Titan submersible disaster underscores dangers of deep-sea exploration – an engineer explains why most ocean science is conducted with crewless submarines

Researchers are increasingly using small, autonomous underwater robots to collect data in the world’s oceans. NOAA Teacher at Sea Program,NOAA Ship PISCES, CC BY-SA

Nina Mahmoudian, Purdue University

Rescuers spotted debris from the tourist submarine Titan on the ocean floor near the wreck of the Titanic on June 22, 2023, indicating that the vessel suffered a catastrophic failure and the five people aboard were killed.

Bringing people to the bottom of the deep ocean is inherently dangerous. At the same time, climate change means collecting data from the world’s oceans is more vital than ever. Purdue University mechanical engineer Nina Mahmoudian explains how researchers reduce the risks and costs associated with deep-sea exploration: Send down subs, but keep people on the surface.

Why is most underwater research conducted with remotely operated and autonomous underwater vehicles?

When we talk about water studies, we’re talking about vast areas. And covering vast areas requires tools that can work for extended periods of time, sometimes months. Having people aboard underwater vehicles, especially for such long periods of time, is expensive and dangerous.

One of the tools researchers use is remotely operated vehicles, or ROVs. Basically, there is a cable between the vehicle and operator that allows the operator to command and move the vehicle, and the vehicle can relay data in real time. ROV technology has progressed a lot to be able to reach deep ocean – up to a depth of 6,000 meters (19,685 feet). It’s also better able to provide the mobility necessary for observing the sea bed and gathering data.

Autonomous underwater vehicles provide another opportunity for underwater exploration. They are usually not tethered to a ship. They are typically programmed ahead of time to do a specific mission. And while they are underwater they usually don’t have constant communication. At some interval, they surface, relay the whole amount of data that they have gathered, change the battery or recharge and receive renewed instructions before again submerging and continuing their mission.

What can remotely operated and autonomous underwater vehicles do that crewed submersibles can’t, and vice versa?

Crewed submersibles will be exciting for the public and those involved and helpful for the increased capabilities humans bring in operating instruments and making decisions, similar to crewed space exploration. However, it will be much more expensive compared with uncrewed explorations because of the required size of the platforms and the need for life-support systems and safety systems. Crewed submersibles today cost tens of thousands of dollars a day to operate.

Use of unmanned systems will provide better opportunities for exploration at less cost and risk in operating over vast areas and in inhospitable locations. Using remotely operated and autonomous underwater vehicles gives operators the opportunity to perform tasks that are dangerous for humans, like observing under ice and detecting underwater mines.

Remotely operated vehicles can operate under Antarctic ice and other dangerous places.

How has the technology for deep ocean research evolved?

The technology has advanced dramatically in recent years due to progress in sensors and computation. There has been great progress in miniaturization of acoustic sensors and sonars for use underwater. Computers have also become more miniaturized, capable and power efficient. There has been a lot of work on battery technology and connectors that are watertight. Additive manufacturing and 3D printing also help build hulls and components that can withstand the high pressures at depth at much lower costs.

There has also been great progress toward increasing autonomy using more advanced algorithms, in addition to traditional methods for navigation, localization and detection. For example, machine learning algorithms can help a vehicle detect and classify objects, whether stationary like a pipeline or mobile like schools of fish.

What kinds of discoveries have been made using remotely operated and autonomous underwater vehicles?

One example is underwater gliders. These are buoyancy-driven autonomous underwater vehicles. They can stay in water for months. They can collect data on pressure, temperature and salinity as they go up and down in water. All of these are very helpful for researchers to have an understanding of changes that are happening in oceans.

One of these platforms traveled across the North Atlantic Ocean from the coast of Massachusetts to Ireland for nearly a year in 2016 and 2017. The amount of data that was captured in that amount of time was unprecedented. To put it in perspective, a vehicle like that costs about $200,000. The operators were remote. Every eight hours the glider came to the surface, got connected to GPS and said, “Hey, I am here,” and the crew basically gave it the plan for the next leg of the mission. If a crewed ship was sent to gather that amount of data for that long it would cost in the millions.

