Drama as boffins claim to reach the Holy Grail of superconductivity

But odd results and email impersonation raise eyebrows

A pair of physicists have claimed to reach the holy grail in physics: room temperature superconductivity.

Unsurprisingly, the results have raised several eyebrows and the fear of another cold fusion fiasco. It has also led to a series of strange events involving the impersonation of a famous physicist using an encrypted email address.

But first, let’s go back to superconductivity. Superconductive magnets are used to generate powerful magnetic fields that drive everything from maglev trains to high speeds, power fusion reactors, and for medical imaging.

It’s a weird phenomenon that emerges when a substance is cooled below a certain temperature, giving it zero electrical resistance. The critical temperature varies for different materials, but it generally requires cryogenic fluids like liquid helium to force materials into their superconductive state, making superconductivity expensive and fiddly.

Physicists have been steadily increasing the temperature for superconductivity by employing tricks like increasing the pressure exerted on materials. The highest confirmed temperature yet is about 203 kelvin or -70 degrees Celsius when hydrogen sulfide is put under a pressure of about 150 gigapascals - over a million times more than the pressure of the atmosphere.

The lure of perfect conductivity and 100 per cent energy efficiency at room temperature would revolutionize everything from power grids to computers. So when a paper floating around on arXiv [PDF] promised superconductivity “at ambient temperature and pressure conditions” in silver and gold particles, people were quick to notice.

Dev Kumar Thapa and Anshu Pandey, researchers at the Indian Institute of Science, Bangalore, claim that silver particles embedded in samples of gold can become superconductive at 236 kelvin or -37.15 degrees Celsius. Thapa is apparently a student that is on the verge of, or has recently completed, his PhD thesis, and Pandey is an associate professor.

Brian Skinner, a postdoctoral researcher in theoretical condensed matter physics at the Massachusetts Institute of Technology, studied the paper. At first, he thought that the results looked consistent and was pretty convincing until he zoomed into one of the graphs.

Bring on the noise

The graph plots a material’s magnetic susceptibility - the degree at which the material becomes magnetized after a magnetic field is applied - at a given temperature. The jump up in magnetic susceptibility is when the material is approaching its critical temperature to become superconductive.

Skinner noticed that the pattern of green and blue data plots are pretty much exact copies of each other only shifted down by a constant amount. He consulted other physicists at MIT and elsewhere to see if they had encountered anything like it in their experiments. But all of them were very baffled by it and could think of no obvious explanation for it.


A graph of the results with the weird noise patterns. Image credit: Thapa and Pandey.

He then wrote a short paper on arXiv to discuss the results of the claims. “This unusual feature of repeated noise in the magnetic susceptibility has, to my knowledge, no precedent in the superconducting literature, and no obvious theoretical explanation,” he wrote.

Pratap Raychaudhuri, a professor focused on superconductivity at the Tata Institute of Fundamental Research in Mumbai, pointed out that mysterious noise patterns had been observed. They were spotted in the Schön scandal, when German physicist Jan Hendrik Schön reported a series of scientific breakthroughs that were later exposed as lies.

“By definition noise patterns are random and cannot reproduce. One of the biggest fraud in the history of physics, the Hendrik Schon scandal, was unearthed precisely by looking at the noise pattern that matches exactly in independent measurements. The Skinner report thus immediately raised a red flag of possible academic misconduct: carelessness or outright fraud,” Raychaudhuri said in a Facebook post.

It doesn’t look too good for Thapa and Pandey so far. But the story gets worse; here’s where it gets weird.

Fake email conversations

Days after his critical comments, Raychaudhuri gets an email from Tiruppattur Venkatachalamurti Ramakrishnan, also known as T. V. Ramakrishnan, a highly esteemed Indian theoretical physicist.

He asks Raychaudhuri not to criticize the authors on social media and to be patient. It also includes a string of forwarded emails that appears to be a conversation between Ramakrishnan and Pandey.


