Upload
others
View
7
Download
0
Embed Size (px)
Citation preview
SONAR JAMMING IN THE BAT-MOTH ARMS RACE
BY
AARON J. CORCORAN
A Dissertation Submitted to the Graduate Faculty of
WAKE FOREST UNIVERSITY GRADUATE SCHOOL OF ARTS AND SCIENCES
in Partial Fulfillment of the Requirements
for the Degree of
DOCTOR OF PHILOSOPHY
Biology
May, 2013
Winston-Salem, North Carolina
Approved By:
William E. Conner, Ph.D., Advisor
Nickolay Hristov, Ph.D., Chair
Miriam Ashley-Ross, Ph.D.
Robert Browne, Ph.D.
Susan Fahrbach, Ph.D.
ii
DEDICATION
To the late James Fullard, the primary proponent of the jamming hypothesis. You meant
so much to me, despite our brief acquaintance.
iii
ACKNOWLEDGEMENTS
To say thank you is not nearly enough for the numerous people who have inspired me, taught me, challenged my thinking repeatedly in the kindest of ways, and worked by my side night after night until the sun rose. But here I attempt to do just that.
First, I thank Dr. William (“Bill”) Conner, my academic advisor and mentor over the last five years. You taught me what it means to be a scientist in the most complete sense of the word. Somehow you always knew when to give me a push and when to let me find my own way (usually the latter). I know few people with your breadth of knowledge from genes to neurons to behaviors to ecosystems and more. And you have an uncanny ability to relate that knowledge to your students whether in the classroom or one-on-one. You taught me how to simplify a problem into its constituent parts and dissect it experimentally with the skill of a surgeon. Your door was always wide open, literally and figuratively and you treated me as a friend and colleague from day one.
I thank my academic committee – Drs. Miram Ashley-Ross, Robert Browne, Susan Fahrbach, and Nickolay Hristov – for pushing my boundaries as a scientist. I must also thank my master’s advisor, Dr. Joe Szewczak, for sharing his love of bats with me; my brothers Dan and Tim Corcoran and Tom Brown Jr. for inspiring in me a love of all things wild; and my mom and dad for teaching me to always follow my heart and for unending faith that I would find my path in life. I thank my wife, Lauren, for keeping me grounded and humble through this journey.
Many others contributed directly to my research. Dr. Jesse Barber and Dr. Nickolay Hristov, my academic elder brothers, set the stage for this work with their ground-breaking studies on bats and moths. They also selflessly helped me at every turn, be that training me how to care for and raise baby bats, how to use high-speed cameras or develop 3-D models, or whatever the moment demanded. I had five extraordinary Wake Forest undergraduate researchers – Megan Cullen, Wesley Johnson, Ryan Wagner, Zachary Walker, and Kaitlyn Roman – work with me over the summers at Wake and in southern Arizona. I could not have asked for a harder working or more insightful and intelligent group to work with than you. I am especially thankful to Ryan Wagner, whose exceptional devotion to the project led to chapter five of this dissertation. My good friends Jean-Paul Kennedy and Nick Dowdy also worked with me in the field in Arizona and your companionship and dedication made all the difference, especially on those nights when everything seemed to go wrong and all there was left to do was crack open a beer and watch the sun rise.
I am also especially grateful to the staff, interns and fellow researchers at the Southwestern Research Station where I spent four summers studying bats and moths. There are too many of you to name here, but your help and comradery brought me joy as
iv
much as did the charismatic bats and moths I got to know so well. Several people also helped with the many technological challenges of this work. Most notably, Jeff Muday was always at hand to fix a computer glitch, or even build a new computer. Mark Jenson built a custom microphone to specification for chapter five; Manfred Berger provided assistance with his Maxtraq software and Brad Chadwell graciously provided computer code and gave me lessons on 3D Geometry. Finally, I must thank Mindy Conner, who graciously edited many of the pages of this work. Of course any errors left here are mine alone.
Chapter-specific acknowledgements
Chapter II -- I thank F. Insana and the staff of the Southwestern Research Station for assistance collecting B. trigona; M. Cullen for providing bat care and training; N. Hristov and J. Muday for technical assistance; and B. Chadwell for software. M. Conner, J.-N. Jasmin, T. Eisner, and the Wake Forest University ecology group provided editorial comments. Funding for research was provided by National Science Foundation Grant IOB-0615164 to W.E.C. and a W.F.U. Dean’s Fellowship to A.J.C.
CHAPTER III – I am most grateful to Frank Insana, Jeff Paull, and the staff of the Southwestern Research Station for assistance collecting B. trigona; Megan Cullen for bat care; Jeff Muday for technical support; and Brad Chadwell for software development. Two anonymous reviewers provided several insightful and constructive comments. Funding was provided by grant #IOB-0615164 to W. E. C. by the National Science Foundation.
CHAPTER IV -- I thank Wesley Johnson, Ryan Wagner, Zachary Walker, Jean-Paul Kennedy, Nick Dowdy and several Southwestern Research Station interns for assistance in the field. Brad Chadwell provided software for 3-D calculations. Nickolay Hristov helped develop our field recording setup. Jeff Muday provided technical assistance, and the staff of the Southwestern Research Station provided valuable logistical support. Melinda Conner edited the manuscript, and two anonymous reviewers provided numerous valuable comments.
CHAPTER V -- I thank the staff and interns of the Southwestern Research Station of the American Museum of Natural History for logistical support. Dr. Bradley Chadwell provided software for 3-D analysis. Jeffrey Muday provided technical computing support. Funding was provided by National Science Foundation grant number IOS-0615164 and IOS-0951160 to W. E. C.
v
TABLE OF CONTENTS
Page
DEDICATION .................................................................................................................... ii
ACKNOWLEDGEMENTS ............................................................................................... iii
LIST OF FIGURES ......................................................................................................... viii
LIST OF TABLES ............................................................................................................. xi
ABSTRACT ...................................................................................................................... xii
CHAPTER I
Bats and tiger moths: an introduction ......................................................................1
CHAPTER II
Tiger moth jams bat sonar
Published in Science (2009)
ABSTRACT ...............................................................................................17
INTRODUCTION .....................................................................................18
METHODS ................................................................................................20
RESULTS/DISCUSSION..........................................................................21
REFERENCES AND NOTES ...................................................................24
SUPPORTING MATERIAL .....................................................................29
CHAPTER III
How do tiger moths jam bat sonar?
Published in Journal of Experimental Biology (2011)
ABSTRACT ...............................................................................................42
INTRODUCTION .....................................................................................43
vi
MATERIALS AND METHODS ...............................................................46
RESULTS ..................................................................................................53
DISCUSSION ............................................................................................58
CONCLUSION ..........................................................................................64
REFERENCES ..........................................................................................66
CHAPTER IV
Sonar jamming in the field: Effectiveness and behavior of a unique prey defense
Published in Journal of Experimental Biology (2012)
ABSTRACT ...............................................................................................83
INTRODUCTION .....................................................................................84
MATERIALS AND METHODS ...............................................................87
RESULTS ..................................................................................................93
DISCUSSION ............................................................................................96
CONCLUSION ........................................................................................105
REFERENCES ........................................................................................108
CHAPTER V
Optimal predator risk assessment by the sonar-jamming moth Bertholdia trigona
ABSTRACT .............................................................................................125
INTRODUCTION ...................................................................................126
MATERIALS AND METHODS .............................................................131
RESULTS ................................................................................................139
DISCUSSION ..........................................................................................143
REFERENCES ........................................................................................149
vii
CONCLUSIONS AND FUTURE DIRECTIONS...........................................................165
CURRICULUM VITAE ..................................................................................................169
viii
LIST OF FIGURES
CHAPTER I
Figure 1.1 Spectrogram of an echolocation attack sequence of a Myotis bat .............15
CHAPTER II
Figure 2.1 Jamming acoustic complex ........................................................................26
Figure 2.2 Predicted and observed success rates for Eptesicus fuscus attacking moths using various defensive strategies. ............................................................27
Figure 2.3 Example echolocation attack sequence of a bat being jammed by Bertholdia trigona .....................................................................................28
Figure 2.S1 Attack persistence of Eptesicus fuscus on clicking moths through successive foraging nights .........................................................................36
Figure 2.S2 Oscillogram of a Bertholdia trigona click modulation cycle. ...................37
CHAPTER III
Figure 3.1 Diagram illustrating bat flight parameters. ................................................72
Figure 3.2 Example pulse interval graph of a big brown bat unsuccessfully attacking a sonar-jamming moth. ..............................................................................73
Figure 3.3 Oscillograms, spectrograms and power spectra of an approach phase echolocation call of a big brown bat (Eptesicus fuscus) and two overlapping click modulation cycles of Bertholdia trigona. .....................74
Figure 3.4 Three categories of bat behavioral responses to moth clicks, as illustrated by bat flight and echolocation behavior. ....................................................75
Figure 3.5 The distribution of bat responses to moth jamming changed after the first two nights of the experiment......................................................................76
ix
Figure 3.6 Spectrograms of three attacks on silent control or clicking experimental moths. .........................................................................................................77
Figure 3.7 Simulations of competing hypotheses of sonar-jamming mechanisms .....79
CHAPTER IV
Figure 4.1 Diagram of field recording setup .............................................................115
Figure 4.2 Ethogram showing results of bats attacking clicking and silenced Bertholdia trigona. ...................................................................................116
Figure 4.3 Three-dimensional flight trajectories of bats attacking clicking, and silenced Bertholdia trigona exhibiting defensive maneuvers. .................117
Figure 4.4 Percentage of bat attacks in which Bertholdia trigona exhibited defensive behaviors, and bat capture rates on moths exhibiting different combinations of behaviors .......................................................................118
Figure 4.5 Percentage of moths diving, and captured by bats relative to moth distance from a light source. ..................................................................................119
Figure 4.6 Box plots of bat-moth distances and bat echolocation pulse intervals at the initiation of Bertholdia trigona defenses and bat approaching behavior .120
Figure 4.7 Directionality of Bertholdia trigona diving behavior in response to bat attack ........................................................................................................121
Figure 4.8 Cross-species comparison of the effectiveness of insect defenses at preventing capture by bats. ......................................................................122
CHAPTER V
Figure 5.1 Hypothesized predator risk level as it relates to predation stage .............156
Figure 5.2 Three-dimensional simulation of the sonar beam of a bat attacking a moth, and a spectrogram of the bat echolocation sequence with two-dimensional plots of the bat’s echolocation beam shape and direction relative to the target ........................................................................................................157
x
Figure 5.3 Three-dimensional schematic of field setup for recording bat attacks on tethered and free-flying moths .................................................................158
Figure 5.4 Acoustic and kinematic characterization of “real” and “false” threats ....159
Figure 5.5 Predicted and actual clicking thresholds for different bat echolocation pulse-intervals in Bertholdia trigona .......................................................161
Figure 5.6 Discrimination of bat passes that did or did not elicit clicking by tethered Bertholdia trigona in the field. ................................................................162
Figure 5.7 Cost-benefit models of escape behavior with varying prey knowledge of predator attack stage ................................................................................164
xi
LIST OF TABLES
CHAPTER II
Table 2.S1 Contact rates for repeated big brown bat attacks on individual Bertholdia trigona ........................................................................................................38
Table 2.S2 Click parameters for the tiger moth Bertholdia trigona. ...........................39
CHAPTER III
Table 3.1 Multiple linear regressions of bat flight and echolocation responses to moth jamming. ...........................................................................................80
Table 3.2 Bat echolocation responses to moth jamming ...........................................81
CHAPTER IV
Table 4.1 Capture rates of Bertholdia trigona by bat species ..................................123
xii
ABSTRACT
Aaron J. Corcoran
SONAR-JAMMING IN THE BAT-MOTH ARMS RACE
Dissertation under the direction of William E. Conner, Ph.D. Professor of Biology
Bats and moths are an example of a diffuse evolutionary arms race – a situation
where groups of prey and predator species evolve increasingly sophisticated means to
out-compete the other. Chapter one provides an overview of this arms race. Bats capture
night-flying insects using highly sophisticated echolocation and flight. Most
macrolepidoptera are eared and bat echolocation calls stimulate evasive flight reactions.
Some tiger moths (Lepidoptera: Erebidae, subfamily Arctiinae) also respond to bats with
trains of ultrasonic clicks which 1) truthfully or deceitfully warn bats of a distasteful prey,
2) startle bats, or 3) interfere with or jam bat sonar. Evidence is strong for the warning
and startle hypotheses, although the startle effect is ephemeral. The jamming hypothesis
has not been confirmed to occur in nature.
In chapter two I tested the sonar jamming hypothesis using a moth (Bertholdia
trigona) that clicks at over 1000% of the rate of other tiger moths that have been studied
behaviorally. I pitted tethered B. trigona and silent control moths against naïve, lab-
reared big brown bats (Eptesicus fuscus) in a flight room over seven nights, followed by
two nights against B. trigona with ablated tymbal organs. The bats captured control
moths 400% more often than clicking B. trigona. Bats ate 78% of silenced B. trigona,
refuting the acoustic aposematism hypothesis. Bats failed to habituate to the clicking
moths, rendering startle highly unlikely. The pattern of bat capture success matched the
predictions of the jamming hypothesis. Additionally, the bat echolocation’s pattern
xiii
during attack was disrupted by moth clicking. We conclude that moths that click at a high
rate jam bat sonar, a first in the natural world.
In chapter three I analyzed 3-D flight trajectories and echolocation behavior of
bats attacking jamming moths to determine how moth clicks interfere with bat sonar. I
simulated attacks based on three hypotheses from the literature. Predictions based on the
ranging interference hypothesis were largely met. This hypothesis holds that moth clicks
disrupt the bat’s ability to determine the time of arrival of returning echoes, and therefore
the distance of the prey. It was previously shown that moth clicks degrade bat ranging
ability from 5 mm to 20 cm; I found that bats missed prey by 15.7 ± 7.9 cm, a margin
very close to what was previously predicted. Moth clicks occurred in the narrow 1-ms
window required for ranging interference 78% of the time.
Chapter four reports the results of the first field study on bats and insects to
capture interactions in 3-D. Sonar jamming is highly effective in nature, as B. trigona
with ablated tymbals were caught ten times more often than clicking B. trigona. Jamming
is about three times as effective as evasive flight alone. B. trigona exhibited evasive flight
including directional fly-aways and dives. Diving and jamming was particularly effective
as all moths exhibiting both behaviors escaped bats.
In chapter five I address why moths click when they do using the perspective of
optimal escape theory. Employing a combination of field and laboratory studies, I
demonstrate that moth clicking thresholds closely match predicted optimal thresholds for
discriminating legitimate attacks and “false attacks” where bats attack nearby moths.
Moths clicked as soon they could reliably determine they were under attack.
1
CHAPTER I
BATS AND TIGER MOTHS: AN INTRODUCTION
Arms races – situations where competing organisms evolve reciprocally
repeatedly over time – have fascinated biologists because of the intricate and
sophisticated adaptations that often result from them (Dawkins and Krebs, 1979). Prey
and predator are one system where arms races sometimes occur. Selection is thought to
act more strongly on prey because their consequences for failure (death) are greater than
that for predator (a lost meal). This is called the life-dinner principle (Dawkins and Krebs,
1979). Indisputable examples of reciprocal evolution between individual prey and
predator species (coevolution) are rare at least in part because prey often have many
predators and predators usually have many prey (Brodie and Brodie, 1999). Groups of
predators and prey evolving reciprocally is termed diffuse coevolution (Janzen, 1980),
however concrete examples of this phenomenon are also rare (Goerlitz, 2010; Vermeij,
1994). Bats and insects provide one of the best-studied examples of a diffuse
coevolutionary arms race, with over 800 bat species predating uncountable species of
insects (Jones and Rydell, 2003). This diversity has allowed for the evolution of many
novel defensive strategies and predator counter-tactics (Conner and Corcoran, 2012).
This dissertation is an exploration of one defensive strategy that has not previously been
confirmed to occur in the natural world – sonar jamming. In this introduction I discuss
some strategies used by bats and insects in this coevolutionary battle, the evidence for
and against sonar jamming and a brief overview of the chapters that follow.
2
A. Insectivorous bats
There are over 1200 extant bat species that evolved from a common ancestor at least
52.5 mya (Jepsen, 1966; Schipper et al. 2008; Simmons et al., 2008; Simmons and
Conway, 2003). Bats evolved flight first, followed by laryngeal echolocation (Simmons
et al., 2008). These features allow bats to be the dominant predator of night skies, with
about 70% of species eating insects in almost all inhabitable locations worldwide (Jones
and Rydell, 2003). Bats capture insects in the air (hawking), off the ground or vegetation
(gleaning), and from the surface of water (trawling) primarily using echolocation
(Schnitzler and Kalko, 2001; Fenton, 1990).
Bats sense insect prey and other objects in their environment by comparing the timing
and time-frequency characteristics of emitted signals with those of returning echoes; this
is termed echolocation, biosonar, or sonar (Griffin et al., 1960; Moss and Surlykke, 2001).
While capturing insects out of the air, bats modify their echolocation in a stereotyped
pattern where pulse repetition rates increase and durations, call intensities and
frequencies decrease (Figure 1.1; Surlykke and Moss, 2000). These changes help
maximize temporal resolution of prey location while avoiding overlap between outgoing
and returning sounds (Wilson and Moss, 2004). In the final phase of echolocation before
insect capture – the terminal buzz – bats emit sounds at over 160 pulses per second using
the fastest known mammalian muscle (Elemens et al., 2011).
B. Insect flight and hearing
Insects evolved flight at least 350 mya, some 90 million years before the first
winged vertebrates (Grimaldi and Engel, 2005). Flying nocturnal insects were likely an
3
underexploited food resource until the evolution of bats (Jones and Rydell, 2003). Insects
from 7 orders have evolved bat-detecting ears at least 18 times in locations all over the
body (Hoy, 1998; Yack and Dawson, 2008). These ears alert ground-dwelling insects like
katydids to be still and flying insects like moths to begin evasive flight when an
echolocating bat is near (Belwood and Morris, 1987; Roeder, 1967). Insect hearing
usually matches the range of frequencies used by conspecific bat communities (Fullard,
1998). In many cases bat-detection is the only known function for insect ears; however
this defensive ability appears to have preadapted some insects for acoustic courtship
displays (Conner, 1999; Nakano et al. 2009).
C. Anti-bat insect defenses
Insect defensive responses to bats – and particularly those of moths – have been the
subject of numerous studies over the last five decades (reviewed by Miller and Surlykke,
2001; Yager et al. 2012; Conner and Corcoran, 2012). Kenneth Roeder is credited with
many discoveries that made moth defensive responses to bats a textbook example of a
behavior whose neurological basis is known (Roeder, 1967). This discovery was aided by
the simple two-neuron auditory nerve of most Noctuid moths (Roeder, 1964; Roeder,
1966). These two neurons are the more sensitive A1 cell and the less sensitive A2 cell.
When the A1 cell fires in response to the faint calls of distant bats, moths fly away from
the sound source to avoid being detected (Roeder, 1962; Roeder, 1974). When the A2
cell fires (or possibly when the A1 and A2 cells fire above a set rate), this indicates a
nearby bat in pursuit, and the moths initiate powered or passive dives, loops, or spirals to
avoid capture (Roeder, 1974; Fullard et al. 2003; Ratcliffe et al. 2009). Many tiger moths
(Lepidoptera: Erebidae, Subfamily Arctiinae), also produce trains of ultrasonic clicks in
4
response attack echolocation of bats (Fullard and Fenton, 1977; Barber and Conner, 2006;
Corcoran et al. 2010). The function of these clicks has been the matter of some debate.
Fifty years of research has produced three hypotheses on why moths click to bats.
First, the warning, or aposematism hypothesis states that clicks serve as an acoustic
message to bats of an unpalatable prey. Many tiger moth caterpillars sequester toxins
from host plants and carry them into adulthood (Nishida, 2002); some adult tiger moths
also seek toxins from plants that make them distasteful to bats (Conner and Weller, 2004;
Hristov and Conner, 2005a). Mounting evidence shows that warning of this toxicity is the
primary function for tiger moth clicking in most species (Dunning, 1968; Hristov and
Conner, 2005b; Ratcliffe and Fullard, 2005). Bats must learn the association between
clicking and toxic prey; it is not innate. However, this can happen very quickly over a
small number of trials (Bates and Fenton, 1990; Hristov and Conner, 2005b). This
observation was used to tease apart the relative contributions of clicking and toxins in
deterring bats using a novel learning approach where naïve, lab-reared bats were pitted
against prey that varied in their abilities to click and in the presence or absence of toxins
(Hristov and Conner, 2005b). Bats only failed to capture clicking prey when they were
chemically defended – a clear demonstration of the aposematic function of the clicks.
This learning approach was also used to demonstrate Batesian and Mullerian mimicry
in tiger moths (Barber and Conner, 2007). After bats learn the aposematic message of
moth clicks, they will generalize that message to other species, regardless of whether the
novel species is chemically defended. Interestingly, some bats correctly uncovered the
deceitful mimics. This demonstrates the tight selective pressure that forces mimics to
acoustically resemble their models (Barber and Conner, 2007; Barber et al. 2009).
5
The second hypothesized function for moth clicks is that they startle bats at a critical
moment of the attack, affording the moth a moment to escape. Startle has been
demonstrated in several studies (Miller, 1991; Stoneman and Fenton, 1988; Bates and
Fenton, 1990), however the effect is ephemeral. Bats usually habituate to moth clicks
within a few trials. Therefore, a startle defense can only be relied upon when clicking
moths are rare. Startle has similarities with the third hypothesis – sonar jamming – in that
both rely upon disorienting the predator. Sonar jamming is different from startle in that
the moth clicks must interfere with the bat’s echolocation. This hypothesis is the subject
of this dissertation and the evidence for and against it will now be reviewed.
D. The sonar jamming debate
The term “sonar jamming” was first used in the literature in 1979 by James Fullard
and colleagues (Fullard et al. 1979). However, some have interpreted earlier work by
Dunning and Roeder (1965) to be suggestive of the jamming hypothesis. Dunning and
Roeder played moth clicks to bats through a loudspeaker as the bats pursued mealworms
that were catapulted through the air. The moth clicks deterred the bats; however the
control of broadcasted echolocation calls had no effect. They suggested that since the bats
did not learn to ignore the clicks over time and capture the palatable mealworms that the
clicks themselves deterred the bats. However, it was later acknowledged that the results
of the experiment were invalid, as the moth clicks were broadcast at an unnaturally high
intensity (Dunning, 1968). Dunning later conducted experiments demonstrating the
aposematic function of moth clicks (Dunning, 1968), and Roeder also favored this
explanation (Roeder, 1967).
6
Fullard and colleagues have been the strongest proponents of the jamming
hypothesis. It was originally argued that moth clicks bear strong acoustic similarities to
bat calls, and bats would not be able to differentiate the two (Fullard et al. 1979). Bats
would then mistake moth clicks as echoes from objects that don’t exist (“phantom
objects”) and bats would either try to avoid flying into phantom objects or try to capture
phantom targets. Since this hypothesis was proposed much has been learned about bats’
abilities for discriminating sounds. This work suggests that bats would have little
difficulty differentiating moth clicks from echoes (Masters and Raver, 1996; Yovel et al.
2009; Corcoran et al. 2010).
Fullard also suggested that the timing of moth clicking is suggestive of a jamming
function (Fullard, 1994). Using playbacks of bat attack sequences to moths in a sound
chamber, Fullard found that the moths click most during the terminal phase. He argued
that this would be too late for the clicks to serve an aposematic function, and that clicking
late is suggestive of jamming. However, this prediction was not held, as clicks presented
late in the attack are effective aposematic messages (Hristov and Conner, 2005b;
Ratcliffe and Fullard, 2005; Barber and Conner, 2007).
The most compelling evidence for sonar jamming prior to this dissertation began
with the work of Lee Miller (Miller, 1991). Miller used a psychophysical experiment to
test the effect of moth clicks on a bat’s ability to determine the distance of a target (this is
called ranging). In his experiment a bat was placed on a Y-shaped platform in an
“echolocation simulator”. When the bat echolocated, its calls were recorded by a nearby
microphone and then time-delayed and broadcast back to the bat to simulate targets at
different distances. If a target was presented at a pre-determined reference distance, the
7
bat was rewarded for moving to one side of the Y-shaped platform; if the target was
presented at a different distance the bat was rewarded for moving to the other side of the
platform. This was repeated with and without moth clicks being broadcast with the
echoes and the timing of the moth clicks relative to the returning echoes was carefully
controlled and adjusted in fine increments. Miller found that without moth clicks, bats
could determine target distance to within 5 mm, but when moth clicks were presented
within a narrow 1-ms window before the echoes, ranging errors increased by up to
4000%. The moth clicks appeared to interfere with the bats ability to accurately
determine the timing of the returning echo, and therefore the distance to the target.
This hypothesis – termed the ranging interference hypothesis – was given further
support by a neurophysiological study where bat short pure tones and moth clicks were
broadcast to bats while electrophysiological recordings were made of neurons in the bat
inferior colliculus (IC; Tougaard et al. 1998). The IC has been implicated as a region
where bats encode information about target distance (Covey and Casseday, 1991).
Tougaard and colleagues demonstrated that when moth clicks occurred in the 1-ms
window prior to a tone (representing an echo), they caused errors in the timing of IC
neuron firing in response to the tone. If these errors propagated through the bat auditory
system they could explain the ranging interference observed by Miller (1991). Because
moths have no way of knowing when a bat will be calling, they cannot predict when to
click to match the critical 1-ms window. The only remaining strategy is to click at a very
high rate to ensure some clicks will fall in this window by chance (Miller 1991; Tougaard
et al. 1998). In a study documenting the diversity of sounds made by tiger moths (Barber
and Conner, 2006), several species were identified that produce clicks at an unusually
8
high rate. These moths make over ten times the number of clicks of any of the tiger moth
species whose clicking function has been studied in detail.
I hypothesized that the high clicking rate of some tiger moth species allows them
to jam bat sonar. In Chapter II, I report the results of an experiment pitting a moth with
extraordinary clicking ability (Bertholdia trigona) against naïve, lab-reared bats using a
previously established behavioral learning paradigm (Hristov and Conner, 2005b; Barber
and Conner, 2007). In Chapter III, I analyze the results of this experiment using 3-D
analysis of bat flight trajectories and detailed bioacoustic analysis of bat echolocation
patterns to address the question of how tiger moths jam bat sonar. In Chapter IV I report
the results of the first study to capture bat-insect interactions in 3-D in the natural
environment. This study was conducted using the same focal moth species – Bertholdia
trigona—and I examine the relative contributions of clicking and evasive flight to bat
deterrence. Finally, in Chapter V I report the results of an experiment aimed at answering
the question of why moths click when they do. I use the perspective of optimal escape
theory to demonstrate that moth clicking thresholds closely match predicted optimal
thresholds for discriminated predator risk levels.
9
LITERATURE CITED
Barber, J. R. and Conner, W. E. (2006). Tiger moth responses to a simulated bat attack:
timing and duty cycle. Journal of Experimental Biology 209, 2637-2650.
Barber, J. R. and Conner, W. E. (2007). Acoustic mimicry in a predator–prey
interaction. Proceedings of the National Academy of Sciences USA 104, 9331.
Barber, J. R., Chadwell, B. A., Garrett, N., Schmidt-French, B. and Conner, W. E.
(2009). Naïve bats discriminate arctiid moth warning sounds but generalize their
aposematic meaning. Journal of Experimental Biology 212, 2141-2148.
Bates, D. L. and Fenton, M. B. (1990). Aposematism or startle? Predators learn their
responses to the defenses of prey. Canadian Journal of Zoology 68, 49-52.
Belwood, J. J. and Morris, G. K. (1987). Bat predation and its influence on calling
behavior in neotropical katydids. Science. 238, 64-66.
Brodie III, E. D. and Brodie Jr, E. D. (1999). Predator-prey arms races. Bioscience 49,
557-568.
Conner, W. E. (1999). ‘Un chant d'appel amoureux’: acoustic communication in moths.
Journal of Experimental Biology 202, 1711-1723.
Conner, W. E. and Corcoran, A. J. (2012). Sound Strategies: The 65 Million-Year-Old
Battle Between Bats and Insects. Annual Review of Entomology 57, 21-39.
Conner, W. E. and Weller, S. (2004). A quest for alkaloids: the curious relationship
between tiger moths and plants containing pyrrolizidine alkaloids. In Advances in
Insect Chemical Ecology (ed. R.T. Carde, J. G. Millar).pp. 248-282 Cambridge
UK: Cambridge University Press.
Corcoran, A. J., Conner, W. E. and Barber, J. R. (2010). Anti-bat tiger moth sounds:
10
Form and function. Current Zoology 56, 358-369.
Covey, E. and Casseday, J. H. (1999). Timing in the auditory system of the bat. Annual
Review of Physiology 61, 457-476.
Dawkins, R., and Krebs, J. R.(1979). Arms races between and within species.
Proceedings of the Royal Society of London. Series B 205, 489-511.
Dunning, D. C. (1968). Warning sounds of moths. Zeitschrift für Tierpsychologie 25,
129-138.
Dunning, D. C. and Roeder, K. D. (1965). Moth sounds and the insect-catching
behavior of bats. Science 147, 173-174.
Elemans, C. P. H., Mead, A. F., Jakobsen, L. and Ratcliffe, J. M. (2011). Superfast
muscles set maximum call rate in echolocating bats. Science 333, 1885-1888.
Fenton, M. B. (1990). The foraging behaviour and ecology of animal-eating bats.
Canadian Journal of Zoology 68, 411-422.
Fullard, J. H. (1998). The sensory coevolution of moths and bats. In Comparative
Hearing: Insects, (eds. R. R. Hoy, A. N. Popper and R. R. Fay), pp. 279-326.