In 2019, researchers used an autonomous underwater vehicle to collect invaluable data about the seabed beneath the Thwaites glacier in Antarctica.

Energy companies are also using remotely operated and autonomous underwater vehicles for inspecting and monitoring offshore renewable energy and oil and gas infrastructure on the seabed.

Where is the technology headed?

Underwater systems are slow-moving platforms, and if researchers can deploy them in large numbers that would give them an advantage for covering large areas of ocean. A great deal of effort is being put into coordination and fleet-oriented autonomy of these platforms, as well as into advancing data gathering using onboard sensors such as cameras, sonars and dissolved oxygen sensors. Another aspect of advancing vehicle autonomy is real-time underwater decision-making and data analysis.

What is the focus of your research on these submersibles?

My team and I focus on developing navigational and mission-planning algorithms for persistent operations, meaning long-term missions with minimal human oversight. The goal is to respond to two of the main constraints in the deployment of autonomous systems. One is battery life. The other is unknown situations.

The author’s research includes a project to allow autonomous underwater vehicles to recharge their batteries without human intervention.

For battery life, we work on at-sea recharging, both underwater and surface water. We are developing tools for autonomous deployment, recovery, recharging and data transfer for longer missions at sea. For unknown situations, we are working on recognizing and avoiding obstacles and adapting to different ocean currents – basically allowing a vehicle to navigate in rough conditions on its own.

To adapt to changing dynamics and component failures, we are working on methodologies to help the vehicle detect the change and compensate to be able to continue and finish the mission.

These efforts will enable long-term ocean studies including observing environmental conditions and mapping uncharted areas.The Conversation

Nina Mahmoudian, Associate Professor of Mechanical Engineering, Purdue University

This article is republished from The Conversation under a Creative Commons license. Read the original article.

How The Super Mario Bros Movie Should Have Ended

In a world where plumbers battle evil turtles, collect gold coins, and rescue princesses, the Super Mario Bros movie was a fun adaptation that left fans wanting more. However, if you’re curious about an alternative ending that would have been much more interesting, look no further than the imaginative minds over at HISHE.

[HISHE]

Purearts Reveals Exclusive Edition of The Flash 1:1 Scale Cowl Replica (And You Could WIN One!)

The folks from Purearts have just unveiled their new 1:1 scale The Flash cowl replica, and if you are a fan of the Scarlet Speedster, you’ll definitely want to check this one out! Purearts is even giving one away! Throw your name in the hat right here!

Fourth in our line of DC / Batman collectibles, our movie-perfect 1:1 scale replica of The Flash’s cowl raises the bar! Featuring an innovative multi-layer structure delivering a never-before-seen LED light system throughout the bright red mask. The vividly lit gold veining provides a truly electrifying accent to this piece.

Fitted with a back-lit bolt emblem on the chest and removeable yellow lenses. The Flash 1/1 Cowl Replica is an undeniably unique addition to any Super Hero fans’ collection. Sprint as fast as you can to pre-order PureArts’ first Flash collectible!

The Exclusive Edition is limited to 150 units and comes with a metal replica of Flash’s ring that opens to reveal his iconic electric bolt emblem.

[THE FLASH 1:1 SCALE COWL REPLICA EXCLUSIVE EDITION | Giveaway Link]

How scammers use psychology to create some of the most convincing internet cons – and what to watch out for

Scammers are blending different types of fraud to persuade people to hand over their cash. Pixel-Shot/Shutterstock

Stacey Wood, Scripps College and Yaniv Hanoch, University of Southampton

Online fraud is today’s most common crime. Victims are often told they are foolish for falling for it, but fraudsters use psychological mechanisms to infiltrate the defences of their targets, regardless of how intelligent they are.

So it’s important to keep up with the latest scams and understand how they work.

Recently, consumer protection magazine Which? identified some of the most convincing scams of 2023. These scams all have one thing in common – they insidiously take advantage of people’s cognitive biases and psychological blind spots.

They included “pig butchering” a way of fattening up victims with affection, the missing person scam which involves posting fake content on social media pages, the traditional PayPal scam, and a new scam called the “fake app alert” in which malware is hidden on apps that look legitimate.