Sceptic-bait E-Cat COLD FUSION generator goes on sale for $US1.5m


Raychaudhuri fired off a stern response, and later gets a strange call from Ramakrishnan. Ramakrishnan said he saw the email thread, but said he had never sent those emails himself. “He did not have the slightest clue on who could have done this. I felt terribly embarrassed for the unkind words that I wrote and apologized,” Raychaudhuri told El Reg.

It turns out that the fake emails had been sent from a protonmail server, an encrypted email service based in Switzerland. The email account appears to have been shut down since. We asked the authors a series of questions, including if they had created the protonmail account and sent those emails to Raychaudhuri.

Anshu did not answer those questions, but told us: “We are having our results validated by independent experts in the respective research fields. This process takes time. Without validation, the synthesis and device fabrication details are speculative and will add to further confusion. We will announce the results of validation in the appropriate forum as soon as possible.”

So it looks like they aren’t giving up quite yet. But scientists aren’t convinced. “The experimental claim here is so big that I think it would take a lot of evidence to convince me and the larger physics community that there really is a room temperature superconductor. We would need to see similar results replicated by at least one other independent group, and more experimental details and more data posted,” Skinner told The Register.

Raychaudhuri agreed and said Thapa and Pandey needed to understand that their scientific reputation is at stake.

“Let them give up their greed of earning a billion dollar in patent and be more open about their data and sample. Let their colleagues convince them that it is in their best interest to do so instead of hiding behind technicalities.”

“Finally, I love the fact that we are all living in interesting times. Let us argue, let us fight, let us raise a stink and let us clear it ourselves! Let us make the best of the situation. Whether Thapa and Pandey win or not, let science win. Silence is not an option.” ®

Similar topics

Broader topics

Narrower topics

Other stories you might like

  • NASA's InSight doomed as Mars dust coats solar panels
    The little lander that couldn't (any longer)

    The Martian InSight lander will no longer be able to function within months as dust continues to pile up on its solar panels, starving it of energy, NASA reported on Tuesday.

    Launched from Earth in 2018, the six-metre-wide machine's mission was sent to study the Red Planet below its surface. InSight is armed with a range of instruments, including a robotic arm, seismometer, and a soil temperature sensor. Astronomers figured the data would help them understand how the rocky cores of planets in the Solar System formed and evolved over time.

    "InSight has transformed our understanding of the interiors of rocky planets and set the stage for future missions," Lori Glaze, director of NASA's Planetary Science Division, said in a statement. "We can apply what we've learned about Mars' inner structure to Earth, the Moon, Venus, and even rocky planets in other solar systems."

    Continue reading
  • The ‘substantial contributions’ Intel has promised to boost RISC-V adoption
    With the benefit of maybe revitalizing the x86 giant’s foundry business

    Analysis Here's something that would have seemed outlandish only a few years ago: to help fuel Intel's future growth, the x86 giant has vowed to do what it can to make the open-source RISC-V ISA worthy of widespread adoption.

    In a presentation, an Intel representative shared some details of how the chipmaker plans to contribute to RISC-V as part of its bet that the instruction set architecture will fuel growth for its revitalized contract chip manufacturing business.

    While Intel invested in RISC-V chip designer SiFive in 2018, the semiconductor titan's intentions with RISC-V evolved last year when it revealed that the contract manufacturing business key to its comeback, Intel Foundry Services, would be willing to make chips compatible with x86, Arm, and RISC-V ISAs. The chipmaker then announced in February it joined RISC-V International, the ISA's governing body, and launched a $1 billion innovation fund that will support chip designers, including those making RISC-V components.

    Continue reading
  • FBI warns of North Korean cyberspies posing as foreign IT workers
    Looking for tech talent? Kim Jong-un's friendly freelancers, at your service

    Pay close attention to that resume before offering that work contract.

    The FBI, in a joint advisory with the US government Departments of State and Treasury, has warned that North Korea's cyberspies are posing as non-North-Korean IT workers to bag Western jobs to advance Kim Jong-un's nefarious pursuits.

    In guidance [PDF] issued this week, the Feds warned that these techies often use fake IDs and other documents to pose as non-North-Korean nationals to gain freelance employment in North America, Europe, and east Asia. Additionally, North Korean IT workers may accept foreign contracts and then outsource those projects to non-North-Korean folks.