New York: Springer-Verlag.
Fullard, J. H. and Fenton, M. B. (1977). Acoustic and behavioural analyses of the
sounds produced by some species of Nearctic Arctiidae (Lepidoptera). Canadian
Journal of Zoology 55, 1213-1224.
Fullard, J. H., Fenton, M. B. and Simmons, J. A. (1979). Jamming bat echolocation:
the clicks of arctiid moths. Canadian Journal of Zoology 57, 647-649.
Fullard, J. H., Simmons, J. A. and Saillant, P. A. (1994). Jamming bat echolocation:
the dogbane tiger moth Cycnia tenera times its clicks to the terminal attack calls
11
of the big brown bat Eptesicus fuscus. Journal of Experimental Biology 194, 285-
298.
Goerlitz, H. R., ter Hofstede, H. M., Zeale, M. R. K., Jones, G. and Holderied, M. W.
(2010). An aerial-hawking bat uses stealth echolocation to counter moth hearing.
Current Biology 20, 1568-1572.
Griffin, D. R., Webster, F. A. and Michael, C. R. (1960). The echolocation of flying
insects by bats. Animal Behaviour 8, 141-154.
Grimaldi, D. and Engel, M. S. (2005). Evolution of the Insects. Cambridge: Cambridge
University Press.
Hoy, R. R. (1998). Acute as a bug’s ear: an informal discussion of hearing in insects. In
Comparative hearing: insects, (eds. R. R. Hoy, A. N. Popper and R. R. Fay), pp.
1-17 New York: Springer-Verlag.
Hristov, N. I. and Conner, W. E. (2005a). Effectiveness of tiger moth (Lepidoptera,
Arctiidae) chemical defenses against an insectivorous bat (Eptesicus fuscus).
Chemoecology 15, 105-113.
Hristov, N. I. and Conner, W. E. (2005b). Sound strategy: acoustic aposematism in the
bat–tiger moth arms race. Naturwissenschaften 92, 164-169.
Janzen, D. H. (1980). When is it coevolution. Evolution 34, 611-612.
Jepsen, G. L. (1966). Early Eocene bat from Wyoming. Science 154, 1333-1339.
Jones, G. and Rydell, J. (2003). Attack and defense: interactions between echolocating
bats and their insect prey. In Bat Ecology, (eds. T. H. Kunz and M. B. Fenton), pp.
301-345. Chicago: The University of Chicago Press.
Masters, W. and Raver, K. (1996). The degradation of distance discrimination in big
12
brown bats (Eptesicus fuscus) caused by different interference signals. Journal of
Comparative Physiology A: Neuroethology, Sensory, Neural, and Behavioral
Physiology 179, 703-713.
Miller, L. A. (1991). Arctiid moth clicks can degrade the accuracy of range difference
discrimination in echolocating big brown bats, Eptesicus fuscus. Journal of
Comparative Physiology A 168, 571-579.
Miller, L. A. and Surlykke, A. (2001). How some insects detect and avoid being eaten
by bats: tactics and countertactics of prey and predator. Bioscience 51, 570-581.
Moss, C. F. and Surlykke, A. (2001). Auditory scene analysis by echolocation in bats.
The Journal of the Acoustical Society of America 110, 2207.
Nakano, R., Takanashi, T., Fujii, T., Skals, N., Surlykke, A. and Ishikawa, Y. (2009).
Moths are not silent, but whisper ultrasonic courtship songs. Journal of
Experimental Biology 212, 4072-4078.
Nishida, R. (2002). Sequestration of defensive substances from plants by Lepidoptera.
Annual Review of Entomology 47, 57-92.
Ratcliffe, J. M. and Fullard, J. H. (2005). The adaptive function of tiger moth clicks
against echolocating bats: an experimental and synthetic approach. Journal of
Experimental Biology 208, 4689-4698.
Ratcliffe, J. M., Fullard, J. H., Arthur, B. J. and Hoy, R. R. (2009). Tiger moths and
the threat of bats: decision-making based on the activity of a single sensory
neuron. Biology Letters 5, 368-371.
Roeder, K. D. (1962). The behaviour of free flying moths in the presence of artificial
ultrasonic pulses. Animal Behaviour 10, 300-304.
13
Roeder, K. D. (1964). Aspects of the noctuid tympanic nerve response having
significance in the avoidance of bats. Journal of Insect Physiology 10, 529-532.
Roeder, K. D. (1966). Acoustic sensitivity of the noctuid tympanic organ and its range
for the cries of bats. Journal of Insect Physiology 12, 843-859.
Roeder, K. D. (1967). Nerve Cells and Insect Behavior. Cambridge, MA: Harvard
University Press.
Roeder, K. D. (1974). Acoustic sensory responses and possible bat-evasion tactics of
certain moths, In Proceedings of the Canadian Society of Zoologists’ Annual
Meeting (Ed. M.D. B. Burt). pp. 71-78. Fredericton, Canada: University of New
Brunswick Press
Schipper, J., Chanson, J. S., Chiozza, F., Cox, N. A., Hoffmann, M., Katariya, V.,
Lamoreux, J., Rodrigues, A. S. L., Stuart, S. N. and Temple, H. J. (2008). The
status of the world's land and marine mammals: diversity, threat, and knowledge.
Science 322, 225-230.
Schnitzler, H. U. and Kalko, E. K. V. (2001). Echolocation by insect-eating bats.
Bioscience 51, 557-569.
Simmons, N. and Conway, T. (2003). Evolution of ecological diversity in bats. In Bat
Ecology, (eds. T. H. Kunz and M. B. Fenton), pp. 493-535. Chicago: The
University of Chicago Press.
Simmons, N. B., Seymour, K. L., Habersetzer, J. and Gunnell, G. F. (2008). Primitive
Early Eocene bat from Wyoming and the evolution of flight and echolocation.
Nature 451, 818-821.
Stoneman, M. and Fenton, M. (1988). Disrupting foraging bats: the clicks of arctiid
14
moths. In Animal Sonar: Processes and Performance. (ed. P. E. Nachtigall and P.
W. B. Moore) pp. 635-638. NATO ASI Series, Series A: Life Sciences vol. 156
New York: Plenum Press
Surlykke, A. and Moss, C. F. (2000). Echolocation behavior of big brown bats,
Eptesicus fuscus, in the field and the laboratory. The Journal of the Acoustical
Society of America 108, 2419.
Tougaard, J., Casseday, J. and Covey, E. (1998). Arctiid moths and bat echolocation:
broad-band clicks interfere with neural responses to auditory stimuli in the nuclei
of the lateral lemniscus of the big brown bat. Journal of Comparative Physiology
A 182, 203-215.
Vermeij, G. J. (1994). The evolutionary interaction among species: selection, escalation,
and coevolution. Annual Review of Ecology and Systematics, 25, 219-236.
Wilson, W. W. and Moss, C. F. (2004). Sensory-motor behavior of free-flying FM bats
during target capture. In Echolocation in Bats and Dolphins, (eds. J. A. Thomas C.
F. Moss and M. Vater), pp. 22-27. Chicago: University of Chicago Press.
Yack, J. and Dawson, J. (2008). Insect ears. In The Senses: a Comprehensive Reference,
vol. 3 (eds. R. Hoy, G. Shepherd, A. Basbaum, A. Kaneko and G. Westheimer),
pp. 35-54. Waltham, MA: Elsevier.
Yager, D. D. (2012). Predator detection and evasion by flying insects. Current Opinion
in Neurobiology. 22, 201-207.
Yovel, Y., Melcon, M. L., Franz, M. O., Denzinger, A. and Schnitzler, H. U. (2009).
The voice of bats: how greater mouse-eared bats recognize individuals based on
their echolocation calls. PLoS Computational Biology 5, e1000400.
15
Figure 1.1. Spectrogram of an echolocation attack sequence of a Myotis bat. The bat
increases the repetition rate of calls as it approaches its prey. The rapid trill at
approximately 300 ms is termed the terminal buzz, and it is followed by contact with the
insect.
16
CHAPTER II
Tiger Moth Jams Bat Sonar
Aaron J. Corcoran, Jesse R. Barber, and William E. Conner
The following manuscript was published in Science (vol. 325, pgs. 325-327, 2009) and is
reprinted with permission. Stylistic variations are due to requirements of the journal.
A.J.C. contributed to experiment design, executed the experiments, conducted data
analysis, and wrote the manuscript. J.R.B. collected moths in the field and assisted with
experimental design. W.E.C. designed the experiments, assisted with animal care and
provided oversight and editorial assistance on the project.
17
ABSTRACT
In response to sonar-guided attacking bats, some tiger moths make ultrasonic clicks of
their own. The lepidopteran sounds have previously been shown to alert bats of some
moths’ toxic chemistry and also to startle bats unaccustomed to sonic prey. The moth
sounds could also interfere with, or “jam,” bat sonar, but evidence for such jamming has
been inconclusive. Using ultrasonic recording and high-speed infrared videography of
bat-moth interactions, we show that the palatable tiger moth Bertholdia trigona defends
against attacking big brown bats (Eptesicus fuscus) using ultrasonic clicks that jam bat
sonar. Sonar jamming extends the defensive repertoire available to prey in the long-
standing evolutionary arms race between bats and insects.
18
INTRODUCTION
The ability to pinpoint airborne insects in darkness, by echolocation (1), allowed bats to
master nocturnal insectivory (2) and set the stage for the evolution of defensive
countermeasures by insect prey (3). Some insects gained ears (4) and evasive
maneuvering (5). Tiger moths (Lepidoptera: Erebidae, subfamily Arctiinae) developed
the ability to click ultrasonically in response to attacking bats (6, 7). Decades of research
on moth click defenses have led to three non-mutually exclusive hypotheses regarding
their function: startle (8), acoustic aposematism (“warning”) (8-14), and sonar
interference (“jamming”) (15-17). When ultrasonic clicks are paired with unpalatable
prey, bats learn to perceive clicks as a warning of unprofitability (8, 10-14). Moth clicks
also startle inexperienced bats or bats that have not heard clicks for multiple days (8).
Because bats habituate to startle quickly, its effectiveness as a defense requires clicking
moths to be rare. This situation does not appear typical in nature (12).
Finally, moth clicks may disrupt the sonar of an attacking bat (15-17). Clicks might
diminish a bat’s acuity in determining target distance (17-19), or feign echoes from
objects that do not exist (15). However, evidence that moth clicks can disrupt bat attacks
by jamming sonar is lacking. One recent study found that moth clicks had no discernible
effect on attacking bats unless clicks were paired with defensive chemistry (13). All
previous studies, however, have tested moths with relatively low duty cycles, or sound
production per unit time (20). High-duty-cycle moth clicks, such as those of Bertholdia
trigona (Fig. 2.1; Table 2.S2), are more likely to jam bats (17, 18), including the big
brown bat (Eptesicus fuscus), which co-occurs with B. trigona in much of Central
America and northward to Colorado, USA.
19
To determine whether the clicks of B. trigona startle, warn, or jam bats, we pitted E.
fuscus against B. trigona in a flight room equipped with high-speed infrared video
cameras and an ultrasonic microphone (21). The pattern of a naive bat’s success in
catching clicking moths, when measured over several days, should differ for each of the
three proposed moth click functions (Fig. 2.2A) (13). For a warning sound, bats initially
capture and drop distasteful moths, then learn to abort attacks on hearing clicks (8, 13,
22). Alternatively, a bat could be initially startled by the clicks but would quickly
habituate to the sounds (8, 23). A jamming defense, however, would immediately deter
attacking bats and the effect of the defense would persist with time (Fig.2. 2A).
20
METHODS
We trained three naive juvenile E. fuscus (“J1”, “J2”, and “J3”) and one adult E. fuscus
(“A1”) to capture tethered moths in a sound-attenuated flight room. Naive bats allow us
to control prior experience, while an adult bat’s prior experience catching insects may
allow it to better overcome moth defense. On each of nine consecutive nights, 16 tethered
moths – four B. trigona; four silent, palatable, size-matched noctuid novelty controls; and
eight silent, palatable wax moths (female Galleria mellonella; used in pre-experiment bat
training) – were presented to each bat individually in a random order. Bats were allowed
up to one minute or five approaches for each moth. We presented unaltered B. trigona to
the bats on nights one through seven, and B. trigona lacking the ability to click (from
tymbal ablation) on nights eight and nine. Seventy-eight percent of the B. trigona (87 of
112) responded acoustically to bat sonar. The few intact B. trigona that did not produce
sound in response to bat attack were excluded from the analysis. We used contact with
the moths as our measure of attack success. Palatability of B. trigona to each bat was
taken as the proportion of captured moths eaten rather than dropped. We conducted
feeding trials with silenced moths and four additional stationary bats to further assess the
palatability of B. trigona. Finally, we analyzed echolocation recordings to measure bat
behavioral response to moth clicks (21).
21
RESULTS/DISCUSSION
In stationary feeding trials with silenced moths, three bats regularly ate B. trigona (J4,
92%; N = 12; J5, 92%; N = 12; J6, 83%; N = 6), and one did not (J7, 0%; N = 8).
Similarly, of the bats capturing moths in flight, three regularly ate B. trigona (J1, 94%, N
= 16; J2, 50%, N = 14; A1, 89%, N = 18), and one did not (J3, 0%, N =12). The observed
differences between individuals may reflect a greater reluctance of some individuals to
incorporate new items into their diet, as has been reported for some birds (24). B. trigona
appears palatable; the six bats ate the moths with no detectable ill effects. Because
warning and jamming are not mutually exclusive defense functions (25), our ability to
detect a jamming effect is diminished for the bat that rejected B. trigona – any moth
avoidance could be caused by jamming or warning or both Thus, to unambiguously test
the hypothesis of sonar jamming we focus our analysis on the three bats that ate B.
trigona in flight (J1, J2 and A1).
Each of the three bats contacted control moths over 400% more often than
clicking B. trigona (Table 1; Movie S1). In contrast, bats contacted 100% of B. trigona
when the moths’ tymbals were ablated (Fig. 2.2C; Movie S2). This confirms that the
bats’ poor performance on B. trigona was caused by the moth clicks. Rate of contact with
sound-producing moths did not change during the experiment (Fig. 2.2B; Friedman
nonparametric ANOVA, X2 = 2.63, df = 6, P = 0.85). Thus, prior learning was not
required for the defense to be effective; nor did the bats habituate to the clicks. Bat
contact rates did not improve on succeeding attacks on the same moth – attacks that often
occurred within seconds of each other (Table 2.S1; Friedman nonparametric ANOVA, X2
= 2.55, df = 4, P = 0.64). This renders startle unlikely because nearly all mammals –
22
including bats – habituate to startle (8, 23). Echolocation recordings (e.g. Fig. 2.3)
showed bats persisting in attack attempts after onset of moth clicks to varying degrees
throughout the experiment (Fig. 2.S1A). In contrast, bats in a previous study quickly
learned to abort attacks on the noxious Cycnia tenera (Fig. 2.S1B) (22). This further
suggests that the bats in our study did not learn to take the moth clicks as a warning – the
bats continued attacks despite hearing the sounds. It also indicates that moth clicks are
not generally aversive to bats (SOM text). Together, we take the above results as strong
evidence for a jamming function of the moth sound. The defense was effective
immediately and persistently on juvenile and adult E. fuscus (Fig. 2.2B) that frequently
tried to capture the clicking moths (Fig. 2.S1A) but had much difficulty doing so.
We also observed atypical echolocation behavior in response to B. trigona clicks. Each
bat attacked all control moths by progressing through the approach, track, and terminal
phases (e.g., 26, 27). However, in about a third (Bat J1, 21%, N = 19; Bat J2 40%, N =
15, Bat A1 28%, N = 25) of attacks on B. trigona, the bat reversed attack phase from
track to approach or terminal to track, and then continued the attack (Fig. 2.3). This
behavior did not diminish with experience (Friedman nonparametric ANOVA, X2 = 4.5,
df = 6, P = 0.61), as would be expected with startle. It appears to be a direct response of
the bats to the sonar interference caused by the moth clicks.
The ultrasonic clicks of B. trigona appear well suited for jamming echolocation (SOM
text). Under all proposed jamming mechanisms, high-duty-cycle sounds made by highly
developed tymbals (e.g., Fig. 2.1B) should better jam echolocation (15, 17-19). Empirical
evidence now supports this prediction – the high-duty-cycle sounds of B. trigona jammed
bats, while the low-duty-cycle sounds of Euchaetes egle were ineffective jamming
23
signals under nearly identical conditions (13). The use of tiger moth sound for aposematic
signaling requires only simple tymbal structure and appears widespread in the Arctiidae
(7, 10-13). Thus, acoustic aposematism may have been a stepping-stone in the
evolutionary development of a jamming signal, a unique acoustic countermeasure in the
long-standing arms race between bats and their insect prey.
24
REFERENCES AND NOTES
1. D. R. Griffin, Anim. Behav. 8, 141-154 (1960).
2. H. U. Schnitzler, E. K. V. Kalko, Bioscience 51, 557-569 (2001).
3. L. A. Miller, A. Surlykke, BioScience 51, 570-581 (2001).
4. K. D. Roeder, J. Insect Physiol. 10, 529-546 (1964).
5. K. D. Roeder, Anim. Behav. 10, 300-304 (1962).
6. A. D. Blest, Zoologica 49, 161-181 (1964).
7. S. J. Weller, N. L. Jacobsen, W. E. Conner, Biol. J. Linn. Soc. 68, 557-578 (1999).
8. D. L. Bates, M. B. Fenton, Can. J. Zool. 68, 49-52 (1990).
9. D. C. Dunning, K. D. Roeder, Science 147, 173-174 (1965).
10. D. C. Dunning, Z. Tierpsychol. 25, 129-138 (1968).
11. L. Acharya, M. B. Fenton, Can. J. Zool. 70, 1292-1298 (1992).
12. D. C. Dunning, L. Acharya, C. B. Merriman, L. Dal Ferro, Can. J. Zool. 70, 2218-
2223 (1992).
13. N. I. Hristov, W. E. Conner, Naturwissenschaften 92, 164-169 (2005).
14. A. Surlykke, L. A. Miller, J. Comp. Physiol. A 156, 831-843 (1985).
15. J. H. Fullard, M. B. Fenton, J. A. Simmons, Can. J. Zool. 57, 647-649 (1979).
16. J. H. Fullard, J. A. Simmons, P. A. Saillant, J. Exp. Biol. 194, 285-298 (1994).
17. L. A. Miller, J. Comp. Physiol. A 168, 571-579 (1991).
18. J. Tougaard, J. H. Casseday, E. Covey, J. Comp. Physiol. A 182, 203-215 (1998).
19. J. Tougaard, L. A. Miller, J. A. Simmons, in Echolocation in Bats and Dolphins, J.
A. Thomas, C. F. Moss, M. Vater, eds. (Univ. of Chicago Press, Chicago, 2004)
pp. 365-380.
25
20. J. R. Barber, W. E. Conner, J. Exp. Biol. 209, 2637-2650 (2006).
21. Materials and methods are available as supporting material on Science Online.
22. J. R. Barber, W. E. Conner, Proc. Natl. Acad. Sci. U.S.A. 104, 9331-9334 (2007).
23. M. Davis, in Neural Mechanisms of Startle Behavior, R. C. Eaton, Ed. (Plenum Press,
New York, 1984), pp. 287-351.
24. N. M. Marples, T. J. Roper, D. G. Harper, Oikos 83, 161-165 (1998).
25. J. M. Ratcliffe, J. H. Fullard, J. Exp. Biol. 208, 4689-4698 (2005).
26. S. A. Kick, J. A. Simmons, Neuroscience 4, 2725-2737 (1984).
27. W. W. Wilson, C. F. Moss, in Echolocation in Bats and Dolphins, J. A. Thomas, C.
F. Moss, M. Vater, eds. (Univ. of Chicago Press, Chicago, 2004) pp. 365-380.
26
FIGURE 2.1
Jamming acoustic complex. (A) Scanning electron micrograph of B. trigona sound-
producing organ (tymbal). Some scales were removed for clarity. (B) Example
oscillogram (time x voltage) and (C) spectrogram showing a simulated E. fuscus echo,
reflected off of B. trigona at 1 m (left), and two overlapping B. trigona click modulation
cycles (right). Echo and clicks are presented at average estimated intensities at the bat’s
location 1.0 m from the moth (21).
27
FIGURE 2.2
Predicted and observed success rates for E. fuscus attacking moths using various
defensive strategies. (A) Predicted bat attack success over successive nights for three
proposed moth click functions – startle, aposematism, and jamming. (B) Observed bat
attack success rates for three E. fuscus (bat J1: circle symbols, bat J2: triangle symbols,
bat A1 square symbols) on B. trigona (closed symbols) and noctuid controls (open
symbols). The solid line shows mean values for attacks on B. trigona. (C) Success rates
of bats attacking intact (sound-producing) and silenced B. trigona. Values are mean ±
s.e.m. Some values were offset slightly for display.
28
FIGURE 2.3
Example echolocation attack sequence (A) Spectrogram showing a big brown bat
attacking a clicking B. trigona. (B) Pulse interval graph of echolocation attack. Each
circle connected by solid lines indicates the time of a sonar pulse and the duration of the
following pulse interval. Open triangles indicate moth click half modulation cycles. The
dotted line shows an attack on a control moth for reference.
29
SUPPORTING MATERIAL
MATERIALS and METHODS
Animals. All vertebrate care was conducted in accordance with Wake Forest University’s
Animal Care and Use Committee guidelines (ACUC # A04-188). One adult female and
several pre-volant juvenile big brown bats were taken from a roost in Winston-Salem,
NC, and brought into the lab at Wake Forest University. Bat care and training methods
replicated that of ref. S1 for E. fuscus. Noctuid and geometrid moths used for training and
in experiments were captured at outdoor lights on the Wake Forest University campus in
Winston-Salem, NC. B. trigona were captured at UV lights at the Southwestern Research
Station near Portal, Arizona, and shipped overnight to our facility at Wake Forest
University.
Equipment. Experiments were conducted in an anechoic indoor flight room (5.8 x 4.0 x
3.0 m). Bat-moth interactions were recorded at 250 frames per second by two digital
high-speed video cameras (Photron FastCam PCI© 500, Tokyo, Japan) using Photron
FastCam Viewer v.2.4© installed on a desktop computer. Nine Wildlife Engineering©
(Tucson, AZ, USA) LED arrays provided infrared illumination and a low-intensity deep
red light allowed for behavioral observation by the experimenter. We recorded
ultrasound, synced to the video, using a Petterson Elektronik© D940 bat detector
connected via a National Instruments® (Austin, TX, USA) 6062 PCMCIA A/D to a
laptop computer running Bat Sound Pro© v.3.3.We used a 250 kHz sampling rate. The
microphone was directed downward from the ceiling 1.2 m from each of two walls.
Moths were tethered directly below the microphone on a thin, 60 cm monofilament line.
30
Video recordings were used to confirm the results of each bat-moth interaction and to
reconstruct the positions of animals and the microphone (see below).
3D Reconstruction. The locations of the bat, moth, and microphone and the flight
direction of the bat were calculated using a 3D reconstruction. The interaction space was
calibrated using 192 points from four calibration frames over a volume of 140 x 150 x
210 cm. Each point was digitized from each camera view in a custom Matlab® (Natick,
Massachusetts, USA) program (S2) that fit a set of Direct Linear Transformation (DLT)
coefficients to the data. Video files were subsequently calibrated using the DLT
coefficients in a second Matlab® program (S2). The “center-of-object” for the bat and
moth and the tip of the microphone were digitized from video files. Another custom
Matlab® program (BATracker.m; coded by B. Chadwell) fit a quintic smoothing spline
(Matlab® spaps routine) to the 3D coordinates. Distances between bat, moth, and
microphone were measured using the smoothed data from each video frame. The time
derivative of the bat’s spline function provided the animal’s flight direction.
Bioacoustic Analysis. Locations of echolocation calls within recordings were extracted
using a custom version of SonoBAT® v. 2.8 (DnDesign, Arcata, CA). For each recording
we measured the sequence of echolocation phases (approach, track, terminal buzz)
employed by the bat. We required two or more successive pulse intervals of the same
phase to mark a transition, as single aberrant pulse intervals normally occur in E. fuscus
attack sequences (S3). We determined echolocation phase for E. fuscus based on the
following pulse interval ranges: approach, >30 ms; track, 12-30 ms; terminal 5-12 ms
(S4). To ensure that the bat had time to react to the moth clicks, we used the presence of
31
five or more track phase or terminal phase calls made after the onset of moth clicks to
indicate a continuing attack. Moth click definitions and measurement methods match
those of ref. S5. The inward and outward buckling of a moth tymbal (Fig. 2.1A) generates
a train of microclicks called a modulation cycle (Fig. 2.S2). This cycle is divided into the
active half-cycle (the inward buckling), the passive half-cycle (the outward buckling),
and the intra-cycle silent interval. Each half-cycle comprises a series of microclicks
produced by the buckling of microtymbals (the fine ridges in Fig. 2.1A). Duty cycle is
sound production per unit time. Maximum duty cycle was estimated by counting the
number of microclicks within a 100 ms interval where click production peaked. This
number was then multiplied by the average microclick duration and divided by 100 ms.
Temporal parameters of clicks were measured from oscillograms using BatSound© Pro v.
3.3. Spectral features were measured from a power spectrum of a modulation cycle.
Measurements were taken from one modulation cycle per bat-moth recording unless
otherwise indicated. Microclick duration was averaged over five microclicks per
modulation cycle.
We used a standardized distance of 1 m for comparing intensities of echoes and moth
clicks at the bat’s location (Fig. 2.1B). This ratio should be relatively constant at the bat’s
location as it flies within 1 m of the moth. For each halving of distance, moth click
intensity increases by 6 dB. Echoes would normally increase by 12 dB per halving of
distance, but bats decrease the intensity of their emissions by about 6 dB per halving of
distance within 1-2 m of a target (S6, S7). Therefore, the increases in moth click and echo
intensities would be roughly equivalent as the bat closes within 1-2 m of the moth. At 1
m, the bat directs its relatively wide sonar beam (-3 dB beamwidth of 70º) in the direction
32
of the target (S8), which was nearly directly below the microphone (7.6º ± 6.7 s.d.
angular deviation from the bat’s position). Using the 3D reconstruction for each
interaction, we found the time when the bat closed within 1 m of the moth and selected
the echolocation call produced nearest to this time. We then calculated the RMS
intensities of this echolocation call and the first moth click modulation cycle
uninterrupted by a bat call. Several adjustment factors were necessary to estimate the
call:click ratio at the bat’s location. At 1 m from the moth, bats were 59º (± 10º s.d.) off-
axis from the microphone. Our microphone showed an 18 dB decrease in sensitivity for
sound sources recorded from this position relative to an on-axis sound source. The
difference in vertical angle between the vectors from bat to moth and bat to microphone
was 23º (±6.7 s.d.). The shape of the vertical component of the bat’s sonar beam in flight
is not fully known (S9), but the observed angle approximates the edge of the -6 dB
beamwidth measured from an electrically stimulated, anesthetized E. fuscus (S10). We
assumed an attenuation of 45 dB between the emitted bat call and returning echo from a
moth the size of B. trigona (34 mm wingspan, 12 mm body length) at 1 m (S11). The
horizontal and vertical position of the moth was assumed to change randomly as it
fluttered on the tether. We therefore assumed equal moth click intensity directed toward
the microphone and bat. Finally, we adjusted for attenuation of sound due to spherical
spreading, accounting for the distances between bat, moth, and microphone.
Statistical Analysis. Much of our data were heteroscedastic and taken repeatedly on
individual bats across nights and on successive attacks on individual moths. We therefore
used paired, nonparametric statistics. For investigating learning behavior between nights
or between successive attacks on the same moth we used a Friedman’s ANOVA. For
33
comparing contact rates between successive attacks we used only those bat-moth sessions
with five approaches; for all other comparisons we used only the first encounter between
each bat and moth. Analysis was conducted in SPSS® v. 16.0 (SPSS, Chicago, IL), and
all alpha levels were set to 0.05.
34
SUPPORTING TEXT
While it is beyond the scope of this study to determine the mechanism of jamming
employed by B. trigona, the moth’s clicks appear well suited for that task. (Fig. 2.1,
Table 2.S2). The moths can produce up to 456 microclicks in 0.1 s and can approach a
duty cycle of 100% (Table 2.S2), virtually guaranteeing that clicks occur within the
crucial time window necessary for diminishing the bat’s target-ranging acuity (Table
2.S2, refs. S12, S13) or masking echoes (S14). The frequency modulation of B. trigona
clicks (Fig. 2.1B) may reproduce the sonic signature of the bat’s own call sufficiently for
the bat to mistake clicks as echoes from objects that do not exist (S15). And finally, the
high duty cycle and spectral complexity of B. trigona clicks could overload the bat’s
acoustic processing networks, causing further degradation in echo processing ability
(S16).
A reviewer suggested that these same qualities could make an alternative hypothesis to
jamming more likely – the clicks may be unpleasantly loud but not interfere with bat
sonar. However, neither the intensity of moth clicks nor bat behavior support this
hypothesis. We estimated that within 1 m of the moth, click intensity was about 5 dB
greater than echo intensity, or about as loud as an echo from a large moth; this level is
unlikely to be aversive to bats. Previous studies using stationary E. fuscus in a target
simulator found that extraneous echoes, noise, and moth clicks played at up to 21 dB
greater than echoes, but temporally isolated from echoes, had no effect on bat
echolocation ability (S14, S17). On the contrary, bats were often attracted to the
extraneous sounds as they learned to associate them with a food reward (S17). When
35
similar sounds were played within about 1 ms of the start of an echo, the bat’s ability to
discriminate distances of targets was degraded up to 400% (S12, S13). In our study the
bats also had the opportunity to associate extraneous sound with a food reward – each of
the bats ate B. trigona in the few cases when capture occurred. The bats frequently flew
close to sonic prey rather than aborting attacks and turning away (Movie S1). It therefore
appears unlikely that the clicks were unpleasantly loud for the bats, which would quickly
learn to avoid an acoustically noxious moth just as they would a chemically noxious one
(Fig. 2.S2). A more likely explanation is that the high-duty-cycle moth clicks, which
frequently preceded and co-occurred with echoes, caused ranging errors and, or masking
sufficient to prevent the bat from accurately tracking and capturing its prey.
