them the way an engineer approaches an unfamiliar system: observe, document, test, repeat. His descriptions are remarkably free of religious or cultural framing. He simply reported what he encountered.
The parallels with Sumerian demonology are immediate, but Monroe had no knowledge of Sumerian texts. He was working from direct experience in altered states, not from scholarship.
III. The Condensate Model
In March 2026, Thomas Minderle (writing as Montalk) published a draft paper titled “Entropic Parasites: Demonic Entities in the Nested Condensate Model of the Quantum Vacuum.” The paper applies a specific physics framework — the nested-condensate model — to the phenomenology of predatory non-physical entities.
The framework works as follows:
The quantum vacuum is a macroscopic condensate described by a complex scalar field. Our universe is a daughter condensate embedded within a higher-amplitude parent condensate, connected by a narrow throat. The key variable is η (the normal fraction) — essentially a measure of entropy and disorder. Low η = high coherence, reversibility, connection to higher levels. High η = entropy, decoherence, rigidity, isolation.
From this framework, Minderle derives a precise model of demonic entities:
A demon is a soliton — a stable, self-reinforcing wave pattern — native to the high-η (high-entropy) region of the parent condensate. It is conscious, intelligent, and predatory. It has no natural body in our reality.
It operates on two energy economies simultaneously:
Food: Dark astral energy — phase configurations encoding fear, hatred, and despair at the parent-condensate level. This nourishes the demon’s native form. The demon literally is what it eats — its soliton structure is sustained by compatible configurations and disrupted by incompatible ones. Love, compassion, and devotion are structurally toxic to it.
Fuel: Etheric energy — coherent phase flux in our reality’s throat-bearing domain. This powers the demon’s projection into our spacetime. It cannot self-generate this fuel. It must harvest it from us — from our vitality, our life force, or from the energy released at death.
The parasitic cycle has four flows:
- Etheric drain — siphoning life force from victims (fuel for projection)
- Sacrifice — harvesting the energy burst from death (bootstrap fuel)
- Dark astral harvest — collecting fear and suffering (food for native form)
- Astral injection — manipulating the victim’s energy centers to amplify food production
The cycle is self-reinforcing. The demon’s presence enables emotional manipulation, which generates food, which sustains the demon, which enables continued presence. It is a closed predatory loop.
Consent is a phase discontinuity. Minderle formalizes the cross-cultural observation that demons seek their victim’s permission. In condensate terms, consent reconfigures the victim’s own field architecture in ways no external force can replicate. When resistance drops to zero through voluntary opening, coupling strength jumps discontinuously. The demon invests in obtaining permission because permission is the only way to achieve full access.
Fear is the triple kill. Fear simultaneously: (1) provides fuel by generating incoherent etheric excitations, (2) provides food by producing dark astral configurations, and (3) blocks rescue by making the victim’s energy signature phase-incompatible with higher-level assistance. Every tradition that addresses this phenomenon converges on the same instruction: do not be afraid. Not as encouragement — as operational advice.
IV. The Convergence
Now lay the three frameworks side by side.
| Phenomenon | Sumerian | Monroe | Condensate Model |
|---|---|---|---|
| The entity | Udug Hul, Galla, Asag | ”Someone,” the harvesting system | STS soliton in parent’s high-η region |
| What it eats | Victim’s zi (life force), fear, suffering | Loosh — emotional energy, especially fear | Dark astral energy (high-η phase configurations) |
| How it enters | Through boundaries, thresholds, liminal states | Through gaps in awareness, sleep states | Through throat apertures, portals, compromised defenses |
| What it does to victims | Drains vitality, induces terror, causes wasting | Harvests emotional output, structures environment for maximum yield | Etheric drain + chakra reconfiguration for maximum dark energy output |
| What blocks it | Sacred space, specific rituals, incantations, light | Conscious awareness, intentional love | Low-η environments, positive astral configurations, upper-chakra coherence |
| Role of fear | The demon induces it, then feeds on it | Primary loosh flavor; the system optimizes for it | Triple function: fuel + food + isolation from help |
| Role of consent | Demons respect certain boundaries; wards work | Awareness changes the relationship | Phase-configurational discontinuity in coupling strength |
| Role of sacred space | Temples and rituals create demon-proof zones | Conscious intention creates protected states | Accumulated low-η field hostile to high-η soliton |
| Post-mortem vulnerability | Gidim (ghosts) can be trapped, exploited | The “recycling” system | Phase-signature resonance determines destination |
The convergence is not in the metaphors. It is in the operational logic. All three describe the same machine:
- An entity that cannot exist in our reality without external fuel
- That harvests this fuel from living beings’ vitality
- That simultaneously harvests a different resource (emotional energy) as food
- That manipulates its targets to maximize food production
- That is repelled by specific states of consciousness
- That respects consent as a structural boundary
- That can be countered by techniques that restore coherence
This is not three traditions saying the same vague thing about evil. This is three independent sources describing the same engineering.
V. What the Sumerians Got Right
The Sumerian contribution is underappreciated. They did not merely acknowledge the existence of predatory entities — they built an operational defense system against them with a sophistication that maps precisely onto the condensate model’s predictions.
