RCMP to curb use of Tasers

By Agence France-Presse


Protective Relay Training - Basic

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today
The Royal Canadian Mounted Police (RCMP) announced it has curbed the use of Taser stun guns after several suspects zapped by police died.

"On June 18, 2008, all members of the RCMP were instructed that the CEW (conducted energy weapons) must only be used where it is necessary to do so in circumstances of threats to officer or public safety," RCMP Commissioner William Elliott told a House committee on public safety and national security.

"This requirement has subsequently been written into our formal policy," he said.

The US-manufactured Taser is meant to incapacitate a person with a 50,000-volt jolt of electricity.

Canada's RCMP had been under pressure to halt the use of Tasers, which it previously held were a necessary and non-lethal alternative to firearms, after several people died soon after being shocked.

Others lamented their frequent use led to abuses. The RCMP's previous policy permitted the use of Tasers in dealing with people who were simply uncooperative or resisting arrest.

The death of Polish immigrant Robert Dziekanski, 40, in October 2008 after four RCMP officers confronted him and jolted him with a Taser stun gun less than a minute into the encounter, galvanized public opposition to their use.

Dziekanski had been wandering for hours lost at the Vancouver International Airport, unable to get information as he spoke only Polish.

Widely distributed video images of the encounter, shot by a bystander, showed Dziekanski falling to the ground and screaming in pain before dying minutes later.

Other cases involved an elderly man strapped to a hospital stretcher, a teenage girl in a jail cell and transit users trying to avoid paying fares.

"I think there certainly have been some instances where Tasers have been used in inappropriate circumstances," Elliott told reporters.

But he maintained there is no direct link between the energy weapons and at least 11 deaths of people jolted by police.

"I do not think that there is evidence that Tasers kill, but certainly we have had some incidents where shortly after a Taser was deployed, individuals died," he said.

"Being Tasered involves a considerable application of force. And the application of force certainly entails risk," he added.

In San Jose, California, a man died after he was jolted with a Taser by police in the backyard of a house just recently, in the state's sixth Taser death since police began using the stun guns in 2004.

Related News

Coal demand dropped in Europe over winter despite energy crisis

EU Winter Energy Mix 2022-2023 shows renewables, wind, solar, and hydro overtaking coal and gas, as demand fell amid high prices; Ember and IEA confirm lower emissions across Europe during the energy crisis.

 

Key Points

It describes Europe's winter power mix: reduced coal and gas, and record wind, solar, and hydro output.

✅ Coal generation fell 11% YoY; gas output declined even more.

✅ Renewables supplied 40%: wind, solar, and hydro outpaced fossil fuels.

✅ Ember and IEA confirm trends; mild winter tempered demand.

 

The EU burned less coal this winter during the energy crisis than in previous years, according to an analysis, quashing fears that consumption of the most polluting fossil fuel would soar as countries scrambled to find substitutes for lost supplies of Russian gas.

The study from energy think-tank Ember shows that between October 2022 and March 2023 coal generation fell 27 terawatt hours, or almost 11 per cent year on year, while gas generation fell 38 terawatt hours, as renewables crowded out gas and consumers cut electricity consumption in response to soaring prices.

Renewable energy supplies also rose, with combined wind and solar power and hydroelectric output outstripping fossil fuel generation for the first time, providing 40 per cent of all electricity supplies. The Financial Times checked Ember’s findings with the International Energy Agency, which said they broadly matched its own preliminary analysis of Europe’s electricity generation over the winter.

The study demonstrates that fears of a steep rebound in coal usage in Europe’s power mix were overstated, despite the continent’s worst energy crisis in 40 years following Russia’s full-scale invasion of Ukraine, even as stunted hydro and nuclear output in parts of Europe posed challenges.

While Russia slashed gas supplies to Europe and succeeded in boosting energy prices for consumers to record levels, the push by governments to rejuvenate old coal plants, including Germany's coal generation, to ensure the lights stayed on ultimately did not lead to increased consumption.

“With Europe successfully on the other side of this winter and major supply disruptions avoided, it is clear the threatened coal comeback did not materialise,” analysts at Ember said in the report.

“With fossil fuel generation down, EU power sector emissions during winter were the lowest they have ever been.”

Ember cautioned, however, that Europe had been assisted by a mild winter that helped cut electricity demand for heating and there was no guarantee of such weather next winter. Companies and households had also endured a lot of pain as a result of the higher prices that had led them to cut consumption, even though in some periods, such as the latest lockdown, power demand held firm in parts of Europe.