36
FIGURE 2.S1
Attack persistence of E. fuscus on clicking moths through successive foraging nights. (A)
Three bats that found B. trigona palatable. (B) Four E. fuscus that found Cycnia tenera
unpalatable. Data on C. tenera attacks were extracted from a previous experiment (S1).
37
FIGURE 2.S2
Oscillogram of a B. trigona click modulation cycle. A modulation cycle is composed of
two half-cycles, the active and passive, separated by the intracycle silent interval. For
further details see ref. S5.
38
TABLE 2.S1 Contact rates for repeated big brown bat attacks on individual Bertholdia
trigona
Bat N Approach 1
(%)
Approach 2
(%)
Approach 3
(%)
Approach 4
(%)
Approach 5
(%)J1 11 27.3 0.0 0.0 0.0 9.1
J2 9 11.1 22.2 44.4 44.4 33.3
A1 15 6.7 6.7 20.0 13.3 0.0
Total 46 17.4 6.5 17.8 15.2 10.9
39
Table 2.S2. Click parameters for the tiger moth Bertholdia trigona. Abbreviations: cdur,
microclick pulse duration; mhc, modulation half cycle duration; mc, modulation cycle
duration; isi, intercycle silent interval; clicks, microclicks per active modulation half
cycle; d kHz, dominant frequency in kHz; -15 dB kHz, frequency -15 dB below d kHz;
+15 dB kHz, frequency -15 dB above d kHz. Values are mean ± s.d.
TABLE 2.S2
N cdur mhc mc isi clicks d kHz
-15 dB
kHz
+15 dB
kHz maxDC
59 0.24±0.04 6.5±1.6 14.8±3.0 2.6±1.4 19.9±4.8 51.2±10.9 24.9±7.1 89.3±11.9 57.1±21.7
40
SUPPORTING REFERENCES
S1. J. R. Barber, W. E. Conner, Proc. Natl. Acad. Sci. U.S.A. 104, 9331-9334 (2007).
S2. T. L. Hedrick, Bioinsp. Biomim. 3, 034001 (2008).
S3. W. W. Wilson, C. F. Moss, in Echolocation in Bats and Dolphins, J. A. Thomas,
C. F. Moss, M. Vater, eds. (Univ. of Chicago Press, Chicago, 2004) pp. 365-380.
S4. S. A. Kick, J. A. Simmons, Neuroscience 4, 2725-2737 (1984).
S5. J. R. Barber, W. E. Conner, J. Exp. Biol. 209, 2637-2650 (2006).
S6. D. J. Hartley, J. Acoust. Soc. Am.91, 1133-1149 (1992).
S7. S. Hiryu, T. Hagino, H. Riquimaroux, Y. Watanabe, J. Acoust. Soc. Am. 121, 1749-
1757 (2007).
S8. K. Ghose, C. F. Moss J. Acoust. Soc. Am.114, 1120-1131 (2003).
S9. K. Ghose, C. F. Moss, J. Acoust. Soc. Am.122, 3717-3724 (2007).
S10. D. J. Hartley, R. A. Suthers, J. Acoust. Soc. Am.85, 1348-1351 (1989).
S11. D. A. Waters, J. Rydell, G. Jones, Behav. Ecol. Sociobiol. 37, 321-328 (1995).
S12. L. A. Miller, J. Comp. Physiol. A 168, 571-579 (1991).
S13. W. M. Masters, K. A. S. Raver, J. Comp. Physiol. A 179, 703-713 (1996).
S14. B. Mohl, A. Surlykke, J. Comp. Physiol. A 165, 119-124 (1989).
S15. J. H. Fullard, M. B. Fenton, J. A. Simmons, Can. J. Zool. 57, 647-649 (1979).
S16. J. R. Barber, K. A. Razak, M. Fuzessery, J. Comp. Physiol. A 189, 843-855.
S17. A. Surlykke, L. A. Miller, J. Comp. Physiol. A 156, 831-843 (1985).
41
CHAPTER III
How Do Tiger Moths Jam Bat Sonar?
Aaron J. Corcoran, Jesse R. Barber, Nickolay I. Hristov, and William E. Conner
The following manuscript was published in Journal of Experimental Biology (vol. 214,
pgs. 2416-2425, 20011) and is reprinted with permission. Stylistic variations are due to
requirements of the journal. A.J.C. designed and executed the experiments, conducted
data analysis, and wrote the manuscript. J.R.B. assisted with field research. N.I.H.
developed the three-dimensional video simulations. W.E.C. provided oversight and
editorial assistance on the project.
42
ABSTRACT
The tiger moth Bertholdia trigona is the only animal in nature known to defend itself by
jamming the sonar of its predators -- bats. In this study we analyzed the 3-D flight paths
and echolocation behavior of big brown bats (Eptesicus fuscus) attacking B. trigona in a
flight room over seven consecutive nights to determine the acoustic mechanism of the
sonar-jamming defense. Three mechanisms have been proposed: (1) the phantom echo
hypothesis, which states that bats misinterpret moth clicks as echoes; (2) the ranging
interference hypothesis, which states that moth clicks degrade the bats’ precision in
determining target distance; and (3) the masking hypothesis, which states that moth clicks
mask the moth echoes entirely, making the moth temporarily invisible. On nights one and
two of the experiment the bats appeared startled by the clicks; however on nights three
through seven, the bats frequently missed their prey by a distance predicted by the
ranging interference hypothesis (approx. 15-20 cm). 3-D simulations show that bats did
not avoid phantom targets, and the bats’ ability to track clicking prey contradicts the
predictions of the masking hypothesis. The moth clicks also forced the bats to reverse
their stereotyped pattern of echolocation emissions during attack, even while bats
continued pursuit of the moths. This likely further hinders the bats’ ability to track prey.
These results have implications for the evolution of sonar-jamming in tiger moths, and
we suggest evolutionary pathways by which sonar-jamming may have evolved from
other tiger moth defenses.
43
INTRODUCTION
Bats and moths are intertwined in a predator-prey relationship that has spanned at least 50
million years (Miller and Surlykke, 2001). In response to the heavy predation pressure of
echolocating bats, many moths have evolved simple ears that alert them to the danger of
attack and initiate unpredictable evasive maneuvers (Roeder, 1967 ) Tiger moths
(superfamily Noctuoidea, subfamily: Arctiinae) also produce ultrasonic clicks whose
defensive functions vary depending on the acoustic and chemical properties of the moth
species. Most species produce short bursts of clicks that maximally occupy 1-12 % of
time with sound (Corcoran et al., 2010). These low-duty cycle clicks are well suited for
advertising the toxic chemistry many tiger moths acquire as caterpillars (Hristov and
Conner, 2005a; Hristov and Conner, 2005b; Nishida, 2002; Ratcliffe and Fullard, 2005).
After bats learn this aposematic association, they can be misled by palatable tiger moths
that mimic their chemically defended relatives (Barber and Conner, 2007; Barber et al.,
2009). Moth clicks can also startle bats unaccustomed to sonic prey; however, bats
typically habituate to moth clicks after only a few exposures (Bates and Fenton, 1990;
Miller, 1991). A minority of tiger moth species produce copious bursts of clicks capable
of filling 25-52% of time with broadband noise (Corcoran et al., 2010). We recently
demonstrated that one such species – Bertholdia trigona Grote—defends itself by
jamming the sonar of bats (Corcoran et al., 2009). This is the only known example of
such a defense in nature. It was demonstrated using a behavioral learning paradigm
(Barber and Conner, 2007; Hristov and Conner, 2005a), whereby naïve bats (i.e. never
having experienced moth clicks) were pitted against clicking moths over several
consecutive nights. Against aposematic moths, bats first catch the distasteful moths
44
before learning to avoid them (Barber and Conner, 2007; Hristov and Conner, 2005a).
The reverse pattern can be observed for a startle defense – the bats are startled at first, but
habituate after only a few exposures to clicking moths (Bates and Fenton 1990). Only for
jamming should the defense be effective throughout the experiment, and this was found
to be the case for bats attacking the abundantly clicking and palatable B. trigona
(Corcoran et al., 2009).
Three mechanisms have been proposed for how moths jam bat sonar. First, the
phantom echo hypothesis states that moth clicks that are sufficiently similar to bat calls
could be misperceived by bats as echoes from objects that do not exist (Fullard et al.,
1979; Fullard et al., 1994). If perceived as clutter, bats should veer away from phantom
objects that occur on the flight path leading to the moth; or, if perceived as another prey
item, bats should be observed trying to capture “phantom targets”. Second, the ranging
interference hypothesis holds that clicks that overlap or closely precede echoes may
diminish a bat’s precision in determining target distance and therefore prevent the bats
from properly coordinating their final capture maneuvers (Miller, 1991). Ranging
interference has been demonstrated for bats conducting standardized tasks in
psychophysical experiments, but only when clicks occur in a 2 ms window preceding
returning echoes (Miller, 1991; Masters and Raver, 1996). Finally, the masking
hypothesis suggests that if clicks are sufficiently numerous and intense, they may prevent
the bat from detecting the moth’s echo entirely (Møhl and Surlykke, 1989; Troest and
Møhl, 1986). This would make the moth temporarily invisible to the bat. While other
mechanisms of sonar-jamming could be proposed, we aimed to test these three
hypotheses, which have been the focus of the literature on the subject to date.
45
The three jamming hypotheses can be differentiated by what the bat perceives:
multiple objects surrounding the moth for the phantom echo hypothesis, a blurred target
for the ranging interference hypothesis, and no target for the masking hypothesis.
Therefore, the bats’ flight and echolocation behavior should vary according to each
hypothesis. Here we expand upon our previous work demonstrating the existence of a
sonar jamming defense (Corcoran et al., 2009) by analyzing details of bat 3-D flight and
echolocation behavior to address the question of how moths jam bat sonar.
46
MATERIALS AND METHODS
Animals and equipment
B. trigona were collected using Bioquip (Rancho Dominguez, CA, USA) black
lights set over riparian corridors at the Southwestern Research Station near Portal, AZ in
July 2008. Moths were shipped overnight to our lab at Wake Forest University where
they were held at 12.5º C until experimentation. Noctuid control moths were collected at
lights on the campus of Wake Forest University. Three naïve pre-volant juvenile big
brown bats (Eptesicus fuscus Beauvois; J1, J2, and J3) and one adult big brown bat (A1)
were taken from a roost in Forsyth County, North Carolina and held in captivity for the
duration of the experiment. Three of the four bats were found to readily eat B. trigona,
while one did not (Corcoran et al., 2009). To exclude the possibility that bats were
responding to clicks as aposematic signals, only bats that ate B. trigona were used in our
analysis. Animal care has been described elsewhere (Corcoran et al., 2009) and was
conducted in accordance with Wake Forest University’s Animal Care and Use
Committee (ACUC # A04-188). After each bat could reliably capture silent control
moths (female Galleria mellonella Linnaeus) off a monofilament line in our anechoic
indoor flight room (5.8m x 4.0m x 3.0m), they were put through a seven-night
experiment. Each night, 16 moths – four B. trigona, four similarly sized noctuid novelty
controls, and eight G. mellonella—were tethered to a monofilament line, one at a time,
and presented in random order to an individual bat in the flight room. The line was 60 cm
long and attached to the ceiling at a point 1.2 m from each of two walls. Moths flew
freely on the tether, eliminating the possibility that bats could memorize the moth’s exact
location from previous trials. Bats were allowed one minute or five attack attempts on
47
each moth, however here we only analyze the first attack attempt on each moth (N = 47).
Attacks on moths that did not click (N =19) and attacks that were not fully captured on
video (N =16) were excluded from our analysis.
All interactions were recorded with two digital high-speed video cameras
(Photron FastCam PCI 500, Tokyo, Japan) sampling 250 frames per second directly to
the hard drive of a desktop computer. Nine Wildlife Engineering (Tucson, AZ, USA)
infrared LED arrays illuminated the interaction space, as well as a low intensity deep red
light for behavioral observation by the experimenter. An ultrasonic microphone
(Pettersson D940, Pettersson Elektronik, Uppsala, Sweden; ±8 dB frequency response
from 20 – 80 kHz) was placed on the ceiling, facing downwards directly above the
tethered moth to record audio of all interactions. The microphone was connected to a
laptop computer via a National Instruments (Austin, TX, USA) 6062 PCMCIA A/D card.
Audio was sampled at 250 kHz using BatSound Pro v. 3.3 and externally triggered to
record synchronously with the high-speed video.
3-D flight-track analysis
Four calibration frames constituting 192 points and a volume of 1.4 x 1.5 x 2.1 m were
placed in view of both cameras to calibrate the interaction space. All points were
digitized from frames taken from each camera using a custom Matlab (Natick,
Massachusetts, USA) program (Hedrick, 2008), which fit a set of Direct Linear
Transform (DLT) coordinates to the data. These DLT coordinates were then used in a
second Matlab program (Hedrick, 2008) to calculate the 3-D coordinates of objects
48
occurring in view of both cameras. For each interaction, the “center-of-object” of bat and
moth were determined for each frame while both animals were visible in each camera.
A third custom Matlab program (BATracker.m; coded by B. Chadwell) fit a
quintic smoothing spline (Matlab SPAPS routine) to the 3-D coordinates. The bat and
moth spline functions were then used to determine flight vectors, distances between bat
and moth, and vectors from bat to moth for each point of each interaction. For all time
parameters, time zero was taken as the time of bat-moth contact or when the distance
between bat and moth was minimized. φ is defined as the angular deviation between the
bat’s flight vector and the vector from bat to moth (Fig. 3.1A). To quantify the
trajectories of bats completing successful attacks, φ values were measured from 20
successful bat attacks on noctuid control moths. For each frame of the attack (occurring
at 4 ms intervals) from t = -600 ms to t = 0 ms, the mean, upper and lower 95%
confidence intervals of φ were calculated. For each interaction between a bat and a
clicking moth, the time when φ first exceeded the upper 95% confidence limit for control
attacks was taken as an indication of when an attack was aborted (Time of flight abort; T-
Fabort; Fig. 3.1).
Bioacoustic Analysis
We used a custom version of Sonobat v. 2.9 (DnDesign, Arcata, CA, USA) to
semi-automatically detect and measure parameters from echolocation calls from bat
attacks. The automated processing routines of Sonobat were overseen by an observer to
manually confirm the accuracy of all measurements. The time of each echolocation call
and the time interval between successive echolocation calls, or pulse interval, were
49
graphed for each attack. Two response variables were measured from each graph – the
minimum pulse interval, and the time when attack echolocation was aborted (T-Eabort;
Fig. 3.2). T-Eabort was taken as the time of the last echolocation pulse interval of less
than 35 ms. If no pulse interval was less than 35 ms, the time of minimum pulse interval
was taken instead. Two moth click parameters were measured to test if they predict bat
response: number of click modulation cycles (Fig. 3.3) and time of first clicks (T-clicks).
To determine whether and how bats modify their echolocation in response to
jamming, parameters were measured from four echolocation calls from each interaction:
one call preceding the first moth click and three calls following the first moth click. Two
parameters were measured from each echolocation call: duration and peak frequency. To
calculate these measurements Sonobat generates a spectrogram of each recording using a
196-point window with a Hanning function. It then creates a time-frequency trace of the
first harmonic (or fundamental) of the bat call. The start and end points are defined as the
time points when the call intensity decreases below -20 dB relative to the maximum
intensity measured in the bat call. All intensity values are measured from points on the
spectrogram. Call duration equals the time between the start and end points. Peak
frequency was measured from the point of maximum intensity in the spectrogram. This
method was used in favor of measuring the peak of a power spectrum generated from the
entire call in order to isolate the peak frequency of the fundamental. In previous tests, the
power-spectrum method sometimes led to measuring a peak associated with the
frequency where the upper portion of the fundamental and the lower portion of the
second harmonic cumulatively produced a greater spectral level than that of the lower
portion of the fundamental (Fig. 3.3A). This added unnecessary variation to the analysis.
50
To account for the directionality of bat emissions the vertical and horizontal angular
deviations between bat and moth and bat and microphone were calculated for all attacks
at the time when bat calls were measured. The horizontal deviation in angle was 7.6±6.7º
and the vertical deviation was 23±6.7º. These values are within the -6 dB bandwidth of E.
fuscus (Ghose and Moss 2003; Hartley and Suthers 1989).
Statistical Analysis
To quantify what factors affected bat echolocation and flight responses to moth
clicks, we conducted a series of multivariate linear regressions on each of four response
variables: minimum bat-moth distance, T-Fabort, minimum pulse interval, and T-Eabort.
Five predictor variables were used for each regression: bat experience (in nights), moth
click modulation cycle number, T-clicks, J1 dummy, and J2 dummy. Each dummy
variable codes the attacks of J1 and J2 separately, allowing us to test and account for
individual differences. Predictor variables had low correlations (R2 < 0.12). For each
response variable we created a single regression model that added all five predictor
variables simultaneously. We also analyzed correlation values between all predictor and
response variables and compared these results to our multiple regressions to look for
interaction effects among predictor variables. This approach avoids the numerous
problems associated with stepwise multiple linear regression (Tabachnick and Fidell
2007).
To determine how bats responded acoustically to moth clicks, we conducted a
series of repeated-measures Analysis of Variance (ANOVA) tests on echolocation call
parameters measured from one echolocation call preceding moth clicks and three calls
51
following clicks. In cases where sphericity could not be assumed the Greenhouse-Geisser
correction was applied. Post-hoc pairwise comparisons were made between all groups
with Bonferroni correction applied to adjust P-values for multiple comparisons. Due to
heterogeneity of variance, we used a non-parametric Friedman’s ANOVA to test for
differences in pulse interval values before and after moth clicks. Non-parametric post-hoc
tests with adjusted P-values for multiple comparisons were used to test for differences
between mean values.
For all tests, a separate statistical analysis was conducted for each category of bat
attack (for categories, see Results) and on 20 randomly selected attacks on silent control
moths. We selected four calls (one before clicks and three after clicks) from each control
attack so that they matched the timing of calls selected from attacks on clicking moths.
Measured T-click values were selected at random from attacks on clicking moths and
applied to control attacks. For example, if a T-click value of -450 ms was selected, the
control attack was processed as though clicks occurred 450 ms before the point of contact.
Statistical analysis was conducted in SPSS 16.0 (SPSS, Inc., Chicago, IL, USA). α was
set at 0.05 and data are reported as mean ± s.d.
3-D Simulations
To test the plausibility of the three jamming hypotheses (phantom echo, ranging
interference, and masking), we simulated attacks according to assumptions that follow
from each hypothesis. According to the phantom echo hypothesis, bats perceive click
bursts not as extrinsic sounds, but as echoes from objects. We assume that the bats would
perceive these sounds in the same directional vector as that of the sound source – the
52
moth. Because the interval (325 µs) between moth clicks (Corcoran et al., 2009) is less
than the bat’s 400 µs temporal resolution (Simmons et al. 1989), clicks within a burst
would blur into one continuous sound, and are therefore modeled as one object. Due to
the mechanism of sound production, moth click bursts come in pairs. The first click burst
(termed the active half-modulation cycle) decreases in frequency over time, as does the
sweep of an echolocation call (Fig. 3.3). The second burst (the passive half-modulation
cycle) changes frequency in the opposite direction. We therefore modeled only the active
half-modulation cycles as phantom echoes. To calculate the distance from the bat to each
phantom object, the time interval from the beginning of the echolocation call preceding a
click burst to the beginning of the click burst was divided by the speed of sound (approx.
343 m/s) and again divided by two for the two-way travel distance. Measurements were
made on click bursts from each of five randomly selected attacks from each of the three
bats used in the experiment.
Ranging interference occurs only when clicks are present within a 2 ms interval
preceding the return of echoes (Masters and Raver, 1996; Miller, 1991). For each attack,
we determined how often clicks occurred within this crucial time window. To do this, we
first used the 3-D reconstruction of the attack to determine the distance between bat and
moth at the time each call was produced. We then calculated the two-way travel time of
sound covering this distance and marked whether or not moth clicks occurred within the
2 ms time interval surrounding the estimated time of the returning echo. Masking requires
sound to overlap the short time window of returning echoes (Møhl and Surlykke, 1989).
While the masking window is slightly offset from the ranging interference window they
53
are of similar durations, and therefore our measurements on ranging interference should
roughly apply to the hypothesis of masking.
RESULTS
3-D flight and echolocation responses to jamming
Bat flight response to clicking moths took three forms: (1) in direct attacks bats
completed flight paths typical of successful attacks on control moths (N = 11; Fig. 3.4 A,
D) and either captured the moths or made contact after making at least a partial capture
attempt; (2) in close-range attacks bats continued their attacks after clicks and narrowly
missed the moth without making a capture attempt (N = 24; Fig 3.4 B, E); and (3) in
avoidances bats aborted attacks soon after hearing clicks and also did not make capture
attempts (N = 14; Fig. 3.4 C, F). The three attack types were distinguished by their φ vs.
time plots (Fig. 3.4D-F). In direct attacks, φ values (the angle between the bat’s flight
vector and the bat-moth vector) did not exceed the upper 95% confidence limit of control
attacks on non-clicking moths; close-range plots showed decreasing or constant φ values
(indicating continued moth pursuit) after the moth clicked, followed by a breach of the
upper 95% confidence level of control attacks; avoidances showed immediate increases
in φ values towards the upper 95% confidence level of control attacks after the moths
clicked.
Bat echolocation responses (Fig. 3.4G-I) mirrored the differences in flight
responses (Fig. 3.4D-F). Bats in direct attacks typically completed echolocation
sequences with a buzz, or trill of calls with low (approx. 6 ms) pulse intervals. Buzzes
were always present in attacks on control moths (Fig. 3.6A). Close-range attacks were
54
dominated by short pulse intervals (10-40 ms) that are typically used for bats
investigating near-by objects. Buzzes in these attacks were often highly abbreviated (Fig.
3.4H, 3.6B). In avoidances, bats began elongating pulse intervals early in the attack
(approx. 250 ms before minimum bat-moth distance; Fig. 3.4I, 3.6C), and did not buzz.
Bat experience was a consistent predictor of bat flight and echolocation response
to moth clicks (Table 3.1); bats continued attack flight and attack echolocation longer,
and flew closer to their prey, as they gained experience. This trend appears to be driven
by the higher proportion of avoidances and lower proportion of direct and close-range
attacks on the first two nights of the experiment (Fisher’s exact test; Χ2 =6.66; P = 0.04;
Fig. 3.5). This suggests that bats were initially startled by the clicks and habituated after
about two nights. After the habituation period, close-range attacks were the most frequent
result (Fig. 3.5).
The number of click modulation cycles was also important in predicting bat
response (Table 3.1); bats flew closer, used attack echolocation later into the attack and
achieved shorter minimum pulse intervals against moths that clicked less. This result
appears to be driven by the difference in number of modulation cycles between direct
attacks and other attack categories (18.7±16.7 modulation cycles in direct attacks vs.
38.0±23.7 modulation cycles for all other attacks; Student’s t-test; t=-2.52; d.f. = 47; P =
0.02). Moths that clicked less were less successful at deterring their predators. The timing
of clicks was also found to be important in when bats aborted attack echolocation, but not
any of the other three response variables.
55
Finally, J1 dummy was significant in the T-Fabort model; that is, one juvenile bat
aborted flight earlier than the adult bat. J2 dummy was not significant in any model. The
relatively small impact of individual dummy variables in our models indicates that the
three bats tended to respond similarly to jamming. Together, these models account for
about one third of the variation in bat responses to clicking moths. In summary, bat flight
and echolocation responses to moth clicks demonstrated a high level of agreement on
three results: (1) bats aborted attacks more frequently early in the experiment; (2) bats
completed successful attacks more often against moths that clicked less; and (3) after the
initial habituation period the most frequent result was for bats to narrowly miss their prey.
Immediate echolocation reaction to jamming
We looked for differences in parameters from echolocation calls made prior to
and just after moth clicks to determine the bats’ acoustic reaction to jamming (Table 3.2).
As expected, in control attacks the bats decreased their call durations, and while not
statistically significant, a trend towards decreasing pulse intervals and decreasing peak
frequencies was observed. In contrast, in close-range attacks and avoidances bats
increased call durations and pulse intervals in response to moth clicks (Table 3.2; Fig.
3.6). These results show a reversal of the changes in echolocation emissions typical of
attack sequences. No changes in peak frequency were found. Interestingly, the changes
of echolocation observed in close-range attacks were short-lived – the bats frequently
advanced echolocation towards a buzz a second time as they continued pursuing their
prey (Fig. 3.6B).
3-D simulations
56
To determine the plausibility of each sonar-jamming mechanism, the frequency of
clicks occurring at critical time periods were calculated according to assumptions made
for each hypothesis. Moths began clicking 379±190 ms before minimum bat-moth
distance and produced 33.7±23.6 modulation cycles per attack. Moth clicks occurred in
13.5±5.8 of 16.1±6.8 pulse intervals (83.4%) that occurred after moths began clicking.
The locations of phantom echoes relative to actual targets were simulated for 15
randomly selected attacks that occurred after the habituation period. Of the 385 simulated
phantom echoes, 307 (79.9%) occurred 25 -2624 cm beyond the target; 39 (1.0%), or 2.6
phantom echoes per attack, occurred within 25 cm of the target, and 38 (1.0%), or 2.5
phantom echoes per attack, occurred 25 – 134 cm in front of the target. These figures are
roughly what would be expected by chance, as the time intervals that would place
phantom objects between bat and moth or within 25 cm of the moth are much shorter
than the time interval that would place phantom objects distant to the moth. Fig. 3.7A, C
and Movie 1 show the modeled locations of phantom objects, as well as the measured
locations of the bat and moth of an example attack. The locations of phantom objects are
randomly distributed spatially and lack spatial continuity over time. If perceived in such a
way, phantom objects would flash briefly in disparate locations. While a small number of
simulated phantom objects do occur near the bat’s flight path, the bat’s flight trajectory
does not appear to be influenced by them.
The frequency of clicks occurring in the critical ranging interference window was
measured for all attacks. Moth clicks occurred in 11.6±5.5 (85.3% of calls with clicks in
preceding call intervals) critical call windows per attack. Fig. 3.7B, C and Movie 2 show
an individual attack with overlaid ranging errors based on previous interference estimates
57
(Miller, 1991). In this incidence, and in close-range attacks overall, the bat missed its
prey by a distance similar to the ranging error predicted by the ranging interference
hypothesis (approx. 15-20 cm) and no capture attempt was made.
58
DISCUSSION
Bats habituate slowly to jamming signals.
Substantial variation was observed in the flight and echolocation responses of bats
to moth clicks (Fig. 3.4). A primary predictor of this variation was bat experience (Table
3.1), with three of four response variables demonstrating that bats came closer to
completing attacks as they gained experience. This pattern suggests that bats were
startled by the moth clicks early in the experiments. The bats appeared to habituate to the
clicks after about two nights (Fig. 3.5). Bats typically habituate to moth clicks in one to
three trials (Bates and Fenton 1990; Miller, 1991). However, naïve bats attacking tethered,
low-duty cycle moths under nearly identical conditions to that of this study showed little
to no startle response (Barber and Conner, 2007; Barber et al., 2009; Hristov and Conner,
2005a).
In the first two nights of our experiments, each bat had up to 40 exposures (four
moths per night and up to five attack attempts per trial) to B. trigona moth clicks prior to
habituation. Therefore, bats appeared to take much longer to habituate to the high-duty-
cycle clicks of B. trigona than the low-duty-cycle clicks of other tiger moths. B. trigona
and other low-duty-cycle moths tested in our experiments have similar peSPL values
(approx. 80-85 dB at 5 cm; Corcoran et al. 2010). The densely produced B. trigona clicks
would have a 6 dB increase of power as perceived by the bat due to the number of clicks
present within the bats integration window of 2.4 ms (click measurements based on
average values; Corcoran et al. 2010; Surlykke and Bojeson, 1996). However this does
not appear sufficient to explain the observed differences in habituation rates. We suggest
59
that the bats require longer habituating to B. trigona clicks due to their jamming effect.
This is akin to the situation for Catocala moths flashing their colorful hind wings to Blue
Jays; predators take longer to habituate to more conspicuous startle signals (Ingalls 1993).
Bat echolocation and flight responses to moth clicks support the ranging interference
hypothesis.
After bats habituated to the clicks, they were still largely unsuccessful in
capturing moths (30% attack success on nights 3-7; Fig. 3.5). The few successful attacks
were typically on moths that produced few clicks. This supports the notion that only
clicks produced in sufficient number are effective at jamming (Corcoran et al., 2009;
Corcoran et al., 2010; Hristov and Conner, 2005a ; Miller, 1991; Tougaard, 1999). The
most frequent bat response to jamming after the initial habituation period was a close-
range attack (Fig. 3.5). In these attacks, bats missed their prey by 15.7±7.9 cm and did
not make capture attempts. These results are consistent with predictions of the ranging
interference hypothesis. The absence of capture behavior suggests that bats were not
trying to capture phantom objects, while the low percentage of avoidances on nights after
the habituation period suggests that bats were not trying to avoid flying into phantom
objects. Finally, the proximity of the bats to their prey and the continued use of attack
echolocation at relevant times demonstrate that the moth’s presence was not completely
masked by the moth clicks. We take these results as strong evidence in support of the
ranging interference hypothesis.