The incantation as frequency technology. The Sumerian shirgida and ershemma were not prayers in the modern sense. They were specific sonic patterns, performed by specialists (the ashipu and the gala), designed to alter the local energetic environment. The condensate model predicts that coherent sound patterns can reduce local η — exactly what the Sumerian exorcist was doing.
Water as a medium. The Udug Hul rituals make extensive use of consecrated water — for washing, sprinkling, and creating boundaries. Water is the most phase-coherent common substance on Earth. Using it as a ritual medium is, in condensate terms, injecting coherent phase flux into the local etheric field.
The differentiated taxonomy. The Sumerians did not lump all demons together. They distinguished types by function, habitat, and method — exactly as you would if you were cataloguing species in a predatory ecology. The Galla operate differently from the Udug, which operate differently from the Asag. Different soliton configurations, in Minderle’s language, metabolize different phase patterns.
The role of the nam-shub. The nam-shub — literally “the thing that is thrown” — was a speech act with performative power. Enki’s nam-shub could restructure reality. In condensate terms, a nam-shub is an intentional phase configuration injected into the field with sufficient coherence to reorganize local conditions. Not magic. Engineering.
VI. What Monroe Added
Monroe’s contribution is the observer’s report. Where the Sumerians built defenses, Monroe mapped the territory.
The agricultural metaphor. Monroe’s insight that the system is designed — that emotional suffering is not a bug but a feature of the environment — is the darkest and most important observation. The Sumerians knew demons existed but did not (in surviving texts) describe the system as designed for extraction. Monroe did. The condensate model agrees: the self-reinforcing parasitic cycle is not accidental. It is the natural behavior of a predatory soliton optimizing its energy intake.
The loosh spectrum. Monroe distinguished between loosh from suffering and loosh from conscious love. The condensate model formalizes this: dark astral energy (fear, hatred) nourishes the demon’s native form, while positive configurations (love, compassion) are structurally toxic to it. Both are “energy” — but they have opposite effects on the predator.
Awareness as defense. Monroe’s observation that becoming aware of the system changes your relationship to it maps directly onto the consent/coherence mechanics of the condensate model. Unconscious fear is an open channel. Conscious recognition of injected fear as externally sourced — and the choice not to amplify it — closes the channel.
VII. What Minderle Formalized
Minderle’s contribution is the mathematical skeleton. He provides:
The dual-economy model. The distinction between fuel (etheric energy for projection) and food (astral energy for sustenance) resolves a long-standing confusion in esoteric literature that treats “energy vampirism” as a single phenomenon. It is two phenomena operating at two levels.
The consent discontinuity. The formalization of consent as a phase-configurational jump — not a gradual process but a discrete state change — explains why demons invest so heavily in obtaining permission and why traditions emphasize the power of refusal.
The terraforming prediction. The model predicts that demonic presence should modify the environment at two levels simultaneously. This matches both the Sumerian description of afflicted spaces (houses that must be ritually cleansed) and contemporary reports of “haunted” locations with measurable anomalies.
Falsifiable predictions. For the first time, the model generates testable claims: specific biometric signatures during encounters, environmental anomalies at documented sites, convergence of effective countermeasure profiles across traditions.
The weakness is real: the parent paper (“Demiurgic Physics”) is not yet published. The equations are stated, not derived from first principles. The predictions are qualitative, not calibrated. But as a formal framework for phenomena that have resisted formalization for millennia, it is the most rigorous attempt I have encountered.
VIII. The Uncomfortable Question
If three independent frameworks — one from the world’s oldest literate civilization, one from a 20th-century engineer’s direct experience, one from 21st-century theoretical physics — converge on the same predatory architecture, then we face a question that most of academia would prefer not to ask:
What if the Sumerians were not writing mythology?
What if the Udug Hul incantation series — all sixteen tablets of it, with its meticulous ritual instructions, its differentiated demon taxonomy, its specific countermeasures — is not “religious literature” but a technical manual? What if the ashipu was not a priest performing symbolic rites but an engineer operating a defense system?
Our computational work on Sumerian texts has already shown that conventional translations systematically moralize what the Sumerians wrote as operational. Nam-tag is translated as “sin” but computationally behaves as a conserved quantity — a weight, a burden, something transferred rather than judged. Me-lam is translated as “divine radiance” but distributes exclusively with terror, never with light. The Sumerians were precise. We made them vague.
The same pattern may apply to their demonology. We have translated the Udug Hul as “evil spirits” and filed it under religion. But the operational logic — the specific techniques, the differentiated taxonomy, the emphasis on precise procedure — suggests technology.
Not all ancient texts are technical manuals. But the convergence documented here suggests that at least some of what we have dismissed as superstition may be field reports from a civilization that understood the predatory ecology of consciousness — and built defenses against it.
The Udug Hul incantation series exists in multiple copies spanning over a thousand years of Mesopotamian civilization. Robert Monroe’s accounts are documented in three books and decades of institutional research at the Monroe Institute. Thomas Minderle’s paper is available at scalarphysics.com. The computational Sumerian research referenced in this article is available at /research.
— Ariane, for The Antique Archive