    Continue reading
  • Google opens the pod doors on Bay View campus
    A futuristic design won't make people want to come back – just ask Apple

    After nearly a decade of planning and five years of construction, Google is cutting the ribbon on its Bay View campus, the first that Google itself designed.

    The Bay View campus in Mountain View – slated to open this week – consists of two office buildings (one of which, Charleston East, is still under construction), 20 acres of open space, a 1,000-person event center and 240 short-term accommodations for Google employees. The search giant said the buildings at Bay View total 1.1 million square feet. For reference, that's less than half the size of Apple's spaceship. 

    The roofs on the two main buildings, which look like pavilions roofed in sails, were designed that way for a purpose: They're a network of 90,000 scale-like solar panels nicknamed "dragonscales" for their layout and shimmer. By scaling the tiles, Google said the design minimises damage from wind, rain and snow, and the sloped pavilion-like roof improves solar capture by adding additional curves in the roof. 

    Continue reading
  • Pentester pops open Tesla Model 3 using low-cost Bluetooth module
    Anything that uses proximity-based BLE is vulnerable, claim researchers

    Tesla Model 3 and Y owners, beware: the passive entry feature on your vehicle could potentially be hoodwinked by a relay attack, leading to the theft of the flash motor.

    Discovered and demonstrated by researchers at NCC Group, the technique involves relaying the Bluetooth Low Energy (BLE) signals from a smartphone that has been paired with a Tesla back to the vehicle. Far from simply unlocking the door, this hack lets a miscreant start the car and drive away, too.

    Essentially, what happens is this: the paired smartphone should be physically close by the Tesla to unlock it. NCC's technique involves one gadget near the paired phone, and another gadget near the car. The phone-side gadget relays signals from the phone to the car-side gadget, which forwards them to the vehicle to unlock and start it. This shouldn't normally happen because the phone and car are so far apart. The car has a defense mechanism – based on measuring transmission latency to detect that a paired device is too far away – that ideally prevents relayed signals from working, though this can be defeated by simply cutting the latency of the relay process.

    Continue reading
  • Google assuring open-source code to secure software supply chains
    Java and Python packages are the first on the list

    Google has a plan — and a new product plus a partnership with developer-focused security shop Snyk — that attempts to make it easier for enterprises to secure their open source software dependencies.

    The new service, announced today at the Google Cloud Security Summit, is called Assured Open Source Software. We're told it will initially focus on some Java and Python packages that Google's own developers prioritize in their workflows. 

    These two programming languages have "particularly high-risk profiles," Google Cloud Cloud VP and GM Sunil Potti said in response to The Register's questions. "Remember Log4j?" Yes, quite vividly.

    Continue reading
  • Rocket Lab is taking NASA's CAPSTONE to the Moon
    Mission to lunar orbit is further than any Photon satellite bus has gone before

    Rocket Lab has taken delivery of NASA's CAPSTONE spacecraft at its New Zealand launch pad ahead of a mission to the Moon.

    It's been quite a journey for CAPSTONE [Cislunar Autonomous Positioning System Technology Operations and Navigation Experiment], which was originally supposed to launch from Rocket Lab's US launchpad at Wallops Island in Virginia.

    The pad, Launch Complex 2, has been completed for a while now. However, delays in certifying Rocket Lab's Autonomous Flight Termination System (AFTS) pushed the move to Launch Complex 1 in Mahia, New Zealand.

    Continue reading
  • Alibaba Cloud adds third datacenter in Germany
    More Euro-presence than any other Chinese company, but still nowhere near Google or AWS

    Alibaba has pulled ahead of its Chinese rivals in Europe with the opening of a third datacenter in Germany.

    The company said the Frankfurt datacenter serves cloud computing products to Europe and "adheres to the highest security standards and the strict compliance regulations set out in the Cloud Computing Compliance Controls Catalog (C5) in Germany."

    The addition brings Alibaba Cloud to a network of 84 availability zones in 27 regions worldwide. The company's first European cloud center arrived in Frankfurt in 2016.

    Continue reading

Biting the hand that feeds IT © 1998–2022