The 3-D simulations demonstrate how ranging interference may affect an
attacking bat (Fig. 3.7; Movie 2). At a distance the bat is able to gather enough positional
60
information on its prey to direct its flight trajectory appropriately. However, the bat is
insufficiently aware of the prey’s precise location to coordinate its final capture maneuver.
Bats attacking tethered prey exhibit a stereotyped wing beat pattern for the last 400 ms of
the attack, demonstrating that bats begin coordinating their capture attempts well in
advance of contact (Wilson and Moss, 2004). This time period closely matches the time
when moths jam bats. The coordination required to successfully capture prey would
likely be obstructed by an imprecise knowledge of the prey’s location.
B. trigona clicks frequently occurred in the time window required for ranging
interference to occur. In a two-alternative forced choice experiment involving bats
performing tasks from a platform, Miller (Miller, 1991) demonstrated that clicks
occurring in as few as 10% of critical time windows were sufficient to degrade ranging
ability of bats. We found that during clicking bouts, clicks occurred in 85% of critical
windows. When the moths click at full capacity there is rarely a millisecond absent of
sound (Fig. 3.3). This capacity appears well adapted for ensuring that interfering sound
occurs in the narrow time intervals when echoes are returning to the bat. Based on
spectrogram correlation analysis, B. trigona clicks have been found to be highly
disruptive of the acoustic properties of echoes (Corcoran et al., 2010). Also, clicks
occurring in such critical windows have been demonstrated to cause latency ambiguity
and suppression of neural responses to auditory stimuli in the nuclei of the lateral
lemniscus of E. fuscus (Tougaard et al., 1998, Tougaard et al., 2004). These cells are
specialized for coding the precise timing of echoes, and therefore target distance (Covey
and Casseday, 1991). In summary, we now have behavioral evidence from bats attacking
their natural prey and bats performing standardizing laboratory tasks, acoustic signal
61
processing evidence, and a neurophysiological mechanism, all supporting the ranging
interference hypothesis.
Previous research has provided little evidence in support of the phantom echo and
masking hypotheses. Behavioral and neurophysiological experiments have generally
rejected the phantom echo hypothesis (Miller 1991; Møhl and Surlykke, 1989; Surlykke
and Miller, 1985). And from an acoustic signal processing perspective, moth clicks are
far from similar enough to bat calls to be mistaken by bats as echoes (Corcoran et al.,
2010; Surlykke and Miller, 1985). Recent work has found that bats can distinguish even
the subtle differences of calls made by different individual bats (Yovel et al., 2009).
Therefore it is difficult to imagine bats mistaking moth clicks, which only have
superficial similarities to bat calls, for echoes (Fig. 3.3).
Masking has previously been rejected as a function for low-duty cycle moth clicks
based on the low probability of a sufficient number of clicks arriving simultaneously with
returning echoes (Møhl and Surlykke, 1989). While B. trigona clicks met this
requirement (overlapping 12 echoes per attack on average), the behavioral response of
bats in our study demonstrates that complete masking was not achieved. However, we
cannot eliminate the possibility that partial masking of echoes has an effect on bat
perception. For example, the broadband moth clicks may disrupt spectral notches in
echoes that may be indicative of multiple-wave-front echoes which provide information
about the shape of targets (Simmons et al. 1989). These effects would be in addition to
the ranging interference that appears to occur.
62
The echolocation reaction to moth clicks interferes with the stereotyped echolocation
attack sequence
Bats attacking prey use a stereotyped pattern of changes in echolocation whereby
pulse intervals, call durations, call intensities, and call frequencies decrease as bats near
their prey (Griffin et al., 1960, Kick and Simmons 1984, Wilson and Moss, 2004). These
acoustic alterations are highly adaptive for bats pursuing prey. The rapid emission of
pulses late in the attack allows the bats to quickly update their “sonar screens” as to the
position of their prey. The decreasing call durations prevent overlap between calls and
echoes, which occur closer together as bats near their prey (Wilson and Moss, 2004). The
decreased intensity of call emissions keeps returning echoes at a relatively stable level,
which may help bats avoid ranging errors caused by time-intensity trading neurons, and
allow bats to isolate amplitude changes caused by prey movements (Hartley 1992; Hiryu
et al. 2008). And finally, the lower frequency of terminal buzz calls has the effect of
changing the directionality of the emissions from a narrow beam to a wide angle in order
to keep the prey in the ensonified volume (Jakobsen and Surlykke, 2010).
The bats in our study reversed this stereotyped pattern by elongating call
durations and pulse intervals after hearing moth clicks, resulting in highly abbreviated or
absent buzzes (Table 3.2; Fig. 3.6). In some cases (avoidances) these changes in
echolocation reflected a decision to abandon pursuit of the prey. In others (close-range
attacks) the changes in call structure were temporary and the bats continued pursuing the
moths with a highly atypical echolocation sequence (Fig. 3.6B). Others have reported
bats elongating pulse intervals in response to moth clicks, albeit for much shorter periods
of time than what is reported here (Barber and Conner, 2007; Ratcliffe and Fullard, 2005).
63
These changes do not appear to be in response to the ranging interference caused by the
clicks, as bats elongate pulse intervals even when clicks do not overlap echoes (Ratcliffe
and Fullard, 2005) and ranging interference alone does not cause bats to change their
echolocation (Miller, 1991). Instead, the bats may be compensating for the processing
demands of two information streams (Barber et al., 2003).
Mexican free-tailed bats (Tadarida brasiliensis) flying in the laboratory increase
the duration, bandwidth and amplitude of sonar emissions in response to broadband noise,
an acoustic response typical of many vertebrates (Tressler and Smotherman, 2009). This
response is presumably aimed at improving the detection of the signal in noise. The
lengthening of call durations that we observed may be an attempt to do the same. Bats
also shift call frequency in order to avoid jamming by conspecifics (Gillam et al., 2007;
Ratcliffe et al., 2004; Ulanovsky et al., 2004), chorusing insects (Gillam and McCracken,
2007), and synthetic narrowband noise (Bates et al., 2008; Tressler and Smotherman,
2009), but not broadband noise (Bates et al., 2008; Tressler and Smotherman, 2009). We
did not observe bats changing the frequency of their emissions in response to moth clicks,
only the durations and pulse intervals. The changes in echolocation we observed in close-
range attacks appear to be an effort to avoid jamming; however, this comes at the cost of
losing the advantages conferred by the specialized attack echolocation that bats more
commonly employ. This has the end result of the bats being unable to capture their
clicking prey.
64
CONCLUSION
The primary objective of this study was to determine the mechanism of the sonar
jamming defense used by high-duty-cycle tiger moths. Our results, combined with
evidence from the literature, provide strong support for the ranging interference
hypothesis. In addition, the clicks disrupt the bats’ stereotyped echolocation attack
sequence. The primary requirement for this defense is the ability to produce numerous,
densely packed clicks continuously for several hundred milliseconds. By comparing the
sounds produced by low-duty-cycle and high-duty-cycle moths (Barber and Conner, 2006;
Corcoran et al., 2010), we see that this is accomplished in three ways: (1) the
morphological development of many striations on the bilateral tymbal organs in order to
produce numerous clicks per modulation cycle; (2) the rapid and repeated behavioral
activation of the tymbal organs; and (3) the rhythmic, alternating activation of the two
tymbal organs to maximally occupy time with clicks. These observations provide a
hypothetical blueprint for the evolution of a sonar-jamming signal. As has been suggested
previously (Barber and Conner, 2006; Corcoran et al., 2010), it appears likely that tiger
moths originally developed the ability to click in order to advertise their toxic chemistry
(Hristov and Conner, 2005a; Hristov and Conner 2005b), and later other tiger moths took
advantage of this association through Batesian and Mullerian mimicry (Barber and
Conner, 2007; Barber et al., 2009). A rudimentary form of jamming may have made for
a more salient warning cue for acoustic aposematic moths (Ratcliffe and Fullard, 2005),
or provided some modest benefit to mimetic animals avoiding capture by potentially
discerning predators (Barber et al., 2009). At this point a clear path was open to the
evolution of a jamming signal. Currently, the arctiine phylogeny remains unresolved
65
(Weller et al. 2009). Without this evolutionary framework, we are unable to understand
the order in which their various chemical and acoustic defenses were acquired. However,
by understanding the mechanism of the sonar-jamming defense, we have demonstrated
that in all probability, few barriers existed for tiger moths to adapt their pre-existing
clicking defenses for sonar-jamming.
66
REFERENCES
Barber, J. R. and Conner, W. E. (2006). Tiger moth responses to a simulated bat attack:
timing and duty cycle. J. Exp. Biol. 209, 2637-2650.
Barber, J. R. and Conner, W. E. (2007). Acoustic mimicry in a predator-prey
interaction. Proc. Nat. Acad. Sci. 104, 9331-9334.
Barber, J. R., Razak, K. A., and Fuzessery, Z. M. (2003). Can two streams of auditory
information be processed simultaneously? Evidence from the gleaning bat
Antrozous pallidus. J. Comp. Physiol. A 189, 843-855.
Barber, J. R., Chadwell, B. A., Garrett, N., Schmidt-French, B., and Conner, W. E.
(2009). Naïve bats discriminate arctiid moth warning sounds but generalize their
aposematic meaning. J. Exp. Biol. 212, 2141-2148.
Bates, D. L. and Fenton, M. B. (1990). Aposematism or startle? Predators learn their
responses to the defenses of prey. Can. J. Zool. 68, 49-52.
Bates, M. E., Stamper, S. A., and Simmons, J. A. (2008). Jamming avoidance response
of big brown bats in target detection. J. Exp. Biol. 211, 106-113.
Corcoran, A. J., Barber, J. R., and Conner, W. E. (2009). Tiger moth jams bat sonar.
Science 325, 325-327.
Corcoran, A. J., Conner, W. E., and Barber, J. R. (2010). Anti-bat tiger moth sounds:
Form and function. Curr. Zool. 56, 358-369.
Covey, E., and Casseday, J. H. (1991). The monaural nuclei of the lateral lemniscus in
an echolocation bat: parallel pathways for analyzing temporal features of sound. J.
Neurosci. 11, 3456-3470.
67
Fullard, J. H., Fenton, M. B., and Simmons, J. A. (1979). Jamming bat echolocation:
the clicks of arctiid moths. Can. J. Zool. 57, 647-649.
Fullard, J. H., Simmons, J. A., and Saillant, P. A. (1994). Jamming bat echolocation:
the dogbane tiger moth Cycnia tenera times its clicks to the terminal attack calls
of the big brown bat Eptesicus fuscus. J. Exp. Biol. 194, 285-298.
Ghose, K., and Moss, C. F. (2003). The sonar beam pattern of a flying bat as it tracks
tethered insects. J. Acoust. Soc. Am. 114, 1120-1131.
Gillam, E. H., Ulanovsky, N. and McCracken, G. F. (2007). Rapid jamming avoidance
in biosonar. Proc. R. Soc. B 274, 651-660.
Gillam, E. H., and McCracken, G. F. (2007). Variability in the echolocation of
Tadarida brasiliensis: effects of geography and local acoustic environment. Anim.
Behav. 74, 277-286.
Griffin, D. R., Webster, F. A., and Michael, C. R., (1960). The echolocation of flying
insects by bats. Anim. Behav. 8, 141-154.
Hartley, D. J., and Suthers, R. A. (1989). The sound emission pattern of the
echolocating bat, Eptesicus fuscus. J. Acoust. Soc. Am. 85, 1348-1351.
Hartley, D. J. (1992). Stabilizaton of perceived echo amplitudes in echolocating bats. II.
The acoustic behavior of the big brown bat, Eptesicus fuscus, when tracking
moving prey. J. Acoust. Soc. Am. 91, 1133-1149.
Hedrick, T.L. (2008). Software techniques for two- and three-dimensional kinematic
measurements of biological and biomimetic systems. Bioinsp. Biomim. 034001.
Hiryu, S., Shiori, Y., Hosokawa, T., Riquimaroux, H., and Watanabe, Y. (2008). On-
board telemetry of emitted sounds from free-flying bats: compensation for
68
velocity and distance stabilizes echo frequency and amplitude. J. Comp. Physiol.
A 194, 841-851.
Hristov, N. I., and Conner, W. E. (2005a). Sound strategy: acoustic aposematism in the
bat-tiger moth arms race. Naturwissenschaften 92, 164-169.
Hristov, N. I., and Conner, W. E. (2005b). Effectiveness of tiger moth (Lepidoptera,
Arctiidae) chemical defenses against an insectivorous bat (Eptesicus fuscus).
Chemoecology 15, 105-113.
Jakobsen, L, and Surlykke, A. (2010). Vespertilionid bats control the width of their
biosonar sound beam dynamically during prey pursuit. Proc. Nat. Acad. Sci. 107,
13930-13935.
Kick, S. A., and Simmons, J. A. (1984). Automatic gain control in the bat’s sonar
receiver and the neuroethology of echolocation. J. Neurosci. 4, 2725-2737.
Lindström, L., Alatalo, R. V., and Mappes, J. (1997). Imperfect Batesian mimicry—
the effects of the frequency and the distastefulness of the model. Proc. R. Soc. B.
264, 149-153.
Masters, W. M. and Raver, K. A. (1996). The degradation of distance discrimination in
big brown bats (Eptesicus fuscus) caused by different interference signals. J.
Comp. Physiol. A 179, 703-713.
Møhl, B., and Surlykke, A. (1989). Detection of sonar signals in the presence of pulses
of masking noise by the echolocation bat, Eptesicus fuscus. J. Comp. Physiol. A
165, 119-124.
Miller, L. A. and Surlykke, A. (2001). How some insects detect and avoid being eaten
by bats: tactics and countertactics of prey and predator. Bioscience 51, 570-581.
69
Miller. L. A. (1991). Arctiid moth clicks can degrade the accuracy of range difference
discrimination in echolocating big brown bats, Eptesicus fuscus. J. Comp. Physiol.
A 168, 571-579.
Nishida, R. (2002). Sequestration of defensive substances from plants by Lepidoptera.
Annu. Rev. Entomol. 47, 57-92.
Pfennig, D. W., Harcombe, W. R., and Pfennig, K. S. (2001). Frequency-dependent
Batesian mimicry. Nature 410, 323-323.
Ratcliffe, J. M., and Fullard, J. H. (2005). The adaptive function of tiger moth clicks
against echolocation bats: an experimental and synthetic approach. J. Exp. Biol.
208, 4689-4698.
Ratcliffe, J. M., ter Hofstede, H. M., Avila-Flores, R., Fenton, M. B., McCracken, G.
F., Biscardi, S., Blasko, J., Gillam, E., Orprecio, J. and Spanjer, G. (2004).
Conspecifics influence call design in the Brazilian free-tailed bat, Tadarida
brasiliensis. Can. J. Zool. 82, 966-971.
Roeder, K. D. (1967). Nerve Cells and Insect Behavior Cambridge, MA: Harvard
University Press.
Simmons, J.A., Freedman, E. G., Stevenson, S. B., Chen, L, and Wohlgenant, T. J.
(1989). Clutter interference and the integration time of echoes in the echolocating
bat, Eptesicus fuscus. J. Acoust. Soc. Am. 86, 1318-1332.
Surlykke, A., and Miller, L. A. (1985). The influence of arctiid moth clicks on bat
echolocation; jamming or warning? J. Comp. Physiol. A 156, 831-843.
Surlykke, A. and Bojesen, O. (1996). Integration time for short broad band clicks in
echolocating FM-bats. J. Comp. Physiol. A 178, 235-241.
70
Tabachnick, B. G., and Fidell, L. S. (2007). Using Multivariate Statistics, 5th ed. Boston:
Pearson Education Inc.
Tougaard, J., Cassedy, J. H., and Covey, E. (1998). Arctiid moths and bat echolocation:
broad-band clicks interfere with neural responses to auditory stimuli in the nuclei
of the lateral lemniscus of the big brown bat. J. Comp. Physiol. A 182, 203-215.
Tougaard, J., Miller, L. A. and Simmons, J. A. (2004). The role of arctiid moth clicks
in defense against echolocating bats: interference with temporal processing. In
Advances in the Study of Echolocation in Bats and Dolphins (ed. J.A. Thomas, C.
F. Moss and M. Vater), pp. 365-371. Chicago: University of Chicago Press.
Tressler, J., and Smotherman, M. S. (2009). Context-dependent effects of noise on
echolocation pulse characteristics in free-tailed bats. J. Comp. Physiol. A 195,
923-934.
Troest, N., and Møhl, B. (1986). The detection of phantom targets in noise by serotine
bats; negative evidence for the coherent receiver. J. Comp. Physiol. A 159, 559-
567.
Ulanovsky, N., Fenton, M. B., Tsoar, A. and Korine, C. (2004). Dynamics of jamming
avoidance in echolocating bats. Proc. R. Soc. B 271, 1467–1475.
Weller, S., Dacosta, M., Simmons, R., Dittmar, K., and Whiting, M. (2009).
Evolution and taxonomic confusion in Arctiidae. In Tiger Moths and Woolly
Bears: Behavior, Ecology and Evolution of the Arctiidae (ed. W. E. Conner), pp.
11-30. New York: Oxford University Press.
Wilson, W. W., and Moss, C. F. (2004). Sensory-motor behavior of free-flying FM bats
during target capture. In Advances in the Study of Echolocation in Bats and
71
Dolphins (ed. J. A. Thomas, C. F. Moss, and M. Vater), pp. 22-27. Chicago:
Chicago University Press.
Wotton, J. M., Haresign, T, and Simmons, J. A. (1995). Spatially dependent acoustic
cues generated by the external ear of the big brown bat, Eptesicus fuscus. J.
Acoust. Soc. Am. 98: 1423-1445
Yovel, Y., Melcon, M. L., Franz, M. O., Denzinger, A., and Schitzler, H.-U. (2009).
The voice of bats: How greater mouse-eared bats recognize individuals based on
their echolocation calls. PloS Comput. Biol. 5, e1000400.
72
Figure 3.1. Diagram illustrating bat flight parameters. (A) Overhead view of a bat
attacking a moth. At each point in time φ is measured as the angle between the bat’s
flight vector and the bat-moth vector. The minimum bat-moth distance is one of two
flight response parameters measured from each attack. (B) Time vs. φ plots of the mean
and upper 95 % confidence interval of 20 successful attacks on control moths, as well as
that of the attack in A. T-Fabort, the second flight parameter, is the time in an attack
when φ exceeds the upper 95% confidence interval of control attacks. The point of
minimum bat-moth distance is used as the zero time point for each attack.
73
Figure 3.2. Example pulse interval graph of a big brown bat unsuccessfully attacking a
sonar-jamming moth. Two echolocation response variables were measured from each
attack: the minimum pulse interval (MinPI), and the time of aborted attack echolocation
(T-Eabort). T-Eabort is the time of the last pulse interval of less than 35 ms (dashed line);
such pulse intervals are only used by bats examining near-by objects. For pulse interval
graphs from successful bat attacks see Wilson and Moss (2004).
74
Figure 3.3. Oscillograms (top), spectrograms (bottom left) and power spectra (bottom
right) of (A) an approach phase echolocation call of a big brown bat (Eptesicus fuscus)
and (B) two overlapping click modulation cycles of Bertholdia trigona. Each modulation
cycle includes two series of clicks – the active and passive half-modulation cycles-- that
change in frequency downward and upward, respectively. Each modulation cycle shown
is made by one of the two thoracic tymbal organs. This figure was adapted from Corcoran
et al. (2009) with permission from Science.
75
Figure 3.4. Three categories of bat behavioral responses to moth clicks, as illustrated by
bat flight and echolocation behavior. (A-C) These overhead views of example attacks
illustrate each of three bat flight responses to moth clicks. Time in seconds until
minimum bat-moth distance is denoted along the bat flight path. (D-F) φ vs. time graphs
were used to distinguish between the three attack types. Note the differences in shape
between the plots of each category, and when each plot intersects the upper 95%
confidence limit line, which was measured from 20 successful attacks on control moths.
(G-F) Pulse interval graphs demonstrate differences in echolocation behavior that
correlate with observed differences in flight behavior. The thick dashed lines indicate
median values.
76
Figure 3.5. The distribution of bat responses to moth jamming changed after the first two
nights of the experiment (Fisher’s exact test; Χ2 =6.66; P = 0.04; Fig. 3.5). For examples
of responses see Fig. 3.3. For days one and two, N = 11 and for days three through five,
N = 36.
77
Figure 3.6. Spectrograms of three attacks on silent control or clicking experimental moths.
Arrows indicate locations of echolocation calls in attacks where Bertholdia trigona moth
clicks are present. (A) A big brown bat (Eptesicus fuscus) successfully attacks a noctuid
control moth using a stereotyped pattern of echolocation emissions whereby the interval
between pulses decreases as the bat nears its prey. The attack ends with a buzz, or a series
of rapidly emitted calls. (B) In a close-range attack on a clicking B. trigona, the moth’s
clicks disrupt the bat’s normal pattern of echolocation emissions. The bat’s ensuing use
of intermediate pulse intervals and an abbreviated buzz just before 0 ms indicates a
continued, but unsuccessful, pursuit of the moth. (C) In an avoidance attack on a clicking
B. trigona, the bat immediately lengthens pulse intervals to a rate that indicates the bat is
no longer pursuing the moth. No buzz is present. Time zero represents the point of
contact in A and the point of minimum bat-moth distance in B, C. This figure was
adapted from Corcoran et al. (2009) with permission from Science.
79
Figure 3.7. Simulations of competing hypotheses of sonar-jamming mechanisms. (A) The
modeled distances to phantom objects show poor consistency in location over time in
comparison to the distances to the actual target. (B) The modeled ranging errors are
proportionately greater compared to the bat-moth distance as the bat nears its prey. (C) In
an overhead view of a simulation of the phantom echo hypothesis, the bat’s flight
trajectory does not appear influenced by the modeled locations of phantom objects. (D) A
simulation of the ranging interference hypothesis shows a bat missing its prey by a
distance similar to predicted ranging errors.
80
Table 3.1. Multiple linear regressions of bat flight and echolocation responses to moth
jamming.
Response Variable
BM-Dist T-Fabort MinPI T-Eabort
Predictor variables B P B P B P B P
Bat experience (nights) -0.32 0.03 0.34 0.009 -0.14 0.30 0.39 0.003
Click modulation cycles 0.38 0.03 -0.27 0.09 0.50 0.006 -0.34 0.04
T-clicks 0.13 0.81 0.07 0.65 0.16 0.38 -0.32 0.05
J1 dummy 0.26 0.10 -0.45 0.002 -0.09 0.55 0.07 0.60
J2 dummy 0.15 0.33 -0.20 0.22 0.07 0.65 0.22 0.11
Model R=0.58 0.01 R=0.61 0.001 R=0.47 0.05 R=0.61 0.001
BM-Dist; minimum bat-moth distance; T-Fabort, time of flight abort (see Figure 3.1);
MinPI, minimum pulse interval; T-Eabort, time of aborted echolocation (see Figure 3.2);
T-clicks, time of moth clicks; J1 and J2 dummy, juvenile one and juvenile two dummy
variables. B, standardized beta regression coefficient indicating the direction and strength of
relationship between variables. P, P-value. Statistically significant comparisons are in bold
type.
81
Tabl
e 3.
2. B
at e
chol
ocat
ion
resp
onse
s to
mot
h ja
mm
ing
Para
met
er
Att
ack
type
N
F
d.f.
P- valu
e
Adj
.
P(Q
) C
all/
PI 0
C
all/
PI 1
C
all/
PI 2
C
all/
PI 3
Peak
Fre
quen
cy
Direc
t 11
0.
42
3 0.
99
0.68
35
.3±1
1.1
34.5
±8.
5 35
.2±
9.3
34.6
±7.
7
(kH
z)
Clo
se-r
ange
24
0.
65
2.2*
0.
54
0.50
35
.9±
9.2
36.8
±10
.6
37.2
±8.
8 37
.7±
7.9
Avo
id14
0.48
30.
700.
5745
.6±
10.8
43.8
±11
.044
.1±
8.4
42.6
±6.
9
Con
trol
204.
121.
5*0.
037
0.06
41.5
±7.
6(a)
41.5
±8.
0(a)
40.8
±8.
3(a)
38.2
±8.
8(a)
Ban
dwid
th
Direc
t 11
0.
377
3 0.
77
0.59
36
.8±
10.5
35
.7±
10.7
36
.9±
9.9
37.6
±6.
5
(kH
z)C
lose
-ran
ge24
0.92
13
0.44
0.47
40.8
±10
.438
.8±
12.1
39.5
±11
.840
.3±
9.6
Avo
id
14
1.08
3
0.37
0.
43
45.3
±5.
6 44
.3±
4.9
42.4
±6.
4 43
.8±
4.8
Con
trol
20
1.
12
3 0.
35
0.43
39
.7±
9.1
40.4
±9.
0 39
.1±
10.0
38
.5±
10.6
Har
mon
ic in
tens
ity
Direc
t 11
1.
34
3 0.
28
0.39
-1
5.9±
9.2
-17.
7±10
.3
-17.
0±11
.0
-17.
9±10
.3
re.
fund
amen
tal
Clo
se-r
ange
24
0.
81
3 0.
49
0.48
-1
5.5±
9.0
-14.
9±10
.3
-15.
4±9.
9 -1
6.0±
9.9
(dB)
Avo
id†
14
7
.95
3
0
.00
1
0.0
03
-1
1.5
±5
.7(a
) -1
1.8
±6
.7(a
) -1
4.7
±8
.1(b
) -2
0.5
±1
0.1
(c)
Con
trol
200.
543
0.66
0.57
-20.
4±7.
0-2
0.1±
6.9
-19.
7±7.
2-1
9.0±
7.1
Dur
atio
n D
irec
t 11
3.
38
3 0.
03
0.06
2.
1±0.
61.
8±0.
4 1.
9±0.
5 1.
8±0.
4
(ms)
Clo
se-r
ang
e2
45
.88
30
.00
10
.00
32
.4±
0.6
(a,b
)2
.1±
0.6
(a)
2.2
±0
.8(a
)2
.7±
1.0
(b)
Avo
id
14
3
.89
3
0
.01
6
0.0
4
2.6
±0
.8(a
) 2
.3±
0.7
(a)
2.4
±0
.9(a
) 3
.0±
1.0
(a)
Co
ntr
ol
20
7
.14
3
0
.00
1
0.0
03
2
.5±
0.9
(a)
2.5
±0
.9(a
) 2
.3±
0.9
(a,b
) 2
.1±
0.8
(b)
Puls
e In
terv
al
Direc
t 11
Χ
2 =0.
60
3 0.
90
0.65
22
.2±1
5.4
22.3
±14.
927
.1±
20.6
29
.7±
27.1
(ms)
C
lose
-ran
ge
2
4
Χ2=
11
.23
3
0
.01
0
.03
2
7.8
±1
2.7
(a)
32
.2±
24
.5(a
,b)
39
.8±
30
.0(a
,b)
48
.6±
33
.0(b
)
Avo
id
14
Χ
2=
19
.63
3
0
.00
1
0.0
03
2
7.0
±1
5.2
(a)
27
.0±
14
.9(a
) 4
6.3
±2
3.5
(b)
63
.1±
33
.6(b
)
Con
trol
20
Χ
2 =7.
09
3 0.
07
0.11
26
.4±1
3.5
26.3
±14
.1
20.9
±10
.1
23.2
±11
.5
d.f.,
deg
rees
of f
reed
om; A
dj. P
(Q) f
alse
dis
cove
ry ra
te a
djus
ted
P-va
lue;
Cal
l/PI,
echo
loca
tion
call
or p
ulse
inte
rval
.
*deg
rees
of f
reed
om a
djus
ted
due
to la
ck o
f sph
eric
ity. F
or e
xam
ples
of a
ttack
type
s see
Fig
ure
3.3.
†Thi
s re
spon
se i
s no
t a
shift
in
spec
tral
feat
ures
mad
e by
the
bat
, bu
t m
ore
likel
y du
e to
bat
s di
rect
ing
thei
r so
nar
away
fro
m t
he m
oths
and
the
mic
roph
one.
See
text
for f
urth
er e
xpla
natio
n.
82
CHAPTER IV
Sonar Jamming in the Field: Effectiveness and Behavior of a Unique Prey Defense
A.J. Corcoran, and W. E. Conner
The following manuscript was published in Journal of Experimental Biology (vol. 215,
pgs. 4278-87, 2012) and is reprinted with permission. Stylistic variations are due to
requirements of the journal. A.J.C. designed and executed the experiments, conducted
data analysis, and wrote the manuscript. W.E.C. provided oversight and editorial
assistance on the project.
83
ABSTRACT
Bats and insects provide a model system for integrating our understanding of predator-
prey ecology, animal behavior, and neurophysiology. Previous field studies of bat-insect
interactions have been limited by the technological challenges involved with studying
nocturnal, volant animals that use ultrasound and engage in battles that frequently last a
fraction of a second. We overcame these challenges using a robust field methodology that
included multiple infrared cameras calibrated for three-dimensional reconstruction of bat
and moth flight trajectories and four ultrasonic microphones that provided a spatial
component to audio recordings. Our objectives were to document bat-moth interactions in
a natural setting and to test the effectiveness of a unique prey defense – sonar jamming.
We tested the effect of sonar jamming by comparing the results of interactions between
bats and Grote’s tiger moth, Bertholdia trigona, with their sound-producing organs either
intact or ablated. Jamming was highly effective, with bats capturing more than ten times
as many silenced moths as clicking moths. Moths frequently combined their acoustic
defense with two separate evasive maneuvers – flying away from the bat, and diving.