Total electricity consumption between October and March declined 94 terawatt hours, or 7 per cent, compared with the same period in winter 2021/22, continuing post-Covid transition dynamics across Europe.

“For a lot of people this winter was really hard with electricity prices that were extraordinarily high and we shouldn’t lose sight of that,” said Ember analyst Harriet Fox.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Site C dam could still be cancelled at '11th hour' if First Nations successful in court

Site C Dam Court Ruling could halt hydroelectric project near Fort St. John, as First Nations cite Treaty 8 rights in B.C. Supreme Court against BC Hydro, reservoir flooding, and Peace River Valley impacts.

 

Key Points

Potential B.C. Supreme Court stop to Site C, grounded in Treaty 8 rights claims by First Nations against BC Hydro.

✅ Trial expected in 2022 before planned 2023 reservoir flooding

✅ Treaty 8 rights and Peace River Valley impacts at issue

✅ Talks ongoing among B.C., BC Hydro, West Moberly, Prophet River

 

The Site C dam could still be stopped by an "eleventh hour" court ruling, according to the lawyer representing B.C. First Nations opposed to the massive hydroelectric project near Fort St. John.

The B.C. government, BC Hydro and West Moberly and Prophet River First Nations were in B.C. Supreme Court Feb. 28 to set a 120-day trial, expected to begin in March 2022.

That date means a ruling would come prior to the scheduled flooding of the dam's reservoir area in 2023 said Tim Thielmann, legal counsel for the West Moberly First Nation.

"The court has left itself the opportunity for an eleventh hour cancellation of the project," he said.

 

Construction continues

At the core of the case is First Nations arguments the multi-billion dollar BC Hydro dam will cause irreparable harm to its territory and way of life — even as drought strains hydro production elsewhere — rights protected under Treaty 8.

The West Moberly have previously warned it believes Site C constitutes a $1 billion treaty violation.

​In 2018, the First Nations lost a bid for an injunction order, meaning construction of the dam is continuing despite warnings that delays could cost $600 million to the project.

First Nations 'deeply frustrated' after B.C. Supreme Court dismisses Site C injunction

The judge in the case said the ruling was made because if the First Nations lost the challenge, the project would be needlessly put into disarray.

 

Province, Nations enter talks to avoid litigation

Also this week the B.C. government announced it has entered into talks with BC Hydro and the two First Nations in an attempt to avoid the court process altogether, amid broader energy debates such as bridging the Alberta-B.C. electricity gap for climate goals.

Thielmann said the details of the talk are confidential, but his clients are willing to pursue all avenues in order to stop the dam from moving forward.

"They are trying to save what little is left [of the Peace River Valley]", he said.

Tim Thielmann of Sage Legal is representing the West Moberly First Nation in its lawsuit aimed at stopping Site C. (Sage Legal)

In the meantime, the parties will continue to prepare for the 2022 court dates.

The latest figure on the cost of the dam is $10.7 billion, in a billions-over-budget project that the premier says will proceed. When complete, it would power the equivalent of 450,000 homes a year, though use of Site C's electricity remains a point of debate.

 

Related News

View more

'Unbelievably dangerous': NB Power sounds alarm on copper theft after vandalism, deaths

NB Power copper thefts highlight risks at high-voltage substations, with vandalism, fatalities, infrastructure damage, ratepayer costs, and law enforcement alerts tied to metal prices, stolen electricity, and safety concerns across New Brunswick and Nova Scotia.

 

Key Points

Substation metal thefts causing fatalities, outages, safety risks, and higher costs that impact NB ratepayers.

✅ Spike aligns with copper price near $3 per pound

✅ Fatal break-ins at high-voltage facilities in Bathurst

✅ Repairs, delays, and safety risks for crews, customers

 

New Brunswick's power utility is urging people to stay away from its substations, saying the valuable copper they contain is proving hard to resist for thieves.

NB Power has seen almost as many incidents of theft and vandalism to its property in April and May of this year, than in all of last year.

In the 2018-2019 fiscal year, the utility recorded 16 cases of theft and/or vandalism.

In April and May, there have already been 13 cases.

One of those was a fatal incident in Bathurst. On April 13, a 41-year-old man was found unresponsive and later died, after breaking into a substation. It was the second fatality linked to a break-in at an NB Power facility in 10 years.

The investigation is still ongoing, but NB Power believes the man was trying to steal copper.

The power utility has been ramping up its efforts -- finding alternate ways to secure its properties, and educate the public -- on the dangers of copper theft, as utilities work to adapt to climate change that can exacerbate severe weather.