Pig butchering

In our work as fraud psychology researchers we have noticed a trend towards hybrid scams, which combine different types of fraud. Hybrid scams often involve crypto investments and sometimes use trafficked labour In the US alone, the FBI recently reported that people lost US $3.3 billion (£2.6 billion) in 2023 to investment fraud.

Pig butchering is a long-term deception. This type of scam combines elements of romance scams with an investment con. The name comes from the strategy of “fattening up” a victim with affection before slaughter.

It will usually begin with standard scam approach like a text, social media message, or an introduction at a job board site.

Victims may have their guard up at first. However, these scams can unfold over months, with the scammer slowly gaining the victims’ trust and initiating a romantic relationship all the while learning about their vulnerabilities.

For example, details of their financial situation, job stresses, and dreams about the life they want. Romance scammers often saturate their targets with affection and almost constant contact. Pig butchering sometimes involves several trafficked people working as a team to create a single persona.

Once the victim depends on the scammer for their emotional connection, the scammer introduces the idea of making an investment and uses fake crypto platforms to demonstrate returns. The scammers may use legitimate sounding cryptocoins and platforms. Victims can invest and “see” strong returns online. In reality, their money is going directly to the scammer.

Once a victim transfers a substantial amount of money to the con artist, they are less likely to pull out. This phenomenon is known as the “sunk cost fallacy”. Research has shown people are likely to carry on investing money, time and effort in activities they have already invested in and ignore signs the endeavour isn’t in their best interests.

When the victim runs out of money or tries to withdraw funds, they are blocked.

The victim is left with not only financial devastation, but also the loss of what they may imagine to be their most intimate partnership. They are often too embarrassed to discuss the experience with friends and family or to report to the police.

Red broken heart paper on white keyboard computer background.
It’s hard to imagine what a romance scam is like if you haven’t experienced it. Pla2na/Shutterstock

PayPal scams

Fake payment requests are a common attack that works by volume rather than playing the long game. Payment requests appear to come from a genuine PayPal address. Fraudulent messages typically begin with a generic greeting, an urgent request and a fake link.

For example, Dear User: You’ve received a payment, or you have paid too much. Please click link below for details. Users are directed to a spoofed website with a legitimate sounding name such as www.paypal.com/SpecialOffers and asked to enter their account information and password.

Both of us have received these scam requests – and even we found them difficult to discern from legitimate PayPal request emails. These scams work through mimicry and play on the human tendency to trust authority. Legitimate PayPal correspondence is usually automatic bot language, so it is not difficult to imitate.

But remember, genuine messages from PayPal will use your first and last name.

The missing person scam

This seems to be a new scam that exploits a person’s kindness. In the past, charity scams involved posing as charitable organisation responding to a recent, real calamity.

The new missing person scam is more sophisticated. The initial plea is a fake missing person post that generates likes and shares, increasing its credibility and exposure. Then the fraudster edits the content to create an investment scheme which now has the veneer of legitimacy.

This scam may work because the initial consumers are unaware that the content is fraudulent, and there is no obvious request. In psychology, this type of persuasion is known as “social proof” – the tendency of individuals to follow and copy behaviour of others.

Fake app alerts

People post mobile apps, designed to steal users’ personal information, on the Google Play or Apple app store.

The app often has a legitimate function, which gives it a cover. Consumers unknowingly jeopardise their private information by downloading these apps which use malware to access additional information.

Although there has been media coverage of Android security issues, many users assume malware cannot bypass app store screening. Again, this scam plays on people’s trust in authority figures to keep tjem safe.

Discuss any investment opportunities with friends, family members or professionals. It’s much easier said than done, but exercising caution one of the best strategies to reduce the chance of becoming a fraud victim.

Scammers count on people paying little to no attention to their emails or messages before clicking on them or providing valuable information. When it comes to scams, the devil is in the missing details.The Conversation

Stacey Wood, Professor of Psychology, Scripps College and Yaniv Hanoch, Professor in Decision Science, University of Southampton

This article is republished from The Conversation under a Creative Commons license. Read the original article.