Diving decreased bat capture rates for both clicking and silenced moths, while flying
away did not. The diving showed a strong directional component, a first for insect
defensive maneuvers. We discuss the timing of B. trigona defensive maneuvers – which
differs from that of other moths – in the context of moth auditory neuroethology.
Studying bat-insect interactions in their natural environment provides valuable
information that complements work conducted in more controlled settings.
84
INTRODUCTION
The study of bats and moths has provided fundamental biological insights in areas
ranging from the neurological basis of behavior (Roeder, 1967a; Yager, 2012) to the co-
evolution of predator and prey (Fullard, 1998; Goerlitz et al., 2010). It has also revealed a
suite of defensive behaviors that either have not previously been known to occur in the
acoustic modality (aposematism and mimicry) or, in the case of sonar-jamming, are
unique in the natural world (reviewed by Conner and Corcoran, 2012).
Kenneth Roeder established the paradigm for moth defensive behaviors (Roeder,
1967a). Eared moths employ one of two flight behaviors depending on the intensity, and
therefore proximity, of an echolocating bat (Roeder, 1962; Roeder, 1964). Quiet
echolocation calls indicate a distant bat that has not yet detected the moth; these calls
elicit a controlled negative phonotactic response (“turning away”) aimed at avoiding
detection (Roeder, 1962; Roeder, 1967b; Goerlitz et al., 2010). Louder echolocation calls
indicate a nearby bat in pursuit and elicit a non-directional evasive maneuver such as a
dive or spiral to the ground (Roeder, 1962).
Moths of the superfamily Noctuoidea have received most attention in the study of
anti-bat defenses. Most Noctuoids have paired metathoracic tympana which each have
only two auditory receptor neurons: A1, which is sensitive to lower intensity ultrasound,
and A2, which is sensitive to higher intensity ultrasound (Fullard et al. 2003; Roeder,
1967a). A1 firing is thought to initiate negative phonotactic behavior, while A2 firing has
long been associated with late-attack defenses such as diving (Roeder, 1974). However,
recent work disputes this hypothesis, and instead proposes that late-attack defenses are
85
stimulated by the summation of A1 and A2 firing (Fullard et al. 2003; Ratcliffe et al.,
2009).
Tiger moths (Lepidoptera: Erebidae, Arctiinae; formerly Lepidoptera: Arctiidae)
(Zahiri et al. 2011) respond to attacking bats by producing ultrasonic clicks through the
buckling of metathoracic tymbal organs (Fullard and Heller, 1990; Barber and Conner,
2006). Depending on whether a species is chemically defended and the amount of sound
it produces, moth clicks serve as acoustic aposematic (Hristov and Conner, 2005a;
Hristov and Conner, 2005b; Ratcliffe and Fullard, 2005), mimetic (Barber and Conner,
2007; Barber et al., 2009), or sonar-jamming signals (Corcoran et al., 2009; Corcoran et
al., 2010; Corcoran et al., 2011; Conner and Corcoran, 2012). In some cases these
defenses may be combined; for example, a small degree of sonar-jamming may enhance
bat learning of aposematic signals (Ratcliffe and Fullard, 2005). Sonar-jamming has long
existed as a hypothesis for the function of moth clicks (Fullard et al., 1979; Fullard, 1994),
but only recently has this hypothesis been confirmed in a study pitting a tiger moth with
exceptional sound-producing abilities [Bertholdia trigona (Grote, 1879)] against big
brown bats (Eptesticus fuscus) in captivity (Corcoran et al., 2009). To disrupt
echolocation, moth clicks must occur in a narrow 1-2 ms window surrounding the time
echoes return to the bat from the ensonified moth (Miller, 1991). These clicks then
disrupt the timing of the firing of bat auditory neurons which are involved in encoding
target distance (Touggard et al. 1998). The number of clicks that fall within this window
determine the size of ranging errors (Miller, 1991) and the likelihood of bat capture
(Corcoran et al. 2011). In captivity, jammed bats narrowly miss their prey by a distance
86
predicted by psychophysical studies (Corcoran et al. 2011). Field studies of sonar-
jamming moths have not previously been attempted.
Research documenting the pursuit and escape flight of bats and insects has largely
been restricted to captive animals in controlled environments (Corcoran et al., 2010;
Dawson et al., 2004; Ghose et al., 2006; Ghose et al., 2009; Triblehorn et al., 2008).
While these laboratory studies have yielded many novel discoveries, the limited space of
a flight room prevents the animals from exhibiting the full suite of behaviors that occur in
nature. Bats in captivity alter the temporal and spectral features of echolocation calls, and
also the directionality and intensity of their sonar beams (Surlykke and Moss, 2000;
Surlykke et al., 2009). This may substantially alter the timing of insect defensive
responses, and therefore the result of encounters.
Field studies of bats and insects suffer from their own limitations. First, the species of
bat and insect being observed are frequently not known (Acharya and Fenton, 1999;
Roeder, 1962; Rydell, 1992). Second, echolocation calls of bats are rarely recorded
(Acharya and Fenton, 1999; Agee, 1969; Roeder, 1962; Rydell, 1992), and moth clicks
have never been recorded from free-flying tiger moths in the field (Acharya and Fenton,
1992). Third, visual observation without video documentation is the norm (e.g., Acharya
and Fenton, 1999). This is especially problematic because attack sequences typically last
only a fraction of a second. Fourth, observations, whether visual or photographed, are
frequently made only from a single location, making assessment of directionality of
movement prone to error. And fifth, the effect of artificial lights, frequently used to
attract moth and bat activity to a focal observation area (Rydell, 1992; Acharya and
87
Fenton, 1999), has rarely been considered as a factor affecting the animals’ behavior
(Svensson and Rydell, 1998).
We aimed to overcome these limitations using a robust field methodology in our
study of natural bat attacks on the only animal in nature (B. trigona) known to jam the
sonar of its predator. We set out to answer three questions: (1) How effective is sonar
jamming compared with other moth defenses; (2) Does B. trigona use evasive maneuvers
in addition to jamming, and if so, do these behaviors aid in its survival; and (3) What are
the acoustic stimuli that cause B. trigona to use its various defensive behaviors?
MATERIALS AND METHODS
Field location and equipment
Research was conducted in early August 2010 and late July 2011 at the Southwestern
Research Station (operated by the American Museum of Natural History), 8 km
southwest of Portal, Arizona, USA. Research was conducted in an open field surrounded
primarily by Arizona Cottonwood (Populus fremontii) and Alligator Juniper (Juniperus
deppeana). Vegetation was a minimum of 25 m away from the observation area.
We recorded interactions using three Basler Scout cameras (model scA640-120gc;
Ahrensburg, Germany) recording at 60 frames-per-second at 640x480 resolution (Figure
4.1). The cameras were hardware-synchronized by a custom-built external trigger box
(Innovision Systems, Columbiaville, MI, USA). Video was acquired with MaxTraq2D
software (Innovision-Systems) running on a desktop computer. Infrared illumination was
provided by 12 Wildlife Engineering IR-Lamp6 lights (Tucson, AZ, USA), two Bosch
88
UFLED20-8BD illuminators (Farmington Hills, MI, USA), and one Raytec Raymax 200
platinum illuminator (Ashington, UK).
Three-dimensional calibration of video recording
The cameras were calibrated for three-dimensional (3-D) reconstruction of bat and
moth flight paths using the relative orientation method (Svoboda et al., 2005) as
implemented in the MaxTraq3D software (“Dynamic Wand Method”; Innovision
Systems). For this method, two spherical infrared markers are anchored at a fixed
distance from each other on a calibration object, or “wand.” This wand is moved
throughout the interaction volume, and the markers are later digitized in the software. A
second calibration object with four calibration points along two perpendicular axes is
used to set the origin of the 3-D space and the x-, y-, and z-axes. We tested the accuracy
of our calibration by moving the wand through the recorded volume a second time and
determining the distance between the two points (which were set 146 cm apart) using the
MaxTraq3D software. Over 2500 frames, the points had a mean error of 3.8 mm, or
0.26%. Our calibration volume was approximately 6 m x 6 m x 5 m, or 180 m3.
Audio equipment
Audio was recorded using four Avisoft Bioacoustics CM16/CMPA ultrasonic
microphones (Berlin, Germany) connected to an Avisoft Ultrasound Gate 416Hb
recording interface. Each of the four microphones was placed on a stand 1.5 m off the
ground, in a square-like arrangement around the calibration volume (Figure 4.1). Audio
was triggered to begin simultaneously with the video by a signal sent from the triggering
box to the recording interface. Tests showed the error of synchronization between audio
89
and video to be <1 ms. The four microphones allowed us to record the relatively quiet
clicks of B. trigona and the directional echolocation calls of bats over a larger volume
than would be possible with a single microphone. The arrangement of microphones also
provided a spatial component to our audio recordings that was useful for assigning bat
and moth sounds to individual animals captured in our video recordings.
Bat-moth field observations
One of the challenges of studying bats and moths in the field and capturing
interactions on audio and video is finding a situation where attacks occur reliably within a
predefined volume. To overcome this limitation we attracted moths to a focal area using
two 15-watt ultraviolet lights (Leptraps LLC, Georgetown, KY, USA) placed on 4-m
poles, with the two poles placed approximately 5 m apart (Figure 4.1). This arrangement
allowed for varied movement of the moths as they flew between and around the lit areas.
The large numbers of moths around the lights attracted foraging bats. Early in the
evening (between approximately sunset and midnight), the many moths around the lights
interfered with our ability to isolate individual bat-moth interactions. As the evening
progressed (between 0000 and 0400), moth activity decreased, but the foraging bats
remained. This is when we conducted our experiments. Individual B. trigona had
previously been collected at black-lights within 100 m of the recording area. Moths were
held individually in 30-ml plastic cups for up to 24 hours prior to experimentation.
Individuals held over from the previous night were fed a saturated sugar water solution.
Moths were either left intact or had both tymbal organs ablated by puncturing the cuticle
of the tymbal. No external bleeding was ever observed from the ablation. Clicking and
90
silenced moth flight behavior was analyzed to assess whether the ablation procedure had
an effect on moth flight (see below).
During experimentation B. trigona were placed on a release platform consisting of a
heating pad attached to a 1-m pole anchored in the ground. Individual moths flew from
the heating pad to the observation area of their own volition, and bat attacks ensued
within one to three minutes. Several methods were used to ensure that the moths being
attacked were indeed B. trigona. In many cases an observer could track an individual
moth from the release platform to an encounter with a bat. In other cases moths could be
identified based on their distinctive clicks in the audio tracks. The relative timing and
intensity of the clicks on the four audio channels was used to ensure that the clicks came
from the moth being attacked in the video. Only attacks in which the identity of the moth
could be unambiguously confirmed were used in the analysis.
Bat species identification
The species of bat in each encounter was determined using the automated acoustic
species recognition algorithms (Corcoran, 2007) of Sonobat 3.0 (Arcata, CA, USA).
Sonobat makes classifications by measuring numerous acoustic properties of bat
echolocation calls and running them through a discriminant function analysis classifier
that was created using recordings of known species. A species classification is accepted
only if the discriminant probability (a measure of statistical confidence) is > 0.90. If a
species cannot be determined, an individual is assigned to a species group, which consists
of multiple species that make similar echolocation calls (Parsons and Jones, 2000).
91
Based on 19 years of mist-netting capture data, 16 insectivorous bat species are
known to regularly occur at our field site (J. Tyburec, Bat Conservation International,
personal communication). Of these, 12 were included in our acoustic species classifier;
Idionycteris phylottis, Myotis auriculus, M.velifer, and Nyctinomops macrotus lacked a
sufficient number of known recordings to be included. I. phylottis and N. macrotus
produce characteristically low-frequency calls (12-17 kHz) that were not recorded during
the experiments. M. auriculus and M velifer both produce calls with peak frequency in
the 40-kHz range (J. Szewczak, personal communication). Therefore, any calls identified
to the genus Myotis in the 40-kHz range are reported only to the species-group level.
Analysis of bat and moth flight trajectories
The flight trajectories of bats and moths were manually digitized using Maxtraq2D. A
single point representing the “center of mass” for each animal was used. The digitized
values were then imported into MaxTraq3D, which generated 3-D coordinates for the bat
and moth for each frame of each attack. These values were then imported into a custom
MATLAB (Natick, MA, USA) program (BATracker; coded by B. Chadwell). A
smoothing spline function (MATLAB spaps routine) was fit to each flight trajectory, and
this function was used to estimate various flight parameters.
A 3-D plot of the bat and moth for each encounter was analyzed. The moth’s flight
response was first described qualitatively, and discrete behaviors were then confirmed
using quantitative metrics. Two categories of behaviors were observed – flying away, and
diving. Fly-aways were designated by a rapid decrease in β (the angular deviation
between the moth’s flight vector and the bat-moth vector) combined with a rapid rise in
92
tangential acceleration. Alternatively, a fly-away could also be designated by the moth
rapidly increasing translational acceleration while β remained low. Diving involved a
rapid vertical acceleration toward the ground. The number of attacks where bats aborted
pursuit in response to moth clicks was determined using previously established criteria
(Corcoran et al. 2011); these include lengthening pulse intervals and bats veering away
from the moth soon (100-300 ms) after clicking began. The duration of each attack was
taken as the total time when φ (the angular deviation between the bat’s instantaneous
flight vector and the vector from the bat to the moth) was less than 45 degrees.
In order to visualize moth evasive behavior with greater detail than that possible in
the field, high-speed video of big brown bats attacking free-flying B. trigona in captivity
was taken using a RedLake N3 camera (Tallahassee, FL, USA) shooting at 1000 frames-
per-second. In order to restrain the moths’ flight to an area within the camera’s view, two
ultraviolet LEDs were suspended 1.5 m from the ceiling of an outdoor flight cage (6m x
4m x 3m) and approximately one meter from each other. This effectively replicated our
outdoor recording setup, but on a much smaller scale. The moths were attracted to the
area around the suspended LEDs and bats released into the flight cage attacked the freely
flying moths.
Statistical analysis
Statistical analysis was conducted in IBM SPSS version 19 (Armonk, NY, USA) and
R version 2.12.1 (Vienna, Austria). The G-test was used to test for independence between
categorical variables (Sokal and Rohlf, 1995). The Williams correction was applied when
expected cell values in the G-test were less than five (Sokal and Rohlf, 1995). In such
93
cases, the G-statistic is labeled “G-adjusted.” For continuous variables normality was
assessed visually using normal quantile plots (Sokal and Rohlf, 1995) and quantitatively
using the Shapiro-Wilk test of normality. Alpha was set at 0.05.
RESULTS
Effectiveness of the sonar-jamming defense
The presence of moth clicks had a strong effect on the result of bat-moth
encounters (Figure 4.2; G-test; G-adjusted =56.1; d.f. = 3; P < 0.0001). Nearly all of the
clicking moths avoided capture from attacking bats (Movie 1, Movie 2), and the few
moths that were captured were released unharmed. In contrast, bats captured a large
majority of the silenced moths, and ate two-thirds of those they captured (Figure 4.2). In
order to later compare the effectiveness of different defenses, we will use a measure we
call the “defense ratio,” which equals the capture rate when a defense is absent divided by
the capture rate when the defense is present. In this case the defense ratio for sonar
jamming is 10.4 (71% divided by 6.8%).
B. trigona evasive maneuvers
Moths employed two distinct evasive maneuvers – fly-aways and dives (Figure
4.3). Fly-aways involved a sharp turn or acceleration away from an oncoming bat. We
prefer this term over “turn-away” as turning is not necessarily required if the moth
accelerates away from a bat approaching from the rear. Dives involved a rapid
acceleration toward the ground with vertical speed of 1.5 to 4 m·s-1. The resolution of our
cameras did not allow us to determine visually whether these dives were passive or active.
94
However, the rate of maximum vertical acceleration during dives (18.8 ± 7.0 m∙s-2) well
exceeded the rate of gravitational acceleration (9.8 m∙s-2), indicating that the dives are
active. A high-resolution video of the diving behavior obtained in captivity confirms this
finding (Movie 2).
Diving occurred in more than half of all bat-moth encounters, and at similar rates
for both clicking and silenced moths (G-test; G = 0.279; d.f. = 1; P = 0.60); fly-aways
and no evasive maneuvering were less common (Figure 4.4A). Fly-aways occurred twice
as often in silenced moths, while attacks where moths exhibited no evasive maneuvers
were twice as common in clicking moths (Figure 4.4A); however, these differences were
not statistically significant (Fly-aways; G = 3.09; d.f. = 1; P = 0.08; no maneuvers; G =
1.648; d.f. = 1; P = 0.20). Bats captured more silenced than clicking moths regardless of
whether the moths were diving (G-test; G = 22.0; d.f. = 1; P < 0.0001), flying away (G-
test; G = 24.7; d.f. = 1; P < 0.0001), or exhibiting no (G-test; G = 12.2; d.f. = 1; P < 0.001)
evasive maneuvers (Figure 4.4B). Both clicking (G-adjusted = 4.78; d.f. = 1; P = 0.03)
and silenced (G-adjusted = 5.37; d.f. = 1; P =0.02) moths that dove had lower capture
rates than moths that either flew away or did no evasive maneuver (Figure 4.4B). Moths
that flew away and moths that did no evasive maneuvers had similar capture rates
(clicking moths, P = 0.30; silenced moths P = 0.37).
Clicking caused bats to abort their attacks rapidly (as evidenced by increasing
pulse intervals and bats veering away from the moth soon after clicking began) in 61%
(27 of 44) of bat-moth encounters. This behavior was never observed in 38 attacks on
silenced B. trigona, a significantly different margin (G-test; G = 45.2; d.f. = 1; P <
0.0001). The duration of attacks on silenced moths (median 1.4 s; interquartile range 1.0-
95
1.5 s) was twice that of attacks on clicking moths (median 0.7 s; interquartile range 0.6 –
1.0 s), which was significantly different (Mann-Whitney U test; U = 1012.5; d.f. = 1; P <
0.0001). The distance silenced moths flew during attacks (median 2.2 m; interquartile
range 1.7 - 3.4 m) was 47% greater than that of clicking moths (median 1.5 m;
interquartile range 1.1 - 2.2 m); this difference was statistically significant (Mann-
Whitney U test; U = 882.0; d.f. = 1; P = 0.002), and may be an underestimate as some
silenced moths were chased out of the calibrated volume during attacks. Finally, of moths
that were not captured in attacks, 64% (7 of 11) of silenced moths, but only 7% (3 of 41)
of clicking moths, flew to the ground, a significantly significant margin (G-adjusted =
13.8; d.f. = 1; P = 0.0002).
Effect of light on moth evasive maneuvers and bat capture success
The moth’s distance from a light did not affect the moth’s likelihood of diving
(Figure 4.5A; G-adjusted = 1.67; d.f. = 3; P = 0.64) or of being captured (Figure 4.5B;
silenced moths; G-adjusted = 2.55; d.f. = 3; P = 0.46; clicking moths; G-adjusted = 3.34;
d.f. = 3; P = 0.34). Silenced moths within 1 m of a light appeared to be captured less
often than moths flying farther from a light (Figure 4.5B), although this may be a result
of the small sample size of moths flying within 1 m of a light (N = 3).
Timing of moth defenses
Moth clicking, diving, and flying away were all initiated after the bat detected the
moth and began its approach (Figure 4.6). Moth defenses occurred within a similar range
of bat-moth distances and bat pulse intervals. The one exception to this was that fly-
aways for silenced moths occurred when the bat was particularly close (Figure 4.6). This
96
late response may not have been observed for clicking moths because bats frequently
aborted their attacks earlier in the sequence, not providing the moths an opportunity to
evade at such a close distance.
Directionality of moth diving
An additional analysis was conducted on the directionality of moth flight prior to
and during diving (Figure 4.7). Prior to dives, the horizontal component of moth flight
was random with respect to the oncoming bat (Rayleigh test; z = 0.207; P =0.86; Figure
4.7A). However, during dives the horizontal component of the moths’ flight showed a
significant directional trend away from the oncoming bat (Rayleigh test; z = 4.77; P
=0.007 ; Figure 4.7B). Moths flew slightly upward (Rayleigh test; z = 5.03; P =0.006 ;
Figure 4.7C) prior to diving at a sharp angle away from the approaching bat (Rayleigh
test; z = 27.4.03; P <0.0001; Figure 4.7D).
Bat species identification and capture success rates
Ninety percent of bats attacking clicking B. trigona and 79% of bats attacking
silenced B. trigona were classified in the 40-kHz Myotis group (Table 4.1). Three other
bat species were identified in one to nine attacks. While sample sizes for species other
than 40-kHz Myotis were small, capture rates for both clicking and silenced moths were
fairly consistent between species (0-8.3% for clicking moths, 70-100% for silenced
moths; Table 4.1).
DISCUSSION
Sonar-jamming is highly effective against a range of bat species
97
Bats captured over ten times more silenced moths than clicking moths, indicating
that sonar-jamming is a highly effective defense (Figure 4.2). Sonar jamming’s defense
ratio (10.4) compares favorably with that of insect evasive flight maneuvers (2.1-4.9;
Figure 4.8). Aposematic clicking in Hypoprepia fucosa has a defense ratio of 9.6.
Clicking therefore appears to be more effective than evasive flight maneuvers regardless
of whether it is used to warn bats of toxicity or jam their sonar. B. trigona clicking also
appears to increase survival after capture, as none of the three clicking B. trigona that
were captured were eaten, while two-thirds of silenced B. trigona that were captured
were eaten (Figure 4.2). Clicking itself may therefore have an aversive effect on bats,
either because of the high intensity of the clicks at close range or possibly through tactile
stimulation (Masters, 1979). This effect could be important against gleaning bats, whose
relatively quiet echolocation calls do not elicit a clicking response prior to capture
(Ratcliffe and Fullard, 2005).
Can B. trigona clicks jam the sonar of a variety of bat species? As the moth’s
tymbal buckles, it produces a burst of broadband microclicks covering frequencies of 25-
89 kHz and with peaks of energy that sweep from 85 kHz down to 50 kHz and back again
(Corcoran et al. 2009). It is not clear what role, if any, these acoustic properties play in
enhancing the jamming function. The most common predators in this study were Myotis
bats that use peak echolocation frequencies between 40 and 45 kHz (Table 4.1). These
bats’ (which at our field site could include M. volans, M. auriculus, M. ciliolabrum, and
M. velifer) most frequent prey are lepidopterans (Fenton and Bell, 1979; Fitch et al., 1981;
Warner, 1985) and they only overcame the jamming defense in 8.3% of attacks. M.
californicus (which uses echolocation above 50 kHz) (Gannon et al. 2001) and Lasiurus
98
blossevillii (a highly agile flyer) (Norberg and Rayner, 1987) were also each defeated by
sonar-jamming in two of two encounters in the current study (Table 4.1). Previous
laboratory work found that sonar-jamming is also effective against E. fuscus (Corcoran et
al., 2009; Corcoran et al., 2010), whose peak echolocation frequency is near 30 kHz.
Therefore, the current data suggests that sonar-jamming by B. trigona is effective against
bats that use a range of echolocation frequencies (30-50 kHz) and flight behaviors. This
is impressive considering that moths do not dynamically alter their jamming defense to
the bat predator, as moths are tone deaf (Roeder, 1967a), and largely lack the ability to
alter the frequency and temporal composition of sounds they produce (Barber and Conner,
2006; Corcoran et al., 2010; Fullard, 1992).
B. trigona combine sonar-jamming with evasive maneuvering
To our knowledge, this study represents the first 3-D analysis of moth flight
patterns in response to attacking bats in the natural environment. We found that B.
trigona use the same evasive maneuvers employed by other moths – 1) flying-away and 2)
diving. Diving behavior in silenced B. trigona had a defense ratio of 1.8, a value only
slightly less than other insects’ diving behaviors (Figure 4.8). Diving and clicking proved
the most effective defense, with none of the 24 moths exhibiting both behaviors being
captured (Figure 4.4B). Diving may therefore serve two potential functions in B. trigona
– 1) enhancing the effectiveness of sonar jamming and 2) serving as a “backup” defense
in cases where their tymbal organs are not functioning. In captivity, B. trigona did not
click in 22% of attacks (Corcoran et al. 2009). Since these moths were tethered it is not
possible to know whether they would have exhibited diving behavior, but if they had they
would have increased their chances of survival. These results demonstrate that evasive
99
flight maneuvers in B. trigona are not vestigial traits, such as are the auditory systems of
certain Noctuid moths that inhabit remote, bat-free islands (Fullard et al., 2004; Fullard et
al., 2007a), or have diurnal activity periods (Fullard et al., 1997).
Jamming occurs by interfering with the bat’s neural processing of prey echoes
(Tougaard et al., 1998). This diminishes the bat’s precision in determining target distance
and prevents it from coordinating its capture maneuver (Miller, 1991; Corcoran et al.,
2011). By simultaneously diving and clicking, B. trigona presents a dual challenge to the
attacking bat, which must simultaneously overcome its errors in echo processing and
adjust its flight path to intercept the diving moth (Ghose et al., 2006). This proves to be
too great a challenge, and the bat is unable to capture the moth. Based on visual
observations, some researchers have reported that tiger moths use diving or spiraling
evasive maneuvers in addition to clicking (Agee, 1969; Roeder, 1974; Fullard et al.,
1979); others have reported that evasive maneuvers were absent during bat attacks
(Dunning, 1968; Acharya and Fenton, 1992). It is not clear why some tiger moths use
evasive flight maneuvers while others do not.
A number of differences in flight were observed between silenced and clicking
moths. Silenced moths appeared to more frequently exhibit fly-aways and they did so
with bats at a closer distance, and less frequently exhibit no evasive maneuvers compared
to clicking moths. Attacks on silenced moths lasted longer and silenced moths flew
longer distances evading capture. Silenced moths also flew to the ground nearly ten times
as often as clicking moths. It is unlikely that these differences are due to the ablation
procedure, as manipulated animals would not be expected to exhibit evasive maneuvers
more frequently than unaltered animals. Instead, they are likely a result of bats behaving
100
differently when attacking clicking and silenced moths. Bats frequently (61%) aborted
attacks on clicking moths after hearing clicks, but never aborted attacks on silenced
moths prior to making a capture attempt.
These findings are the first evidence that moths dynamically alter their evasive
flight pattern depending on the behavior of an attacking bat. They also demonstrate that
moths are capable of processing bat echolocation call information in the very late stages
of attack. This contradicts a hypothesis made by Fullard and colleagues (Fullard et al.,
2003), which stated that moth tympanic receptors are not capable of encoding bat calls in
the final stage of attack, as these calls have reduced intensity, duration, and time intervals
between calls. Finally, these results demonstrate that combining jamming and diving
provides maximum defensive advantage with minimum costs in time spent avoiding
predators.
Timing and directionality of B. trigona evasive maneuvers.
B. trigona exhibited the same two categories of defenses – flying away and diving
– as was first described in the pioneering experiments of Kenneth Roeder (Roeder, 1962;
Roeder, 1967a). However, two key differences exist between our results and the
paradigm established by Roeder some 50 years ago. First, Roeder found that moths
exhibited negative phonotaxis in response to relatively quiet ultrasound pulses that
simulated distant bats (Roeder, 1962). In contrast, B. trigona exhibited negative
phonotaxis after bats had already begun their approach and locked their intense sonar
beams on the moth (Ghose and Moss, 2003). This finding supports prior evidence that
clicking tiger moths do not alter their flight activity in response to search-phase
101
echolocation, while silent noctuoid moths do (Ratcliffe et al., 2008). This finding is also
supported by evidence that some tiger moths have reduced sensitivity of the A1 auditory
neuron (Fullard et al. 2003), the sensory cell implicated in the moth negative phonotactic
response. However, we cannot exclude the possibility that the lights used in our
experiment prevent the moths from exhibiting negative phonotactic behavior earlier in
attacks, or that the moths have habituated to the relatively low-danger threat of quiet bat
search calls (Ratcliffe et al. 2011).
Second, Roeder argued that the intense calls of bats late in an attack saturate the
moth’s tympanic receptors and eliminate its ability to determine the directionality of the
sound (Roeder, 1967b). Diving behavior elicited late in the attack should therefore be
non-directional, as Roeder observed from unidentified moths using stroboscopic flash
photography (Roeder, 1962). In contrast, B. trigona diving has a clear directional
component, indicating that their tympanic receptors are not saturated by approach-phase
echolocation. When a bat echolocation attack sequence was broadcast to preparations of
five species of Noctuoid moths while recording the auditory receptor cells, the dogbane
tiger moth (Cycnia tenera) demonstrated the highest thresholds for both the A1 and A2
receptors. Tiger moths may be less susceptible to saturation of auditory receptor cells,
and directional diving responses may be limited to this group. Alternatively, directional
diving responses may be more common than has previously been documented. The only
other insect that has been systematically tested for this behavior is the praying mantis
Parasphendale agrionina, whose single functional ear precludes directional behavioral
responses (Ghose et al. 2009).
102
B. trigona begins clicking earlier in attacks in the field compared to in captivity.
Having data on the defensive responses of B. trigona in the field (current study)
and in captivity (Corcoran et al. 2009; Corcoran et al. 2011) allows us to compare the
stimuli that provoke clicking under the two environmental conditions. Clicking by tiger
moths is triggered primarily by the intensity and pulse intervals (the inverse of pulse rate)
of echolocation calls (Fullard et al, 2007b). In the field bats triggered B. trigona to click
in response to longer pulse intervals (47 ms vs. 25 ms) and at a greater distance (170 cm
vs. 76 cm). This cannot be explained by the two studies using different bat species as the
larger bodied E. fuscus used in captivity should have echolocated more loudly and
elicited clicking earlier than the smaller Myotis used in the field (Holderied and von
Helverson, 2003). Bats in the field echolocate about 20 dB louder than bats in captivity
(Surlykke and Kalko, 2008; Holderied and von Helverson, 2003; Waters and Jones,
1995), because they are typically further from background objects (Surlykke and Kalko,
2008). However, the intensity of bat calls used during attack has not been measured in the
field (Fullard et al., 2007). Studies that broadcast calls of attacking bats while recording
moth auditory nerve cell and behavioral responses have employed echolocation attack
sequences recorded in captivity (Fullard et al. 1994; Fullard et al. 2003; Barber and
Conner 2006; Corcoran et al. 2010). Results of such studies may therefore differ from
what occurs in open habitats in nature. Further work is needed to characterize the
acoustic field moths are exposed to when being attacked by bats under natural conditions,
and to apply this information to our understanding of moth neuroethology.
Moth proximity to ultraviolet lights does not inhibit defenses or affect capture rates.
103
Manmade lights provide a useful tool in the study of bat-insect interactions by
drawing the animal participants into a focal observation area (Acharya and Fenton 1992;
Acharya and Fenton 1999; Roeder, 1962; Rydell, 1992). These lights, however,
undoubtedly affect the behavior of moths, and likely bats, under study. Geometrid winter
moths flying within 4 m of a 125-watt mercury vapor lamp exhibit fewer evasive flight
maneuvers in response to pulsed ultrasound compared to moths flying in a dark woodland
(Svennssen and Rydell, 1998). Studies of bats attacking insects around lights have
typically not quantified the effects of lights on moth behavior and on the outcome of
interactions (Acharya and Fenton, 1992; Acharya and Fenton, 1999; Rydell, 1992). In the
current study (where 15-watt ultraviolet lights were used) we found no such effect, as the
percentage of moths diving and being captured were independent of moth distance to
ultraviolet lights (Figure 4.5). The one difference that appeared to stand out (albeit not
statistically significant and with the small sample size of N=3) was a decrease in capture
success of silenced moths within 1 m of lights. This result is the opposite of what would
be expected if lights reduced the effectiveness of moth defenses. Instead, this more likely
demonstrates the difficulty aerial hawking bats have when trying to capture prey close to
background objects (Siemers and Schnitzler, 2004). We conclude that low wattage
ultraviolet lights appear to be a valid method for attracting naturally behaving bats and
moths for study. This finding also demonstrates that the insect species and the type of
light may be critical for understanding the environmental impacts of light pollution.
There may be effects of lights on moth and bat behavior that we cannot observe, and
further work is required to confirm these findings using conditions that do not require
light.
104
Ecological benefits of sonar-jamming
Sonar-jamming provides many benefits to a nocturnal, volant insect. It is more
effective than evasive maneuvering, and as effective as acoustic aposematism (Figure
4.8), without the costs of sequestering toxins and having a limited number of available
host plants (Nishida, 2002). In environments where toxic, clicking moths are present
(including our field site), palatable, jamming moths may gain additional protection
through acoustic Batesian mimicry (Barber and Conner 2007; Barber et al. 2009),
whereby bats misperceive the clicks as aposematic messages. However, the large
differences in the acoustic signals of aposematic moths and jamming moths (Corcoran et
al. 2010; Conner and Corcoran 2012) would facilitate predators’ ability to differentiate
the two (Barber et al. 2009). Given that jamming moths far outnumber aposematic moths
at our field site (Corcoran and Conner, unpublished data) Batesian mimicry would be
predicted to be ineffective (Harper and Pfennig, 2007; Pfennig et al. 2001). B. trigona
clicks may sometimes also serve as a legitimate aposematic signal, as 33% of silenced B.
trigona that were captured were rejected (Figure 4.2B), a number similar to what was
found in palatability assays conducted using big brown bats in captivity (Corcoran et al.
2009). Therefore, jamming would be expected to be the predominant defense in about
two-thirds of attacks.
B. trigona clicks frequently turned away bat predators without a chase, thus
preventing lengthy and energetically expensive escape sequences. Clicking moths also
less frequently flew to the ground during bat attacks, avoiding encounters with other
predators (Guignion and Fullard, 2004), and time lost foraging and looking for mates.
Having the security of a clicking defense may also allow moths to continue their normal
105
activities when echolocating bats are present but not yet attacking (Ratcliffe et al., 2008).
The question thus arises, why isn’t jamming more common if it confers so many
advantages over other defenses? One possible answer is that jamming defenses are more
common than we realize, especially in the tropics, where tiger moth diversity is high and
most species remain unstudied (Corcoran et al., 2010). Selection on anti-bat defenses
may be stronger in the tropics, where bat species richness is high (Stevens and Willig,
2002). Costs of clicking for jamming and other purposes -- be they energetic,
developmental or other -- have not been investigated.
CONCLUSION
We have demonstrated a reliable method for studying 3-D flight trajectories and
acoustic behavior of bats attacking insects in their natural environment. This approach
allows for determining the effectiveness of defense and attack strategies, the
documentation and description of flight behaviors, and measurement of the effect of the
environment (such as proximity to lights or background vegetation) on bat-insect
interactions. The primary limitation of the current method is the use of lights for
confining moth activity within a pre-defined observation area. Further field studies are
needed to complement the existing literature on bat-insect interactions, which consists
largely of dietary analyses of fecal pellets (Clare et al., 2009; Whitaker et al., 2009),
bioacoustic and physiological studies of sound production in bats and sound reception in
moths (e.g., Goerlitz, 2010), and laboratory experiments using captive animals (Corcoran
et al., 2009; Ghose et al, 2006; Ghose et al., 2009). Field studies also provide an
106
opportunity to generate and test hypotheses in neuroethology, such as the relationship
between insect hearing sensitivity and initiation of defensive behaviors.
The current study focused on a few species of bat and one species of moth with a
unique defensive ability. We found that sonar-jamming is a highly effective defense
against a variety of bat predators, particularly when used in conjunction with diving
behaviors. Future work will highlight the similarities and differences in behaviors of
different predator and prey species. When combined with our understanding of insect
auditory systems, we will finally understand the connections between physiology and
behavior that Kenneth Roeder began to unravel decades ago.
107
List of Symbols and Abbreviations
3-D Three-dimensional
β The angular difference between the bat-moth vector and the moth flight vector
φ The angular difference between the bat-moth vector and the bat flight vector
FUNDING
Funding was provided by the National Science Foundation [grant number IOS-0615164
and IOS-0951160 to W. E. C.], the American Museum of Natural History and Wake
ForestUniversity.
108
REFERENCES
Acharya, L. and Fenton, M. B. (1992). Echolocation behaviour of vespertilionid bats (Lasiurus
cinereus and Lasiurus borealis) attacking airborne targets including arctiid moths. Can. J.
Zool. 70, 1292-1298.
Acharya, L. and Fenton, M. B. (1999). Bat attacks and moth defensive behaviour around street
lights. Can. J. Zool. 77, 27-33.
Agee, H. (1969). Response of flying bollworm moths and other tympanate moths to pulsed
ultrasound. Ann. Rev. Entomol. Soc. Am. 62, 801-807.
Barber, J. R. and Conner, W. E. (2006). Tiger moth responses to a simulated bat attack: timing
and duty cycle. J. Exp. Biol. 209, 2637-2650.
Barber, J. R. and Conner, W. E. (2007). Acoustic mimicry in a predator–prey interaction. Proc.
Natl. Acad. Sci. U. S. A.104, 9331.
Barber, J. R., Chadwell, B. A., Garrett, N., Schmidt-French, B. and Conner, W. E. (2009).
Naïve bats discriminate arctiid moth warning sounds but generalize their aposematic
meaning. J. Exp. Biol. 212, 2141-2148.
Clare, E. L., Fraser, E. E., Braid, H. E., Fenton, M. B. and Hebert, P. D. (2009) Species on
the menu of a generalist predator, the eastern red bat (Lasiurus borealisi): using a
molecular approach to detect arthropod prey. Mol. Ecol. 18, 2532-2542.
Conner, W. E. and Corcoran, A. J. (2012). Sound strategies: The 65 million-year-old battle
between bats and insects. Annu. Rev. Entomol. 57.
Corcoran, A. J. (2007). Automated acoustic identification of nine bat species of the eastern
United States. Master’s Thesis. Humboldt State University.
Corcoran, A. J., Barber, J. R. and Conner, W. E. (2009). Tiger moth jams bat sonar. Science
325, 325-327.
109
Corcoran, A. J., Conner, W. E. and Barber, J. R. (2010). Anti-bat tiger moth sounds: Form
and function. Curr. Zool. 56, 358-369.
Corcoran, A. J., Barber, J. R., Hristov, N. I. and Conner, W. E. (2011). How do tiger moths
jam bat sonar? J. Exp. Biol. 214, 2416-2425.
Dawson, J., Kutsch, W. and Robertson, R. (2004). Auditory-evoked evasive manoeuvres in
free-flying locusts and moths. J. Comp Physiol., A 190, 69-84.
Dunning, D. C. (1968). Warning sounds of moths. Zeitschrift für Tierpsychologie 25, 129-138.
Fenton, M. B. and Bell, G. P. (1979). Echolocation and feeding behaviour in four species of
Myotis (Chiroptera). Can. J. Zool. 57, 1271-1277.
Fitch, J. H., Shump, K. A. and Shump, A. U. (1981). Myotis velifer. Mammalian Species, 1-5.
Fullard, J. H. (1992). The neuroethology of sound production in tiger moths (Lepidoptera,
Arctiidae). J. Comp. Physiol. A 170, 575-588.
Fullard, J. H. (1994). Jamming bat echolocation: the dogbane tiger moth Cycnia tenera times its
clicks to the terminal attack calls of the big brown bat Eptesicus fuscus. J. Exp. Biol. 194,
285-298
Fullard, J. H. (1998). The sensory coevolution of moths and bats. In Comparative hearing:
insects (ed. R. R. Hoy, A. N. Popper, R. R. Fay) pp. 279-326.
Fullard, J. and Heller, B. (1990). Functional organization of the arctiid moth tymbal (Insecta,
Lepidoptera). J. Morphol. 204, 57-65.
Fullard, J. H., Fenton, M. B. and Simmons, J. A. (1979). Jamming bat echolocation: the clicks
of arctiid moths. Can. J. Zool. 57, 647-649.
Fullard, J. H., Dawson, J. W., Otero, L. D. and Surlykke, A. (1997). Bat-deafness in day-
flying moths (Lepidoptera, Notodontidae, Dioptinae). J. Comp. Physiol. A 181, 477-483.
Fullard, J. H., Dawson, J. W. and Jacobs, D. S. (2003). Auditory encoding during the last
moment of a moth's life. J. Exp. Biol. 206, 281-294. New York: Spring-Verlag
110
Fullard, J. H., Ratcliffe, J. M. and A. R. Soutar. (2004) Extinction of the acoustic startle
response in moths endemic to a bat-free habitat. J. Evolution Biol. 17, 856-861.
Fullard, J. H., Ratcliffe, J. M. and Ter Hofstede, H. (2007a). Neural evolution in the bat-free
habitat of Tahiti: partial regression in an anti-predator auditory system. Biol. Lett. 3, 26-
28.
Fullard, J. H., Ratcliffe, J. M., and C. G. Christie. (2007b). Acoustic feature recognition in the
dogbane tiger moth, Cycnia tenera. J. Exp. Biol. 210, 2481-2488.
Gannon, W. L., Sherwin, R. E., DeCarvalho, T. N. and O'Fallell, M. J. (2001). Pinnae and
echolocation call differences between Myotis californicus and M. ciliolabrum (Chiroptera:
Vespertilionidae). Acta Chiropterol. 3, 77-91.
Ghose, K. and Moss, C. F. (2003). The sonar beam pattern of a flying bat as it tracks tethered
insects. J. Acoust. Soc. Am. 114, 1120.
Ghose, K., Horiuchi, T. K., Krishnaprasad, P. and Moss, C. F. (2006). Echolocating bats use
a nearly time-optimal strategy to intercept prey. PLoS Biol. 4, e108.
Ghose, K., Triblehorn, J. D., Bohn, K., Yager, D. D. and Moss, C. F. (2009). Behavioral
responses of big brown bats to dives by praying mantises. J. Exp. Biol. 212, 693-703.
Goerlitz, H. R., Ter Hofstede, H. M., Zeale, M. R. K., Jones, G. and Holderied, M. W. (2010).
An aerial-hawking bat uses stealth echolocation to counter moth hearing. Curr. Biol. 20,
1568-1572.
Guignion, C. and Fullard, J. H. (2004). A potential cost of responding to bats for moths flying
over water. Can. J. Zool. 82, 529-532.
Harper Jr, G. R. and Pfennig, D. W. (2007). Mimicry on the edge: why do mimics vary in
resemblance to their model in different parts of their geographical range? Proc. R. Soc. B
274, 1955-1961.
Holderied, M. W. and Von Helversen, O. (2003). Echolocation range and wingbeat period
111
match in aerial-hawking bats. Proc. R. Soc. B 270, 2293-2299.
Hristov, N. I. and Conner, W. E. (2005a). Effectiveness of tiger moth (Lepidoptera, Arctiidae)
chemical defenses against an insectivorous bat (Eptesicus fuscus). Chemoecology 15,
105-113.
Hristov, N. I. and Conner, W. E. (2005b). Sound strategy: acoustic aposematism in the bat–
tiger moth arms race. Naturwissenschaften 92, 164-169.
Kick, S. A. and Simmons, J. A. (1984). Automatic gain control in the bat's sonar receiver and
the neuroethology of echolocation. J. Neurosci. 4, 2725-2737.
Masters, W. M. (1979). Insect disturbance stridulation: Its defensive role. Behav. Ecol. Sociobiol.
5, 187-200.
Miller, L. A. (1991). Arctiid moth clicks can degrade the accuracy of range difference
discrimination in echolocating big brown bats, Eptesicus fuscus. J. Comp. Physiol. A 168,
571-579.
Miller, L. A. and Olesen, J. (1979). Avoidance behavior in green lacewings. J. Comp. Physiol. A
131, 113-120.
Nishida, R. (2002). Sequestration of defensive substances from plants by Lepidoptera. Annu. Rev.
Entomol. 47, 57-92.
Norberg, U. M. and Rayner, J. M. V. (1987). Ecological morphology and flight in bats
(Mammalia; Chiroptera): wing adaptations, flight performance, foraging strategy and
echolocation. Phil. Tran.R. Soc. B, 335-427.
Parsons, S. and Jones, G. (2000). Acoustic identification of twelve species of echolocating bat
by discriminant function analysis and artificial neural networks. J. Exp. Biol. 203, 2641-
2656.
Pfennig, D. W., Harcombe, W. R. and Pfennig, K. S. (2001). Frequency-dependent Batesian
mimicry. Nature 410, 323.
112
Ratcliffe, J. M. and Fullard, J. H. (2005). The adaptive function of tiger moth clicks against
echolocating bats: an experimental and synthetic approach. J. Exp. Biol. 208, 4689-4698.
Ratcliffe, J. M., Soutar, A. R., Muma, K. E., Guignion, C. G. C. and Fullard, J. H. (2008).
Anti-bat flight activity in sound-producing versus silent moths. Can. J. Zool. 86, 582-587.
Ratcliffe, J. M., Fullard, J. H., Arthur, B. J. and Hoy, R. R. (2009). Tiger moths and the threat
of bats: decision-making based on the activity of a single sensory neuron. Biol. Lett. 5,
368-371.
Ratcliffe, J. M., Fullard, J. H., Arthur, B. J., and Hoy, R. R. (2011). Adaptive auditory risk
assessment in the dogbane tiger moth when pursued by bats. Proc R. Soc. B 278, 364-370.
Siemers, B. M. and Schnitzler, H. U. (2004). Echolocation signals reflect niche differentiation
in five sympatric congeneric bat species. Nature 429, 657-661.
Roeder, K. D. (1962). The behaviour of free flying moths in the presence of artificial ultrasonic
pulses. Anim. Behav. 10, 300-304.
Roeder, K. D. (1964). Aspects of the noctuid tympanic nerve response having significance in the
avoidance of bats. J. Insect Physiol. 10, 529-532, IN1-IN4, 533-546.
Roeder, K. D. (1967a). Nerve cells and insect behavior. Cambridge, Mass.: Harvard University
Press
Roeder, K. D. (1967b). Turning tendency of moths exposed to ultrasound while in stationary
flight. J. Insect Physiol. 13, 873-880.
Roeder, K. D. (1974). Acoustic sensory responses and possible bat-evasion tactics of certain
moths. In Proceedings of the Canadian Society of Zoologists Annual Meeting (ed. M. D.
B. Burt), pp. 71-78. Fredericton, NB: University of New Brunswick Press.
Rydell, J. (1992). Exploitation of insects around streetlamps by bats in Sweden. Funct. Ecol.
744-750.
Stevens, R. D., and Willig, M. R. (2002). Geographical ecology at the community level:
113
perspectives on the diversity of new world bats. Ecology 83, 545-560.
Sokal, R. R. and Rohlf, F. J. (1995). Biometry: the principles and practice of statistics in
biological research. New York: W. H. Freeman and Company.
Surlykke, A. and Moss, C. F. (2000). Echolocation behavior of big brown bats, Eptesicus fuscus,
in the field and the laboratory. J. Acoust. Soc. Am. 108, 2419.
Surlykke, A., and Kalko E. K. V. (2008). Echolocation bats cry out loud to detect their prey.
PLoS ONE 3, e2036
Surlykke, A., Pedersen, S. B. and Jakobsen, L. (2009). Echolocating bats emit a highly
directional sonar sound beam in the field. Proc. R. Soc. B 276, 853-860.
Svensson, A. and Rydell, J. (1998). Mercury vapour lamps interfere with the bat defence of
tympanate moths (Operophteraspp.; Geometridae). Anim. Behav. 55, 223-226.
Svoboda, T., Martinec, D. and Pajdla, T. (2005). A convenient multicamera self-calibration for
virtual environments. Presence-Telop. Virt. 14, 407-422.
Tougaard, J., Casseday, J. and Covey, E. (1998). Arctiid moths and bat echolocation: broad-
band clicks interfere with neural responses to auditory stimuli in the nuclei of the lateral
lemniscus of the big brown bat. J. Comp. Physiol., A 182, 203-215.
Triblehorn, J., Ghose, K., Bohn, K., Moss, C. and Yager, D. (2008). Free-flight encounters
between praying mantids (Parasphendale agrionina) and bats (Eptesicus fuscus). J. Exp.
Biol. 211, 555-562.
Warner, R. M. (1985). Interspecific and temporal dietary variation in an Arizona bat community.
J. Mammal., 66, 45-51.
Whitaker, J. O., McCracken, G. F. and Siemers, B. J. (2009) Food habits analysis of
insectivorous bats In Ecological and Behavioral Methods for the Study of Bats, 2nd ed.
(ed. T. H. Kunz and S. Parsons), pp. 567-592 Baltimore, MD: Johns Hopkins University
Press
114
Yager, D. D. (2012). Predator detection and evasion by flying insects. Curr. Opin. Neurobiol.22,
201-207.
Zahiri, R., Kitching, I. J., Lafontaine, J. D., Mutanen, M., Kaila, L., Holloway, J. D. and
Wahlberg, N. (2011). A new molecular phylogeny offers hope for a stable family level
classification of the Noctuoidea (Lepidoptera). Zool. Scr. 40, 158-173.
115
Figure 4.1. Diagram of field recording setup. Two ultraviolet lights on poles were used to
attract insect and bat activity to a focal observation area. Three infrared cameras with
infrared lights were used to capture video, while four ultrasonic microphones recorded
audio of bat-moth interactions.
116
Figure 4.2. Ethogram showing results of bats attacking (A) clicking and (B) silenced
Bertholdia trigona. Line widths are proportional to the percentage of encounters that
include a particular transition.
117
Figure 4.3. Three-dimensional flight trajectories of bats (red) attacking (A, C) clicking,
and (B, D) silenced Bertholdia trigona (blue) exhibiting defensive maneuvers. Moths are
seen flying away (A,B), and diving (C, D). Both interactions with silenced moths resulted
in capture. Arrows show the direction of flight. In A, C, circles indicate the positions of
bats and moths when the moth began clicking. Gridlines are each 1m apart.
118
Figure 4.4. (A) Percentage of bat attacks in which Bertholdia trigona exhibited defensive
behaviors, and (B) bat capture rates on moths exhibiting different combinations of
behaviors. Numbers over bars show the proportion of total attacks where a behavior was
exhibited (A) or capture was made (B). *** indicates significance of P< 0.001.
119
Figure 4.5. Percentage of moths (A) diving, and (B) captured by bats relative to moth
distance from a light source. Numbers above bars indicate the proportion of attacks
resulting in a dive or capture. Diving and capture rates did not significantly differ
between moths at different distances from a light (see results for statistics).
120
Figure 4.6. Box plots of (A) bat-moth distances and (B) bat echolocation pulse intervals
at the initiation of Bertholdia trigona defenses and bat approaching behavior. Moth
defenses were initiated at a similar range of bat-moth distances and pulse intervals, with
the exception of fly-aways for silenced moths. Note that all moth defenses were initiated
after bats began their approach. Box plots show 5th, 25th, 50th, 75th, and 95th percentiles
of distributions. * indicates significantly different distributions with P < 0.05.
121
Figure 4.7. Directionality of Bertholdia trigona diving behavior in response to bat attack.
Prior to diving (A, C) moths flew randomly with respect to the direction of the oncoming
bat. However, the diving behavior (B, D) had a strong directional bias away from the
oncoming bat. Moths often flew slightly upwards (C) prior to diving (D). Arrowheads
mark the starting (A, C) and ending (B, D) positions of moth flight. Moth flight
trajectories were rotated and translated such that the bat approaches from the right (black
bat symbols) and the initiation of the moth dive is at the plot’s origin. Dashed black
arrows indicate the median distance and direction of moth flight when the direction of
flight was not randomly distributed.
122
Figure 4.8. Cross-species comparison of the effectiveness of insect defenses at preventing
capture by bats. The defense ratio equals the percent of insects captured when the defense
is absent, divided by the percent captured when the defense is present, and is used to
control for varying environmental conditions between studies. Gray bars indicate insect
evasive flight maneuvers, while black bars indicate moth clicking defenses of acoustic
aposematism and sonar-jamming. All insects are in order Lepidoptera, except C. carnea
(Neuroptera) and P. agrioninea (Mantodea). Data taken from 1, Agee, 1969; 2, Miller
and Oleson, 1979; 3, Rydell, 1992; 4, Acharya and Fenton, 1999; 5, Triblehorn et al.,
2008; 6, current study; and 7, Acharya and Fenton, 1992.
123
Table 4.1. Capture rates of clicking and silenced Bertholdia trigona by bat species
Clicking Bertholdia trigona Silenced Bertholdia trigona
Bat species N # Caught%
Caught N # Caught%
Caught40 kHz Myotis1 36 3 8.3% 30 21 70.0%M. californicus 2 0 0.0% 7 5 71.4%Lasiurus blossevilli 2 0 0.0% - - -M. auriculus - - - 1 1 100.0%Total 40 3 7.5% 38 27 71.1%
1 Includes M. auriculus, M. ciliolabrum, M. velifer, and M. volans
124
CHAPTER V
Optimal predator risk assessment by the sonar-jamming Arctiine moth Bertholdia trigona
Aaron J. Corcoran, Ryan D. Wagner, and W. E. Conner
The following manuscript has been submitted for publication to PLoS ONE. Stylistic
variations are due to requirements of the journal. A.J.C. designed and executed the
experiment experiments, conducted data analysis, and wrote the manuscript. R.D.W. also
designed and executed the experiments, assisted collecting and analyzing data and
provided editorial assistance. W.E.C. provided oversight and editorial assistance on the
project.
125
ABSTRACT
Nearly all animals face a tradeoff between seeking food and mates and avoiding
predation. Optimal escape theory holds that an animal confronted with a predator should
only flee when benefits of flight (increased survival) outweigh the costs (energetic, lost
foraging time, etc.). We propose a model for prey risk assessment based on the predator’s
stage of attack. Risk level should increase rapidly after the predator detects the prey and
commits to the attack. We tested this hypothesis using a predator – bats – whose active
sensory system of echolocation reveals its stage of attack. We used a prey defense –
clicking used for sonar jamming by the tiger moth Bertholdia trigona– that can be readily
studied in the field and laboratory and is enacted simultaneously with evasive flight. We
predicted that prey employ defenses soon after being detected, and that prey defensive
thresholds discriminate between legitimate and false predatory threats. Laboratory and
field experiments using playbacks of simulated bat calls and naturally behaving bats,
respectively, confirmed our predictions. Moths clicked soon after bats detected and
targeted them. Also, B. trigona clicking thresholds closely matched predicted optimal
thresholds for discriminating legitimate and false predator threats for bats using search
and approach phase echolocation – the period when bats are looking for and assessing
prey. This is the first study to correlate quantitatively the sensory stimuli that trigger
defensive behaviors with measurements of cues provided by predators during natural
attacks. We propose theoretical models for explaining prey risk assessment depending on
the availability of cues that reveal a predator’s stage of attack.
126
INTRODUCTION
Nearly all animals face a tradeoff between avoiding predation and seeking food
and mates. This problem is most acute when an animal detects a predator. What actions
will lead to maximum fitness? What defenses should be employed and when? These
questions are the subject of optimal escape theory, which holds that an animal must
balance the benefits of initiating a defense (i.e., the likelihood of increasing survival) with
the costs (e.g., expended time and energy) (Ydenberg and Dill, 1986; Cooper and
Frederick, 2007).
Studies on optimal escape theory typically examine the factors that influence how
close predators are allowed to approach before prey flee (flight initiation distance, FID).
A greater threat to survival should lead to a longer FID, while higher costs of fleeing
should decrease FID (Ydenberg and Dill, 1986; Stankowich and Blumstein, 2005;
Cooper and Frederick, 2007). The predictions of optimal escape theory have largely been
supported by empirical evidence (Lima and Dill, 1990; Stankowich and Blumstein, 2005),
with aspects from the prey (e.g. morphological and behavioral defenses, amount of
experience), predator (size, speed, approach trajectory) and environment (distance to
refuge) consistently modulating FID.
A critical component of escape theory is the prey’s ability to recognize the threat
level a predator presents, and to respond accordingly. Defensive responses are frequently
graded in intensity depending on the threat level that is perceived. This behavioral
response is termed “threat sensitivity” (Helfman, 1989). For example, prey frequently
assign higher risk to predators that approach faster and use a more direct approach
(Cooper, 1997; Stankowich and Coss, 2006). A few studies have tested whether prey use
127
other cues from the predator that could establish “intent”. At least two studies have found
that prey use predator gaze to indicate higher risk (Bateman and Fleming, 2011; Cooper
et al. 2012); however, others found no effect of gaze on FID (Helfman and Winkelman,
1997; Stankowich and Coss 2006).
With the amounting body of literature on optimal escape theory, efforts have
recently been made to find broad rules to explain the diversity of patterns examined
(Blumstein, 2010; Stankowich and Blumstein, 2005). Blumstein (2010) noted a trend
common to birds, mammals, lizards, and an invertebrate where FID is dependent on the
distance a predator begins its approach (start distance). These results suggest that the
predator’s approaching movement causes the prey to flee, a finding that was not
anticipated by early escape theory models (Blumstein, 2003). Blumstein suggested a
general rule that prey flee as soon as they detect a predator and identify it as a threat. He
argues that this minimizes the time prey spend devoting attention to a predator. However,
it was not specified how prey should determine whether a predator is a threat, and if this
rule holds, how it can be reconciled with our current understanding of optimal escape
theory (Ydenberg and Dill, 1986; Cooper and Frederick, 2007).
A successful predation sequence can be catalogued into a series of stages to aid in
description and analysis (Endler, 1986). A modified version of Endler’s (1986) predation
sequence is illustrated in Figure 5.1A. The sequence begins with a predator searching for
prey (search stage). After detection the predator will identify the prey and assess whether
it is worth pursuing (assessment stage). If the predator immediately recognizes a
profitable target, this stage will be rapid; however the predator may need to approach the
prey to gather more information. After the predator decides the prey is profitable the
128
pursuit stage begins. We hypothesize that predator threat markedly escalates during the
assessment stage until the predator commits to the attack (Figure 5.1B). At this time prey
defenses of crypsis have failed and unless an alternate defensive strategy is available (e.g.
aposematic signaling, startle), escape is the primary remaining option. We hypothesize
that prey risk assessment is driven by determining whether the predator has reached the
assessment stage and how close the predator is to committing to pursuit. If evidence
suggests the predator is near or at the pursuit stage, then the prey should flee, as there is
little benefit to waiting. At this point, the prey’s cost of attending to the predator is
increasing (Blumstein, 2010) and the likelihood of escape is decreasing. While this
hypothesis has been stated previously in various forms (Broom and Ruxton, 2005;
Cooper, 2005; Endler, 1986; Blumstein, 2010), it has not been tested using prey
responding to their naturally-behaving predators in a situation where the predator’s stage
of attack can be easily determined. Bats attacking insects provide just such an opportunity,
as the bat echolocation attack sequence reliably indicates their stage of attack (Figure
5.1C).
Bats search for insect prey by emitting echolocation (or sonar) pulses at a
relatively low rate of 7 – 12 calls per second (Holderied and von Helverson, 2003); this is
termed search phase echolocation. Upon detecting a prey echo, the bat gradually
increases the rate of emissions, beginning approach phase echolocation (figure 5.1C). The
increased emission rate allows rapid updating of the bat’s “acoustic image” of the
environment (Moss and Surlykke, 2001). During approach phase the bat localizes the
target, eventually locking its directional sonar-beam to within 3˚ of the prey item (Figure
5.2; Ghose and Moss, 2003). Late in the approach phase (a period sometimes referred to
129
as the tracking phase; Kick and Simmons, 1984), the bat gradually decreases the intensity
of its emissions as part of a system that keeps the intensity of returning echoes at a
constant level despite decreasing target distance (automatic gain control; Figure 5.2)
(Hartley 1992a, 1992b; Boonman and Jones, 2002; Hiryu et al. 2007). This presumably
allows the bat to extract maximum information from target echoes (Kick and Simmons,
1984). During this period, bats identify the target and decide whether to continue pursuit
or abandon the attack (Kick and Simmons, 1984). Therefore, the approach phase of bat
echolocation (Figure 5.1C) can be likened to the assessment stage of our generalized
predation model (Figure 5.1A). In the final echolocation phase, the terminal buzz, the bat
emits echolocation signals at a maximal rate (over 160 calls/s) as it attempts to intercept
the prey and coordinate its final capture maneuver (Elemens et al. 2011). The terminal
buzz phase can consequently be likened to the pursuit stage of our predation model
(Figure 5.1).
Insects from at least seven orders detect bats by hearing their high-frequency
echolocation calls (Hoy, 1998). Moths have been the focus of much research on bat-
insect interactions (Conner and Corcoran, 2012); and they have a two-part defensive
response that is consistent with the threat sensitivity hypothesis (Roeder, 1967).
Relatively quiet echolocation calls indicate a distant bat that has not detected the moth
(Goerlitz et al. 2010; Roeder, 1967); they alert moths to fly away from the sound source
to decrease the probability of being detected. Higher-intensity calls indicate a bat that has
approached more closely, and they elicit passive or active power dives or spirals to the
ground (Roeder, 1967). Tiger moths (Lepidoptera: Erebidae, Arctiinae; formerly
Lepidoptera: Arctiidae) also respond to high-intensity bat calls with ultrasonic clicks.
130
Depending on the chemistry and amount of sound produced by a tiger moth species, these
clicks warn bats that the prey is toxic (acoustic aposematism; Hristov and Conner, 2005;
Barber and Conner, 2007) or disrupt the bat’s processing of prey echoes (sonar jamming;
Corcoran et al, 2009; Corcoran et al, 2011; Conner and Corcoran, 2012). The tiger moth
clicking response provides a valuable model for studying prey defenses, as it can be
recorded in the field under natural conditions (Corcoran and Conner, 2012) and in the
laboratory in tethered animals being broadcast bat-like sounds (Barber and Conner, 2006;
Corcoran et al. 2010; Fullard et al., 2007; Ratcliffe et al., 2009). Because clicking is
paired with diving in the sonar-jamming moth Bertholdia trigona (Corcoran and Conner,
2012), the initiation of clicking can be used as an indicator of when the moth begins its
escape from attacking bats.
The dogbane tiger moth Cycnia tenera has been a model for the study of moth
clicking for many decades (e.g. Fullard, 1979; Fullard, 2003; Fullard et al. 2007). It
detects attacking bats using the acoustic cues of call intensity and call repetition rate (or
its inverse, call pulse interval) (Fullard, 1984; Fullard et al. 2007). C. tenera is most
sensitive to calling rates that bats use in the approach phase of attack. This is also when
most tiger moths click in response to bats (Barber and Conner, 2006). Why tiger moths
click when they do is a matter of debate. Some have argued that clicks presented late in
the attack are optimized for jamming (Fullard et al. 1994) or enhancing their aposematic
defense (Barber and Conner, 2006; Fullard et al. 2007; Ratcliffe and Fullard, 2005;
Ratcliffe and Nydam, 2008). Clicking too early could alert nearby predators to the moth’s
presence, or alternatively, bats may not be able to hear moths clicking at a distance
(Barber and Conner, 2006). We believe that optimal escape theory provides a useful
131
framework for testing hypotheses regarding the timing of moth clicking, as this timing is
under many of the same influences as the initiation of prey escape behaviors. If clicking
does not conform to the predictions of escape theory, then the results could be taken as
evidence that other factors (e.g. maximizing defensive effectiveness) predominate.
We studied the cues that stimulate B. trigona to click to test our hypothesis that
prey assess predator risk by determining the stage of the predator’s attack. We predicted
that B. trigona click in response to predator cues that indicate a bat has detected them and
was committing to the attack. We tested this prediction by 1) determining the pulse
interval and intensity thresholds that elicit clicking by broadcasting simulated bat calls to
tethered moths in a sound chamber; 2) characterizing the sounds moths hear in the field
when being attacked by bats (“true threat”) and when bats are attacking a nearby moth
(“false threat”); and 3) comparing the acoustic properties and flight trajectories of bat
passes that did and did not elicit a clicking response from B. trigona in the field.
MATERIALS AND METHODS
Research location and animals
Field and laboratory experiments were conducted during July 2010 at the Southwestern
Research Station (run by the American Museum of Natural History), 10 km southwest of
Portal, AZ. Moths, including noctuid controls and experimental B. trigona (Grote, 1879),
were collected and visually identified at black lights and mercury vapor lights set near
riparian areas on the station grounds. Moths were held in 30 ml plastic vials for up to 48
hours prior to experimentation. Bats used in experiments were observed in their natural
habitat.
132
Field experiment setup
We recorded infrared video and ultrasound of free-flying bats attacking tethered and free-
flying moths in their natural habitat. Figure 5.3 illustrates the components of the field
setup. Individual moths and a miniature ultrasonic microphone (Knowles Acoustics FG-
3329) were suspended from the end of a 10-meter telescopic pole that was anchored into
the ground at a 45-degree angle. This arrangement, combined with three-dimensional
reconstruction of bat flight trajectories, moth positions, and microphone positions,
allowed us to calculate the bat call sound pressure levels at the point of emission (using
an arbitrary distance of 10 cm from the bat) and at the moth’s position. These calculations
are described below. A 3-mm diameter shielded microphone cable ran from an AR100
ultrasound receiver (Binary Acoustics Technology, Tucson, AZ, USA) along the length
of the pole and down from the pole’s tip (Figure 5.3). Ultrasound was recorded on a
laptop computer running Spect’r software (Binary Acoustics Technology) sampling at
250 kHz. Individual moths were suspended by a 25 cm monofilament line from the end
of the microphone cable (Figure 5.3).
In preparation for tethering, we removed scales from the moth’s mesoscutum and affixed
to it a small (5mm) loop of monofilament line with gel superglue (Loctite brand). At the
time of experimentation, the moth was tied to the monofilament line on the telescoping
pole by the affixed loop and then hoisted into the air. The pole was shaken periodically
by the experimenter to add motion to the tethered moth and to keep the moth flying. A
15-watt ultraviolet light (Leptraps LLC, Georgetown, KY, USA) attached to a 1.5 m pole
near the hoisted moth was used to attract insects, and therefore foraging bats, to the
recording area.
133
Field experiment overview
We conducted two field experiments where we characterized the bat sounds moths hear
in their natural environment. In experiment 1, using soundless noctuid control moths, the
bat sounds correlating to “real” threats were compared to the bat sounds correlating to
“false” threats. A real threat was characterized as an attack on the tethered noctuid moth;
a false threat was an attack on a neighboring, free-flying moth. In experiment 2, we
recorded bats flying near and sometimes approaching tethered B. trigona. We then
compared acoustic and flight parameters of bat passes that elicited a clicking response
with those that did not elicit a response.
Videography
Three infrared-sensitive Basler Scout cameras (model scA640-120gc; Ahrensburg,
Germany) recording at 60 frames-per-second at 640x480 resolution were placed around
the experimental area and focused on the tethered moth. Cameras were hard-wired to start
simultaneously by a signal sent from a custom Innovision Systems (Columbiaville, MI)
synchronization box, which was controlled by MaxTraq software (Innovision Sysetms)
running on a desktop computer. Infrared illumination was provided by 12 Wildlife
Engineering IR-Lamp6 lights (Tucson, AZ, USA), and two Bosch UFLED20-8BD
illuminators (Farmington Hills, MI, USA).
3-D calibration and reconstruction
Using the relative orientation method (Svoboda et al., 2005) in MaxTraq3D (“Dynamic
Wand Method”; Innovision Systems) and the video recordings by the three cameras, the
three-dimensional positions of bats, moths, and the microphone were reconstructed. This
134
approach has been used recently for studying bat-moth interactions in the field and is
explained in more detail elsewhere (Corcoran and Conner, 2012). The accuracy of our
reconstructions was tested by moving a “wand” (two spherical infrared markers fastened
to a rod at fixed distance from each other) throughout our calibrated volume and
comparing the known distance between the two markers to that measured using our 3-D
reconstructions. Over 1500 frames, we found a mean error of 0.4 cm for the two markers
set 145 cm apart (0.28 % error). Our calibration volume was approximately 6 m (width)
by 6 m (depth) by 4 m (height) or 144 m3.
Two infrared tape markers were placed at known positions on the microphone
cable in order to determine the microphone’s position and directional axis. The “center-
of-mass” of the bats, moths and two microphone markers were digitized from our video
using MaxTraq2D (Innovision Systems). These 2-D data were transformed into 3-D
coordinates using MaxTraq3D. The 3-D coordinates were then imported into Matlab
(Natick, MA, USA), where a custom program (BATracker.m, coded by B. Chadwell and
A. Corcoran) was used to fit a quintic smoothing spline to the 3-D data. This spline
function was used to generate bat flight vectors, bat-moth vectors, bat approach angles,
and other flight parameters (Barber et al. 2009; Corcoran et al. 2011; Corcoran et al.
2012).
Audio calibration
We used our audio recordings and 3-D reconstructions to determine the SPLs of bat calls
at the tethered moth’s position and 10 cm from the bat (dB peSPL re. 20 µPa). Bats emit
a highly directional call (Ghose and Moss, 2003). The estimated SPLs for bat emissions
135
represent that emitted in the moth’s direction. Early in the attack, until the bat has locked
its sonar beam on the target, the moth is typically off-axis from the bat’s sonar beam
emission (Figure 5.2; Ghose and Moss, 2003), and estimated emission SPLs are likely
less than the maximum emitted by the bat.
Bat call intensities were first determined at the position of the microphone using
several adjustment factors. The frequency response of the Knowles microphone was
determined by playing pure tone signals from an Avisoft ScanSpeak Ultrasonic speaker
(Avisoft Bioacoustics, Berlin, Germany) to the exact microphone, cable, and receiving
unit used in the experiments. Audio was recorded at the same position (50 cm directly in
front of the speaker) by our Knowles microphone and by a Brüel & Kjær ¼” microphone
(grid off) connected to a Brüel & Kjær Type 2610 measuring amplifier. Playbacks were
delivered at 5 kHz increments from 20 -100 kHz. These values provided a frequency-
specific conversion from recorded voltage to SPL. The frequency response was fairly flat
(± 1.5 dB) from 20 – 40 kHz, followed by decreased sensitivity of approximately 5 dB
per 10 kHz from 40-100 kHz. This response resulted partly from the long, thin
microphone cable which was important for our experimental design. For 20 kHz, 30 kHz,
40 kHz, 50 kHz, and 60 kHz (the range of potential peak frequencies used by bats in this
study) the directionality of the Knowles microphone was determined in 22.5˚ increments
from the microphone pointing directly at the speaker to directly away from the speaker.
The microphone was fairly omnidirectional with adjustments ranging from ± 2-4 dB
depending on frequency.
The estimated SPL of bat calls recorded by the microphone and the 3-D positions
of the bat, moth, and microphone were used to determine the SPL at the moth’s position
136
and 10cm from the bat. Attenuation due to spherical spreading and excess atmospheric
attenuation were accounted for using the temperature and humidity recorded at the
beginning of each session (Bazley, 1976). There may have been a difference in the
recorded SPL at the microphone’s position and the moth’s position due to the
directionality of the bat call. This was minimized by having the microphone as close to
the moth as possible while still allowing bats to interact naturally with the tethered prey.
To account for this we measured the angle between the bat-moth vector and the bat-
microphone vector throughout each attack. Bat call directionality depends on the phase of
attack, with search and approach phase calls having -6dB horizontal beam width of 80˚
(40˚ off axis in either direction) and buzz phase calls having a -6dB horizontal beam
width of 180˚ (90˚ off axis; Jakobsen and Surlykke, 2010). During search and approach
phase the angle measured between bat-moth vector and bat-microphone vector was 23.5
± 9.7˚ and for buzz phase the angle was 44.4± 17.3˚. To compensate for this, we added 3
dB to our calculations of bat call SPLs; ± 1-3 dB of error in our calculations cannot be
accounted for since the exact direction of bat calls was unknown.
In attack sequences in which the moths clicked, intensity was determined by
averaging the intensity of the two pulses preceding the response. Pulse interval was
measured as the distance from the start of one pulse to the start of the next. In attack
sequences in which the moth did not click intensity was measured as the average of the
most intense pulse, the pulse before, and the pulse after. Pulse interval was measured as
the average of the distance between these three pulses.
Laboratory experimental setup
137
In our third experiment we determined the thresholds that elicited clicking in B.
trigona for a range of pulse intervals (4-100 ms). Pulse interval and intensity have
previously been shown to be the primary acoustic cues used by tiger moths to initiate
their clicking response (Fullard, 1984; Fullard et al., 2007). We used a previously
established experimental setup for broadcasting bat-like sounds to moths in a sound
chamber (Barber and Conner, 2006; Corcoran et al. 2010). Briefly, moths were held with
wings folded dorsally and clamped by a hemostat in a sound chamber (50 cm x 20 cm x
20 cm) lined with sound-absorbent foam. An Avisoft scanspeak ultrasonic speaker was
placed 5 cm posterior to the moth’s thorax and was used to broadcast ultrasonic digital
audio files to the moth. The playbacks and the moth’s clicking response were recorded by
an Avisoft CM16/CMPA ultrasonic microphone connected to an Avisoft Ultrasound Gate
416H receiver. The microphone was placed 5 cm from the moth and directed
perpendicular to its thorax. Ultrasound recordings were made on a laptop computer
running Avisoft-Recorder software and sampling at 300 kHz. We calibrated the intensity
of playbacks at the moth’s position (5 cm in front of the speaker) using a Brüel & Kjær
Type 2610 measuring amplifier with a Brüel & Kjær ¼” microphone (grid off).
Ultrasound playback files were generated in Matlab. They consisted of a series of
2 ms ultrasonic pulses (with 0.5 ms rise and fall times) separated by periods of silence,
the duration of which varied depending on the playback file. Pulse interval is defined as
the time from the beginning of one pulse to the beginning of the next pulse. Ten playback
files were created with different pulse intervals: 4 ms, 7 ms, 12 ms, 20 ms, 30 ms, 45 ms,
60 ms, 80 ms, and 100 ms. Each digital file was 10s long, and pulse intensities increased
at a rate of 5 dB/sec from 70 -120 dB peSPL. To prevent an extended clicking response,
138
playbacks were stopped as soon as the experimenter heard moth clicks. All playbacks
used pure tones at 40 kHz. This is a typical frequency used by bats that attack B. trigona
(Corcoran and Conner, 2012), and is near the peak auditory sensitivity of most moths
(Fullard et al., 2003).
For experimentation, moths were suspended in the dark sound chamber and trials
were initiated two minutes after the moth ceased clicking. Playbacks were presented in a
random order with two-minute silent periods between presentations. Only moths that
regularly clicked to stimuli throughout the experiment were used in the final analysis.
The audio recordings of moth clicking and playbacks were analyzed to determine the
intensity which elicited a clicking response. The time in the file of the first moth click
was compared to the known intensity of the playback immediately preceding it, and this
intensity was taken as the threshold for eliciting a clicking response.
Statistical analysis
A two-step regression analysis procedure was used to determine the relationship
between continuous variables. First, a linear regression was employed; if found
significant, a stepwise regression was conducted where the linear term was retained and a
quadratic term was tested for improving the relationship using a P-to-enter of 0.05.
(Tabachnick and Fidell, 2007). Discriminant Function Analysis (DFA) was used to
determine what acoustic and flight variables differ between bat passes that elicited and
did not elicit clicking by B. trigona in the field. Stepwise forward variable selection was
used with a P-to-enter of 0.05 (Tabachnick and Fidell, 2007). A Receiver Operating
Characteristic ROC curve was used to determine the degree of overlap in call intensities
139
between real and false threats for each echolocation phase using. The area under the ROC
curve (AUR), which equals the likelihood a randomly chosen call from the real threat
group has a higher intensity than a randomly chosen call from the false threat group, was
used as our measure of the degree of overlap (Bradley, 1997).
Repeated-measures Analysis of Variance (ANOVA) was used to determine
whether moths have different intensity thresholds for inducing clicking for pulse intervals
representing different phases of echolocation attack. Group means were examined for
normality using skewness and kurtosis statistics and for sphericity using Mauchley’s test.
Thresholds were averaged for representative pulse intervals for each phase (search: 80
and 100 ms; approach: 20, 30, and 45 ms; and buzz: 4 and 7 ms). Thresholds for pulse
intervals of 60 and 12 ms were not used as they are transitional between phases. Planned
Bonferronni pairwise comparisons were used to determine whether means were
significantly different (Sokal and Rohlf, 1995)
RESULTS
Characterization of real and false predator threats
We first characterized the bat sounds arriving at a moth when it is being attacked (real
threat) and when a nearby moth is being attacked (false threat). All sound levels are
indicators of the intensity being directed towards the moth, which is not always equal to
the maximum intensity emitted by the bat. In the real threat scenario the source level of
bat calls increased linearly to a peak (linear regression; B = 0.077 dB/ms; R2 = 0.66; P <
0.0001) and then decreased linearly (linear regression; B = -0.037 dB/ms; R2 = 0.71; P <
0.0001). This is seen clearly when the attacks are aligned by the bat call of maximum
140
intensity (Figure 5.4B). At the moth’s position bat call intensity increased linearly (linear
regression; B = 0.086 dB/ms; R2 = 0.83; P < 0.0001) until the bat call of maximum
emitted intensity, and then call intensity nearly plateaued (linear regression; B = -0.007
dB/ms; R2 = 0.11; P < 0.0001). This transition occurs about 100 ms into the approach
phase (which starts with a decrease of pulse interval in Fig. 5.4B), and is followed by the
bat turning towards the moth (indicated by decreasing approach angle in Fig. 5.4B; linear
regression; R = 0.68; P < 0.0001). In contrast, in false threats bat call source levels
(quadratic regression; R = 0.80; P < 0.0001) and SPLs at the moth’s position (quadratic
regression; R = 0.79; P < 0.0001) decreased as attacks progressed (Figure 5.4C). In false
threats the bat’s flight direction relative to the moth was not related to the time of the
attack (linear regression; R = 0.03; P = 0.74).
B. trigona clicking thresholds
B. trigona had the lowest clicking thresholds for pulse intervals in the late
approach phase of bat echolocation (20-30 ms; green symbols in Figure 5.5). Intensity
thresholds were significantly different between echolocation phases (Repeated measures
ANOVA; F = 19.2; d.f. = 2; P < 0.0001); thresholds for search (P = 0.015) and terminal
phase (P = 0.001) pulse intervals were higher than those for approach phase pulse
intervals. These results supported our hypothesis that moths are most likely to employ
defenses when predators have detected them and committed to an attack.
Discriminating real and false threats
To determine whether it is possible for a moth to differentiate real and false
threats, bat call pulse intervals and intensities (the cues used by tiger moths for
141
identifying an attack) for five attacks on a focal soundless moth (real threat) and five
attacks on a nearby soundless moth (false threat) were plotted (Figure 5.5). We compared
the degree of overlap in call intensities between real and false threats for each
echolocation phase using the area under the ROC curve (AUR), which equals the
likelihood a randomly chosen call from the real threat group has a higher intensity than a
randomly chosen call from the false threat group. Search phase calls had a moderate
degree of overlap between the two conditions (AUR = 0.72; P =0.009); however,
approach (AUR = 0.97; P < 0.0001) and terminal phase calls (AUR = 0.997; P < 0.0001)
had a large degree of separation. Using quadratic discriminant analysis we determined the
optimal thresholds for discriminating real and false threats with 50% (p=0.5) and 75%
(p=0.75) likelihoods of the threat being real. Measured B. trigona clicking thresholds
matched predicted p=0.75 thresholds for pulse intervals of 35-100 ms, but not for pulse
intervals at or below 20 ms (Figure 5.5). Pulse intervals in the terminal buzz
demonstrated the worst fit. These results support the hypothesis that B. trigona clicking
thresholds are optimized for differentiating predator threat levels for bats in search phase
and most of approach phase, but not for bats in buzz phase echolocation.
Clicking responses of tethered moths in the field
Using tethered B. trigona in the vicinity of free-flying bats, we determined how
well two groups of characteristics – bat call properties and bat flight trajectories – could
discriminate interactions where moths did or did not click. Bat call intensity at the moth’s
position was significant in predicting whether or not moths clicked for all three moths
tested (DFA; P < 0.0001); pulse interval was a significant discriminating variable for two
of three moths tested (DFA; P < 0.0001), with shorter pulse intervals (higher repetition
142
rates) being more likely to elicit a clicking response (Figure 5.6). Moths typically clicked
in response to bats in early to middle approach-phase (25-60 ms pulse intervals). Moth 3
also responded to moths in late search-phase (60-70 ms pulse intervals). Moth clicking
was preceded by bat calls that increased in intensity and slightly decreased in pulse
interval (bottom two rows of graphs in Figure 5.6), both indications that the moth had
recently been detected and targeted by the bat.
For interactions where bats flew through the calibrated volume, bat distance (DFA;
P < 0.01), but not approach angle (P > 0.1), significantly discriminated between clicking
and non-clicking cases for moths 1 and 2 (Figure 5.6). Neither variable was significant
for moth 3 (DFA; P > 0.1). All bat passes outside of the calibrated volume (which had a
minimum distance of 4 m from the moth) failed to elicit a clicking response. Because a
threshold could not be determined for moth 3 using only passes occurring with the
calibrated volume, we conducted an ROC analysis on bat distance using interactions in
and out of the calibrated volume. This analysis found a statistically significant threshold
(Figure 5.6, moth 3; P < 0.001). Moths 1 and 2 had similar bat distance clicking
thresholds, which were about 1.5 m less than the threshold for moth 3. Acoustic
characteristics were slightly better at predicting whether moths clicked than bat flight
characteristics. Acoustic characteristics correctly predicted an average of 98% of
interactions where moths clicked (positive predictive value; PPV) and 93% of
interactions where moths did not click (negative predictive value; NPV). Flight
characteristics had an average PPV of 90% and an average NPV of 80%. This indicates
that there were several cases where a bat’s flight trajectory could not explain the moth
clicking response, but bat acoustic characteristics could.
143
DISCUSSION
Using a combination of field and laboratory experiments we tested the hypothesis
that moths initiate defensive clicking in response to acoustic characteristics that reveal
they have been detected and targeted by a bat. To determine if this is the case we first
characterized the acoustic cues available to a moth under attack (Figure 5.4). Bats
typically detect insects from their periphery, and then direct their beam towards the target
as they decrease their pulse intervals (Figure 5.2; Ghose and Moss, 2003). To the moth
this is perceived as a rapid increase in intensity and a small decrease in pulse interval
(time -200 ms to 0 ms in Figure 5.4B). These are the earliest cues available to a moth that
it has been detected and targeted, and these cues appear to trigger moth clicking (Figure
5.4).
Another way to analyze the timing of moth clicking is by comparing the pulse
intervals and intensities of real and false threats (Figure 5.5). Intensities of search phase
calls are ill suited for discriminating predator threat levels, whereas approach and buzz
phase calls of real and false threats are easily distinguished. Therefore, early approach
phase (30-60 ms pulse intervals) is the first time moths could distinguish real and false
threats, and this is when tethered (Figure 5.6) and free-flying moths (Corcoran and
Conner, 2012) click in response to naturally foraging bats.
Finally, we found that moth clicking thresholds closely matched predicted optimal
thresholds for discriminating real and false threats for search and most of approach phase
echolocation (Figure 5.5).This is when it is most important for a moth to determine
whether it is under attack. After this point, in the terminal buzz, it may be too late for
144
clicking to be effective (Corcoran et al., 2010). Moths may also have difficulty accurately
encoding buzz phase echolocation in nervous signals (Fullard et al. 2003), and moths
may not be able to discriminate buzz phase echolocation from insect stridulations
(Fullard et al. 2007), however this has not been tested empirically. Together, these data
support the hypothesis that moth clicking thresholds have been shaped by natural
selection to discriminate between legitimate and false predatory threats. Moths appear to
initiate clicking at the earliest time when they can determine that they have been detected
and targeted by an echolocating bat. At least for sonar-jamming, it is not necessary to
include other explanations for the timing of moth clicking, for example that moths click
at a time to maximize the defense’s effectiveness (Fullard et al. 1994; Barber and Conner,
2006).
How do these results contribute to our understanding of optimal escape theory?
We hypothesized that prey assess predator risk based on where the predator is in its
attack sequence, with risk increasing after detection and as the predator commits to an
attack (Figure 5.1). Our results support this hypothesis, as moths reliably began their
jamming defense in response to cues that indicated they had recently been detected and
targeted. This happened when bats were at distances of 1-3 m (Figure 5.6), just inside the
range where bats detect moths (2.2-4.5 m) (Corcoran and Conner, 2012). Moths did not
click in response to several bats that flew within the distance expected to excite a
response (Figure 5.6). Because acoustic features of bat calls explained whether a moth
clicked in about 95% of interactions, it appears that these bats did not direct their sonar
beams at the moths, and the moths correctly ignored a false threat.
145
Growing evidence suggests that prey dynamically respond to predator behaviors
that indicate the predator’s stage of attack. Birds, mammals, lizards and invertebrates
often appear to wait a fixed amount of time after a predator begins approaching to begin
flight, regardless of the predator’s distance (Blumstein, 2003, 2010, Blumstein et al. 2005;
Cooper, 2005; Cooper, 2009; Stankowich and Coss, 2006). This response is more
common when predators move rapidly, supporting the idea that prey perceive these
movements as a directed attack (Cooper, 2005, 2009). Prey also flee from predators
(usually humans) at greater distances when they approach more directly (Cooper, 1997a;
Stankowich and Coss, 2006) turn towards prey (Cooper, 1997b, 1998), move faster
(Cooper, 2006; Stankowich and Coss, 2006 ), or approach while gazing at the prey
(Bateman and Fleming, 2011; Cooper, 2012). However, these finding are not universal.
For example, deer do not appear to respond to predator gaze or the presence of a gun
(Stankowich and Coss, 2006) and lizards do not flee from an approaching distant predator
if it moves slowly (Cooper, 2005, 2009). Different prey, therefore, use different predator
cues to assess risk. This may be a result of differing sensory capabilities, predators that
provide different cues in their approach, and differing environmental conditions (Caro,
2005). Further comparative work is needed, especially with studies of naturally behaving
predators and prey where predator cues, and prey responses to them, can be measured.
Bats and moths provide a useful system for testing the hypothesis that prey
determine predator risk based on the predator’s stage of attack because bats inadvertently
advertise when they have detected the prey and are committing to an attack. For many
predator-prey systems this is unlikely to be the case, and there may be selective pressure
for predators to conceal their stage of attack. For example, some bats use “stealth
146
echolocation” – that is, they purposefully echolocate quietly to prevent moths and other
eared insects from knowing they are under attack (Goerlitz et al. 2010). Depending on the
animals involved and environmental conditions, prey will have differing levels of
information about a predator’s stage of attack.
We propose that a prey’s ability to perceive cues that reveal the predator’s stage
of attack alters the shape of the predator risk assessment curve (Figure 5.7). Predator risk
(which equals to the benefit of fleeing) is typically presented as a linear (Cooper and
Frederick, 2007) or quadratic (Ydenberg and Dill, 1986) function of predator distance,
with risk increasing as the predator approaches. The cost of prey fleeing is assumed to
increase with predator distance (Figure 5.7A; Ydenberg and Dill, 1986; Stankowich and
Blumstein, 2005; Cooper and Frederick, 2007). The intercepts and slopes of these
functions can change depending on factors relating to the prey, predator, and environment
(Stankowich and Blumstein, 2005).These factors shift the intersection of the two
functions, and therefore the distance where it is optimal for prey to flee (D*). We argue
that this model holds for prey that have little or no information about predator attack
stage. For prey that have near complete information on predator attack stage (such as in
the current study), we propose that the predator risk function is sigmoidal and risk
increases rapidly in the predator’s assessment stage (Figure 5.1). The predator’s distance
where it detects and assesses prey would differ between interactions, and therefore the
predicted FID would vary depending on the predator’s detection/assessment distance.
The sigmoidal shape of the risk function reduces the effect that prey flight costs have on
the optimal FID (Figure 5.7C). A prey’s cost of fleeing is rarely if ever greater than the
threat posed by a lethal predator intent on capturing it. There may also be cases where
147
prey have partial information on predator attack stage. In this case we suggest that the
predator risk function would be a mixture of the linear and sigmoidal functions relating to
predator distance and attack stage, respectively (Figure 5.7B). This function may also
relate to situations where prey have information on predator attack stage but are at a
disadvantage if they are discovered at close range. This mixed model is similar to a
model where risk shifts from a lower to a higher risk functions when prey recognize a
change in predator behavior (Cooper, 2009).
The proposed model offers a theoretical explanation for the previous assertion
that prey should flee as soon as they detect a predator and determine it is a threat
(Blumstein, 2010). When prey can easily determine a predator’s attack stage (such as
with moths and bats), that factor overwhelms decision making. Prey costs and predator
distance become less important. When it is unknown whether a predator is attacking, prey
must use indicators like predator distance and approach speed to estimate the likelihood
of attack. In this case risk level may rise more slowly as the predator approaches, and
prey costs will have a greater effect on FID.
In summary, we have provided some of the first quantitative evidence linking
prey defensive thresholds with cues measured from natural predatory attacks. B. trigona
use relatively simple rules for determining when to initiate clicking based on two acoustic
parameters: pulse interval and intensity. These rules, which are encoded in the moth’s
nervous system (see discussion in Fullard et al. 2007), allow moths to respond rapidly
soon after being targeted by echolocating bats. They also allow moths to discriminate
between legitimate and false predatory threats with remarkable accuracy. This ability is
facilitated by a predator who nearly continuously advertises its stage of attack through
148
echolocation. This finding demonstrates that economic considerations determine the time
at which B. trigona exhibits its combined jamming-and-diving defense, despite the
possibility that other factors such as timing the defense for maximum effect (e.g. Fullard
et al. 1994), may be providing conflicting selective forces.
149
REFERENCES
1. Barber JR, Conner WE (2006) Tiger moth responses to a simulated bat attack: timing
and duty cycle. Journal of Experimental Biology 209: 2637-2650.
2. Barber JR, Chadwell BA, Garrett N, Schmidt-French B, Conner WE (2009) Naïve bats
discriminate arctiid moth warning sounds but generalize their aposematic
meaning. Journal of Experimental Biology 212: 2141-2148.
3. Barber JR, Conner WE (2007) Acoustic mimicry in a predator–prey interaction.
Proceedings of the National Academy of Sciences 104: 9331.
4. Bateman P, Fleming P (2011) Who are you looking at? Hadeda ibises use direction of
gaze, head orientation and approach speed in their risk assessment of a potential
predator. Journal of Zoology 285: 316-323.
5. Bazley E (1976) Sound absorption in air at frequencies up to 100 kHz. National
Physics Laboratory Acoustics Report no. AC74.
6. Blumstein DT (2003) Flight-initiation distance in birds is dependent on intruder
starting distance. The Journal of Wildlife Management 67: 852-857.
7. Blumstein DT (2010) Flush early and avoid the rush: a general rule of antipredator
behavior? Behavioral Ecology 21: 440-442.
8. Blumstein DT, Fernandex‐Juricic E, Zollner PA, Garity SC (2005) Inter‐specific
variation in avian responses to human disturbance. Journal of Applied Ecology 42:
943-953.
9. Boonman A, Jones G (2002) Intensity control during target approach in echolocating
bats; stereotypical sensori-motor behaviour in Daubenton's bats, Myotis
daubentonii. Journal of Experimental Biology 205: 2865-2874.
150
10. Broom M, Ruxton GD (2005) You can run—or you can hide: optimal strategies for
cryptic prey against pursuit predators. Behavioral Ecology 16: 534-540.
11. Caro T (2005) Antipredator defenses in birds and mammals: University of Chicago
Press.
12. Conner WE , Corcoran AJ (2012) Sound Strategies: The 65 million-year-old battle
between bats and insects. Annual Review of Entomology 57: 21-39.
13. Cooper WE Jr (1997) Factors affecting risk and cost of escape by the broad-headed
skink (Eumeces laticeps): predator speed, directness of approach, and female
presence. Herpetologica 53: 464-474.
14. Cooper WE Jr (1997) Threat factors affecting antipredatory behavior in the broad-
headed skink (Eumeces laticeps): repeated approach, change in predator path, and
predator's field of view. Copeia 1997: 613-619.
15. Cooper WE Jr (2005) When and how do predator starting distances affect flight
initiation distances? Canadian Journal of Zoology 83: 1045-1050.
16. Cooper WE Jr (2006) Dynamic risk assessment: prey rapidly adjust flight initiation
distance to changes in predator approach speed. Ethology 112: 858-864.
17. Cooper WE Jr (2009) Optimal escape theory predicts escape behaviors beyond flight
initiation distance: risk assessment and escape by striped plateau lizards
Sceloporus virgatus. Curr Zool 55: 123-131.
18. Cooper WE Jr, Frederick WG (2007) Optimal flight initiation distance. Journal of
Theoretical Biology 244: 59-67.
19. Cooper WE Jr, López P, Martín J, Pérez-Mellado V (2012) Latency to flee from an
immobile predator: effects of predation risk and cost of immobility for the prey.
151
Behavioral Ecology 23: 790-797.
20. Corcoran AJ, Barber JR, Conner WE (2009) Tiger moth jams bat sonar. Science 325:
325-327.
21. Corcoran AJ, Barber JR, Hristov NI, Conner WE (2011) How do tiger moths jam bat
sonar? The Journal of Experimental Biology 214: 2416-2425.
22. Corcoran AJ, Conner WE (2012) Sonar jamming in the field: effectiveness and
behavior of a unique prey defense. Journal of experimental biology. In press
23. Corcoran AJ, Conner WE, Barber JR (2010) Anti-bat tiger moth sounds: Form and
function. Current Zoology 56: 358-369.
24. Elemans CPH, Mead AF, Jakobsen L, Ratcliffe JM (2011) Superfast muscles set
maximum call rate in echolocating bats. Science 333: 1885-1888.
25. Endler J (1986) Defense against predators. In Feder EM, Lauder GV editors.
Predator-prey relationships: perspectives and approaches from the study of lower
vertebrates. Chicago: University of Chicago Press. pp. 169-202.
26. Fullard JH (1979) Behavioral analyses of auditory sensitivity in Cycnia tenera
Hübner (Lepidoptera: Arctiidae). Journal of Comparative Physiology A:
Neuroethology, Sensory, Neural, and Behavioral Physiology 129: 79-83.
27. Fullard JH (1984) Listening for bats: pulse repetition rate as a cue for a defensive
behavior in Cycnia tenera (Lepidoptera: Arctiidae). Journal of Comparative
Physiology A: Neuroethology, Sensory, Neural, and Behavioral Physiology 154:
249-252.
28. Fullard JH, Dawson JW, Jacobs DS (2003) Auditory encoding during the last moment
of a moth's life. Journal of Experimental Biology 206: 281-294.
152
29. Fullard JH, Ratcliffe JM, Ter Hofstede H (2007) Neural evolution in the bat-free
habitat of Tahiti: partial regression in an anti-predator auditory system. Biology
Letters 3: 26-28.
30. Fullard JH, Simmons JA, Saillant PA (1994) Jamming bat echolocation: the dogbane
tiger moth Cycnia tenera times its clicks to the terminal attack calls of the big
brown bat Eptesicus fuscus. Journal of Experimental Biology 194: 285-298.
31. Ghose K, Horiuchi TK, Krishnaprasad P, Moss CF (2006) Echolocating bats use a
nearly time-optimal strategy to intercept prey. PLoS Biology 4: e108.
32. Ghose K, Moss CF (2003) The sonar beam pattern of a flying bat as it tracks tethered
insects. The Journal of the Acoustical Society of America 114: 1120-1131.
33. Ghose K, Moss CF (2006) Steering by hearing: a bat’s acoustic gaze is linked to its
flight motor output by a delayed, adaptive linear law. The Journal of neuroscience
26: 1704-1710.
34. Goerlitz HR, Ter Hofstede HM, Zeale MRK, Jones G, Holderied MW (2010) An
aerial-hawking bat uses stealth echolocation to counter moth hearing. Current
Biology 20: 1568-1572.
35. Hartley DJ (1992a) Stabilization of perceived echo amplitudes in echolocating bats. I.
Echo detection and automatic gain control in the big brown bat, Eptesicus fuscus,
and the fishing bat, Noctilio leporinus. The Journal of the Acoustical Society of
America 91: 1120-1132.
36. Hartley DJ (1992b) Stabilization of perceived echo amplitudes in echolocating bats. II.
The acoustic behavior of the big brown bat, Eptesicus fuscus, when tracking
moving prey. The Journal of the Acoustical Society of America 91: 1133-1149.
153
37. Helfman GS (1989) Threat-sensitive predator avoidance in damselfish-trumpetfish
interactions. Behavioral Ecology and Sociobiology 24: 47-58.
38. Helfman GS, Winkelman DL (1997) Threat sensitivity in bicolor damselfish: effects
of sociality and body size. Ethology 103: 369-383.
39. Hiryu S, Hagino T, Riquimaroux H, Watanabe Y (2007) Echo-intensity compensation
in echolocating bats (Pipistrellus abramus) during flight measured by a telemetry
microphone. The Journal of the Acoustical Society of America 121: 1749-1757.
40. Holderied MW, Von Helversen O (2003) Echolocation range and wingbeat period
match in aerial-hawking bats. Proceedings of the Royal Society of London Series
B: Biological Sciences 270: 2293-2299.
41. Hoy RR (1998) Acute as a bug’s ear: an informal discussion of hearing in insects. In:
Hoy RR, Popper AN and Fay RR, editors. Comparative hearing: insects. New
York: Spring pp.1-17.
42. Hristov NI, Conner WE (2005) Sound strategy: acoustic aposematism in the bat–tiger
moth arms race. Naturwissenschaften 92: 164-169.
43. Jakobsen L, Surlykke A (2010) Vespertilionid bats control the width of their biosonar
sound beam dynamically during prey pursuit. Proceedings of the National
Academy of Sciences 107: 13930-13935.
44. Kick SA, Simmons JA (1984) Automatic gain control in the bat's sonar receiver and
the neuroethology of echolocation. The Journal of Neuroscience 4: 2725-2737.
45. Lima SL, Dill LM (1990) Behavioral decisions made under the risk of predation: a
review and prospectus. Canadian Journal of Zoology 68: 619-640.
46. Moss CF, Surlykke A (2001) Auditory scene analysis by echolocation in bats. The
154
Journal of the Acoustical Society of America 110: 2207-2226.
47. Ratcliffe JM, Fullard JH (2005) The adaptive function of tiger moth clicks against
echolocating bats: an experimental and synthetic approach. Journal of
Experimental Biology 208: 4689-4698.
48. Ratcliffe JM, Fullard JH, Arthur BJ, Hoy RR (2009) Tiger moths and the threat of
bats: decision-making based on the activity of a single sensory neuron. Biology
Letters 5: 368-371.
49. Ratcliffe JM, Nydam ML (2008) Multimodal warning signals for a multiple predator
world. Nature 455: 96-99.
50. Roeder KD (1967) Nerve cells and insect behavior. Cambridge MA: Harvard Univ.
Pres. 229 p.
51. Stankowich T, Blumstein DT (2005) Fear in animals: a meta-analysis and review of
risk assessment. Proceedings of the Royal Society B: Biological Sciences 272:
2627-2634.
52. Stankowich T, Coss RG (2006) Effects of predator behavior and proximity on risk
assessment by Columbian black-tailed deer. Behavioral Ecology 17: 246-254.
53. Svoboda T, Martinec D, Pajdla T (2005) A convenient multicamera self-calibration
for virtual environments. Presence: Teleoperators & Virtual Environments 14:
407-422.
54. Tabachnick BG, Fidell LS (2007) Using multivariate statistics. Boston: Pearson. 1008
p.
55. Yager DD (2012) Predator detection and evasion by flying insects. Current Opinion
in Neurobiology 22: 201-207
155
56. Ydenberg R, Dill L (1986) The economics of fleeing from predators. Advances in the
Study of Behavior 16: 229-249.
156
Figure 5.1. Hypothesized predator risk level as it relates to predation stage. Predation can
be categorized into a series of stages (A). That presented here is modified from Endler
(1986). Predator risk is hypothesized to relate to predator stage by a sigmoidal function
(B), with a rapid increase occurring after detection and as the predator increasingly
commits to pursuing the prey. The bat echolocation attack sequence provides a model for
studying risk relating to predator stage of attack, as the phases of bat echolocation
reliably indicate the predator’s stage. See text for explanation of specific predation stages
and echolocation phases.
157
Figure 5.2. Three-dimensional simulation of the sonar beam of a bat attacking a moth
(left panel), and a spectrogram of the bat echolocation sequence with two-dimensional
plots of the bat’s echolocation beam shape and direction relative to the target (right panel).
The bat searches for prey with directional beams that are not aimed at the prey. After
detection (beginning of approach phase) the bat localizes the prey and then locks its sonar
beam on the target. The bat then decreases the intensity of emissions to keep echoes
returning at a constant level (automatic gain control) through the tracking and buzz
phases. Simulation was based on three-dimensional coordinates and bat call intensities of
an actual attack. Beam shape and direction was not measured directly but was simulated
based on previous literature (Ghose and Moss, 2003; Jakobsen and Surlykke, 2010).
Sonar beam shapes are depicted as the estimated volume ensonified by at least 90 dB
SPL.
158
Figure 5.3. Three-dimensional schematic of field setup for recording bat attacks on
tethered and free-flying moths. Three infrared cameras recorded bat flight trajectories,
positions of tethered and free-flying moths, and positions and directional axes of the
ultrasound microphone. An ultraviolet (UV) light attracted free-flying moths and
foraging bats to the observation area. In experiment 1 a silent Noctuid moth was tethered
and suspended along with a miniature (3mm diameter) microphone from a 10 m
telescoping pole. The microphone’s close proximity to the tethered moth allowed for
estimating bat call intensities emitted in the moth’s direction (10 cm from the bat’s mouth)
and arriving at the moth for attacks on the tethered moth (real attacks) and attacks on
nearby free-flying moths (false threats). In experiment 2, the clicking moth Bertholdia
trigona was tethered below the microphone and bat passes that elicited a clicking
response were compared to passes that did not elicit clicking.
159
Figure 5.4. Acoustic and kinematic characterization of “real” and “false” threats. A real
threat is a bat attacking the target moth (A, B); a false threat is a bat attacking a nearby
moth (C). Real threats are shown (A) aligned by the end of the attack, and (B) aligned by
the echolocation call of maximum intensity. The top panels show the bat echolocation
intensities 10 cm from the bat (emitted in the moth’s direction) and at the moth’s position.
Middle and bottom panels show how bat pulse intervals and approach angles change over
the course of an attack, respectively. The rise in bat call intensity early in attacks in A and
B reflects the bat localizing the moth, followed by an immediate decrease in emission
intensity, which is the bat’s automatic gain control (see text and Figure 5.2). Bats engage
gain control (time=0 s in B) in the middle of approach phase and then soon turn towards
the prey (a decrease in approach angle). False threats are characterized by decreasing call
intensities at the moth’s position and approach angles not correlated with time in the
attack.
161
Figure 5.5. Predicted and actual clicking thresholds for different bat echolocation pulse-
intervals in Grote’s tiger moth (Bertholdia trigona). Echolocation call intensity and pulse
interval impinging upon a tethered focal moth are shown for five attacks on the focal
moth (real threat) and five attacks on a nearby, free-flying moth (false threat; see figure
5.2). The optimal threshold for discriminating real and false threats was determined using
quadratic discriminant analysis with 50% (p=0.5) and 75% (p = 0.75) likelihood of a call
being assigned as a real threat. B. trigona clicking thresholds (mean +/- s.e.) measured
from moths suspended in a sound chamber match predicted p=0.75 thresholds for pulse
intervals of 35-100 ms.
162
Figure 5.6. Discrimination of bat passes that did or did not elicit clicking by tethered
Bertholdia trigona in the field. Acoustic characteristics (bat pulse interval vs. bat call
intensity) and bat flight characteristics (distance from moth vs. flight trajectory relative to
bat-moth vector, or phi) were used to differentiate bat passes that elicited a clicking
response and those that did not (Top two rows of graphs). Dashed lines indicate
thresholds for discriminating clicking from non-clicking interactions using discriminant
function analysis. PPV, positive predictive value, or the percent of clicking interactions
correctly classified; NPV, negative predictive value, or the percent of non-clicking
interactions classified correctly. Some interactions were included where bats were outside
the calibrated volume of the cameras and > 4m from the moth. Exact bat-moth distances
and phi values were not available for these interactions. Bat call intensities increased and
pulse intervals decreased prior to moth clicking (bottom two rows of graphs).
164
Figure 5.7. Cost-benefit models of escape behavior with varying prey knowledge of
predator attack stage. Prey cost of fleeing C is dependent on predator distance and prey
characteristics (C-low vs. C-high). In the classic model (A), benefit of fleeing B is equal
to predator risk and increases as the predator gets closer (after Ydenberg and Dill, 1986).
The optimal escape distance D* occurs at the intersection of B and C. We propose that
this model holds for prey that lack information about predator attack stage. For prey with
information about predator attack stage (C), B is predicted to be a sigmoidal function
with an increase in risk/benefit of fleeing when the predator detects a target and commits
to an attack (see Figure 5.1). An intermediate level of information of predator stage has a
risk function that is a mix of predator distance and attack stage (B). Increased availability
of information on predator stage diminishes the effect of prey cost level (C-high vs. C-
low) on optimal escape distance D*.
165
CONCLUSIONS AND FUTURE DIRECTIONS
This dissertation and the two that preceded it (Hristov, 2004; Barber 2007) have
provided substantial evidence to settle a dispute over the defensive function of tiger moth
clicks that is nearly 50 years old. All three hypotheses regarding click function are
effective under certain conditions. Most tiger moths appear to click to warn bats of their
toxic chemistry (Hristov, 2004), and this sets the stage for Batesian and Mullerian
mimicry (Barber, 2007). Startle can be an effective defense against bats that have not
habituated to clicking moths. This appears to be especially true for moths with high
clicking rates (Chapter III). Finally, some minority of moth species with high clicking
rates can jam bats sufficiently to prevent capture (Chapter II). It is unclear whether moths
with low clicking rates gain advantage through a small degree of jamming, perhaps as a
more potent message of toxicity (Ratcliffe and Fullard, 2005).
We have seen (Chapters IV and V) that the benefits of studying bat-insect
interactions in the field, and the methodology developed for these projects, makes
possible studies of many aspects of bat-moth biology. I predict in the coming years we
will see a sharp increase in the number of field studies on bats and insects.
Now that we have a more detailed grasp on the diversity of defensive strategies
employed by Arctiine moths, a next step is to place these discoveries in a phylogenetic
context, and such studies are planned. Of course it will not be possible to put each species
through the rigors of experimentation that have been the subject of this dissertation. New
methods will need to be developed to determine a moth’s primary defensive strategy
using relatively simple assays. The rate of moth clicking in response to bat echolocation
166
attacks can be determined using playbacks in a sound chamber, and this approach has
yielded comparative acoustic recordings on dozens of species (Barber and Conner, 2006;
Corcoran et al. 2010). However, it is unknown if there is a specific threshold of clicking
rate for jamming to effectively deter bats. Therefore a study is planned where bats can be
trained to attack a prey and a miniature ultrasonic speaker where clicks can be broadcast
at different rates and with different timing with respect to the bat’s attack. If a clicking
threshold for jamming can be found, then a simple recording of a moth clicking would be
all that is required for determining if it is a “jammer” species. Rapid assays are also
required for determining moth palatability to bats. This could be accomplished using
chemical or bio-assays including controlled feedings (Hristov and Conner, 2005). After
these challenges have been overcome, it will be possible to understand the evolution of
these fascinating defensive strategies in nature.
Another line of study would be to use a comparative ecological approach. Are
acoustic Batesian mimics limited in their seasonal and nightly time of activity based on
that of their models? Do jammers take advantage of their extraordinary defensive ability
by being active at times of night other moths avoid? We know aposematic moths tend to
be feeding specialists as caterpillars and are restricted to host plants with specific
chemicals. Is this relaxed for Batesian mimics and jammers? Do they tend to be
generalist foragers and benefit from this in some way? The list of questions is nearly
endless.
Taking the broader view, the discovery that moths jam bat sonar demonstrates the
powerful selective force that drives survival in a predator-prey system. It shows that,
regardless of their sophistication, communication systems (including the
167
autocommunication of sonar) are subject to disruption and distortion. This is especially
true when the organism taking advantage of the communication breakdown is relatively
rare. The communicators are then under less selective pressure to overcome the
disruption. In the case of sonar-jamming moths, these animals constitute a small
percentage of the moths that are available as prey at a given time. It is unlikely that bats
would be under sufficient selective pressure to specifically evolve a counter-measure to
the jamming defense. It is more likely that bats would evolve strategies that give them
advantage over all or most eared moths, which frequently make up a large percentage of
the lepidopteran prey available (Goerlitz et al. 2010). Because of the diffuse co-
evolutionary process, where many prey and predator species compete simultaneously, we
can expect numerous attacking and defensive strategies to coexist. We should therefore
expect sonar jamming to be only one entry on a long list of discoveries in the bat-moth
arms race.
168
LITERATURE CITED
Barber, J. R. and Conner, W. E. (2006). Tiger moth responses to a simulated bat attack:
timing and duty cycle. Journal of Experimental Biology 209, 2637-2650.
Barber, J.R. (2007). Diversity and Deception: Acoustic Aposematism and Mimicry in
the Bat-Moth Arms Race. Ph.D. Dissertation. Wake Forest University, Winston
Salem, NC.
Corcoran, A. J., Conner, W. E. and Barber, J. R. (2010). Anti-bat tiger moth sounds:
Form and function. Current Zoology 56, 358-369.
Goerlitz, H. R., ter Hofstede, H. M., Zeale, M. R. K., Jones, G. and Holderied, M. W.
(2010). An aerial-hawking bat uses stealth echolocation to counter moth hearing.
Current Biology 20, 1568-1572.
Hristov, N. I. (2004). A Multi-level Analysis of the Bat-Tiger Moth Arms Race. Ph.D.
Dissertation. Wake Forest University, Winston Salem, NC.
Hristov, N. I. and Conner, W. E. (2005a). Effectiveness of tiger moth (Lepidoptera,
Arctiidae) chemical defenses against an insectivorous bat (Eptesicus fuscus).
Chemoecology 15, 105-113.
Ratcliffe, J. M. and Fullard, J. H. (2005). The adaptive function of tiger moth clicks
against echolocating bats: an experimental and synthetic approach. Journal of
Experimental Biology 208, 4689-4698.
169
Aaron J. Corcoran Department of Biology, Wake Forest University
Winston Salem, NC 27106 336-251-2638 | [email protected]
EDUCATION
Ph.D. Biology, Wake Forest University, 2013 (projected) - Dissertation: Sonar Jamming in the Bat-Moth Arms Race
M.A. Biology, Humboldt State University, 2007 - Thesis: Automated Acoustic Identification of Twelve Bat Species of the Eastern United States
B.S. Wildlife, with Honors Purdue University, 2003
RESEARCH EXPERIENCE
2008 - 2012 NSF Graduate Research Assistantship, Wake Forest University
2007 - 2008 Research Analyst and Field Research Coordinator, Humboldt State University
2005 - 2007 SERDP Graduate Research Assistantship, Humboldt State University
2004 - 2005 Field Research Assistant, U.C. Davis, Oregon St. Univ., Utah St. Univ.(Separate appointments)
TEACHING EXPERIENCE
2012 Teaching Assistant, Animal Behavior and Comparative Physiology, Wake Forest University
2011 Teaching Assistant, Lepidoptera Field Course, Southwestern Research Station
2010 - 2012 Guest Lecturer, Animal Behavior, Sensory Biology, and Entomology, Wake Forest University
2008 Lecturer, General Zoology Lab, Humboldt State University
2005 - 2007 Teaching Associate, General Zoology Lab, Humboldt State University
PUBLICATIONS
Corcoran, A.J., R. D. Wagner, and W.E. Conner 2012. Optimal predator risk assessment by the sonar-jamming moth, Bertholdia trigona. In preparation.
Corcoran, A. J., and W. E. Conner 2012. Sonar jamming in the field: Effectiveness and behavior of a unique prey defense. Journal of Experimental Biology. 215: 4278-4287
170
Conner, W. E., and A. J. Corcoran 2012. Sound strategies: the 65-million-year-old battle between bats and insects. Annual Review of Entomology. 57: 21-39
Corcoran, A. J., J. R. Barber, N. I. Hristov, and W. E. Conner 2011. How do tiger moths jam bat sonar? Journal of Experimental Biology. 214: 2416-2425
Corcoran, A. J., W. E. Conner, and J. R. Barber 2010. Anti-bat tiger moth sounds: Form and function. Current Zoology. 56: 358-369
Corcoran, A. J., Barber, J. R., and W. E. Conner 2009. Tiger moth jams bat sonar. Science. 325: 325-327
SCHOLARLY PRESENTATIONS
Corcoran, A.J. and W. E. Conner (2012) Sonar jamming in the field: Effectiveness and behavior of a unique prey defense. International Congress of Neuroethology, College Park, MD. Poster.
Corcoran, A.J. (2012) Sonar-jamming in the bat-moth arms race. Invited speaker, Department of Biology seminar series, Clemson University.
Corcoran, A.J. (2012) Sonar-jamming in the bat-moth arms race. Invited speaker, Department of Biology seminar series, Utah State University.
Corcoran, A.J. (2012) Sonar-jamming in the bat-moth arms race. Invited speaker, Center for Evolutionary and Comparative Biology of Hearing, University of Maryland.
Corcoran, A.J. , J.R. Barber, N.I. Hristov, and W.E. Conner (2010). How do tiger moths jam bat sonar? North American Symposium for Bat Research. Denver, CO.
Corcoran, A.J. , and J.M. Szewczak (2010). Niche Breadth, Foraging Plasticity and Conservation of Myotis septentrionalis, M. lucifugus, and M. leibii. Southeastern Bat Diversity Network Annual Meeting, Asheville, NC
Corcoran, A.J. , Barber, J.R., W.E. Conner (2009). Tiger moth jams bat sonar. North American Symposium for Bat Research, Portland, OR
Corcoran, A.J. , Barber, J.R., W.E. Conner (2009). Limitations of biosonar: a tiger moth sonar jamming defense. Animal Sonar Symposium, Kyoto, Japan
Corcoran, A.J. , Barber, J.R., Cullen, M.A. and W.E. Conner (2009). Sound strategies: acoustic aposematism, mimicry, and sonar jamming in the bat-moth arms race. Society for Integrative and Comparative Biology Annual Meeting, Boston, MA
Corcoran, A.J. and J.M. Szewczak (2007). Automated acoustic identification of nine bat species of the Eastern United States. International Bat Research Conference, Merida, Mexico
Corcoran, A.J. and J.M. Szewczak (2006). Automated acoustic identification of three bat species – Lasiurus borealis, Nycticeius humeralis, and Pipistrellus subflavus. North American Symposium on Bat Research, Wilmington, NC
171
GRANTS AND AWARDS
2012 Outstanding Graduate Student of the year, Wake Forest University
2012 Vecellio Award for Graduate Research, Wake Forest University
2011 Theodore Roosevelt Memorial Grant, American Museum Natural History
2010 Elton C. Cocke Scholarship, Wake Forest University
2010 Graduate School Alumni Student Travel Award, Wake Forest University
2010 National Science Foundation Grant w/ Dr. William Conner
2009 North American Symposium for Bat Research Outstanding Student Presentation
2009 Vecellio Award for Graduate Research, Wake Forest University
2008 Dean’s Fellowship, Wake Forest University
2008 Andrew’s Fellowship, Purdue University (declined)
2002 Agriculture Research Scholarship, Purdue University
UNDERGRADUATE MENTORING
2012 Kaitlyn Roman – Bats jamming bats? A playback experiment
2011 Zachary Walker – Defending food patches by jamming sonar
2010 Ryan Wagner – Acoustic cue recognition by sonar-jamming moths
2009 Wesley Johnson – Acoustic Müllerian mimicry in the field
2008 Megan Cullen – Sensory perception of prey by captive bats
OUTREACH AND MEDIA RELATIONS
2013
Featured in the nature documentary “Micro Monsters 3D” with David Attenborough
2012
Interviewed for feature article on field study of sonar jamming. Inside JEB
Public presentation on sonar-jamming moths. Science Café, hosted by Sciworks and Reynolda village
Youth presentation on bats and moths. King County Public Library
Research on sonar-jamming moths featured in textbook. Animal Behavior by Shawn E. Nordell and Thomas J. Valone
Provided materials and information for children’s article on sonar-jamming moths. Wild Magazine, Canadian Wildlife Federation
Public presentation on sonar-jamming moths. Southwestern Research Station, Portal, Arizona
2011
Scientific consultant for National Geographic television mini-series Untamed Americas
172
Public presentation on sonar-jamming moths Southwestern Research Station, Portal, Arizona
Presented on “Moth ears for bat defense and moth courtship”. Lepidoptera Field Course, Southwestern Research Station, Portal, Arizona
Research highlighted in article “Masters of Disguise: Animal Mimics Fool Their Foes”. Scientific American Magazine
Research on sonar-jamming moths featured in textbook. Animal Communication by Jack W. Bradbury and Sandra L. Vehrencamp
2010
Public presentation on sonar-jamming moths. Southwestern Research Station, Portal, Arizona
Wrote “Featured Scientist of the Year” article on sonar-jamming moths. Southwestern Research Station Bulletin
2009
Live broadcast, nationwide radio interview on sonar-jamming moths. NPR’s Science Friday. (Also featured for video pick-of-the-week)
Research featured worldwide including by L.A. Times, National Geographic, New York Times, NewsTrack India,NPR, Scientific American, Sydney Morning Herald, Wired News,and Voice of America
Interviewed on sonar-jamming research. Science Magazine podcast
Televised interview on sonar-jamming moths. Discovery Channel Canada.
PROFESSIONAL AFFILIATIONS
American Society of Mammalogists
Animal Behavior Society
North American Society for Bat Research
Phi Beta Kappa Honor Society
Society for Integrative and Comparative Biology
PROFESSIONAL SERVICE
Reviewer for PLOS ONE and ETHOLOGY