“We really, really, really want to stress that if you’re hitting the wrong wire, cutting the wrong wire, breaking in to or cutting fences, a lot of very bad things can happen,” said NB Power spokesperson Marc Belliveau.

In the 2017-2018 fiscal year, there were 24 recorded cases of theft and/or vandalism.

It also comes at a financial cost for NB Power, and ratepayers -- on average, $330,000 a year. About two-thirds of that is copper. The rest is vehicle break-ins or stolen electricity.

“We’ve done analysis,” Belliveau said. “Often the number of break-ins correspond with the price spiking in copper. So, right now, copper’s about $3 a pound. If it was half of that, there might be half as many incidents.”

New Brunswick Public Safety Minister Carl Urquhart says he knows the utility and police are working to dissuade people from the dangers of the theft, and notes that debates around Site C dam stability issues reflect broader infrastructure safety concerns.

“We all know of incident after incident of major injuries and death caused by, simply by, copper,” he said.

Last November, a Dawson Settlement substation was targeted during a major, storm-related power outage in the province.

It meant NB Power had to divert crews to fix and secure the substation, delaying restoration times for some residents and underscoring efforts to improve local reliability across the grid.

Belliveau says that’s “most frustrating.”

“We’re really trying to take a more proactive approach. And certainly, we encourage people that if you know somebody who’s thinking of doing something like that, to really try and talk them out of it because it’s unbelievably dangerous to break in to a substation,” he said.

Nova Scotia Power, connected through the Maritime Link, was not able to provide details on thefts at their substations, but spokesman David Rodenhiser said "the value of the stolen copper is minor in comparison to the risk that’s created when thieves break into our high-voltage electrical substations."

It's not just risky for the people breaking in, and public opposition to projects like Site C underscores broader community safety concerns.

"It also puts the safety of the workers who maintain our substations at risk, because when thieves steal copper, the protective safety devices in the substations don’t work properly," Rodenhiser said.

Additionally, in Nova Scotia, projects like the Maritime Link have advanced regional transmission, and Nova Scotia Power’s copper components have identifying markers, which make that copper difficult to fence. Anyone who buys or sells stolen propery is at risk of criminal charges.

 

Related News

View more

Don't be taken in by scammers threatening to shut off electricity: Manitoba Hydro

Manitoba Hydro Phone Scam targets small businesses with disconnection threats, prepaid card payments, caller ID spoofing, phishing texts, and door-to-door fraud; hang up, verify your account directly, and never share banking information.

 

Key Points

A scam where callers threaten disconnection and demand prepaid cards; verify account status directly with Manitoba Hydro.

✅ Hang up and call Manitoba Hydro at 1-888-624-9376 to verify.

✅ Never pay by prepaid cards, gift cards, or crypto.

✅ Hydro will not cut power on one-hour notice.

 

Manitoba Hydro is warning customers, particularly small business owners, to be wary of high-pressure scammers, as Ontario utilities warn of scams in other provinces, threatening to shut off their electricity.

The callers demand the customer to make immediate payment by a prepaid card. Often, the calls are made in the middle of the day at a busy time, frightening the customer with aggressive threats about disconnection, as hydro disconnections have made headlines elsewhere, says hydro spokesman Bruce Owen.

"They tell them 'we have a truck on the way to cut off your power. If you don't pay in the next hour you're out of luck,'" he said.

"And because these folks have inventory in freezers and they have customers … they're willing to fork over several hundred or even several thousand dollars on a prepaid card to somebody they don't know to keep the lights on."

Maybe the business owners can't recall, with everything happening, including discussions about Hydro One peak rates in Ontario, if they've made their payments on time. They start second-guessing and believing the person on the other line, Owen says.

And they worry about losing thousands of dollars in business if they lose power. So they're more than willing to run out to a store, buy a prepaid debit card and provide the number to the caller.

"Their goal is to manipulate you into sending money before you figure out it's a scam," said Chris McColm, hydro's security and investigations supervisor. "These people are crooks and you should hang up on them."

For any customers that are in arrears, hydro will work with them to resolve the issue, Owen said.

"We do not have to take that extreme measure of cutting off or disconnecting anybody. That's not the business we're in — we don't strong arm people that way," he said.

"Anybody who's threatening to cut off your power with an hour or half-an-hour notice, well it's it's no better than someone waiting around the corner, waiting the club you over the head in the dark of night. That's what they are."

 

Fraud reports soar

The power utility has recorded a nearly-300 per cent jump in the number of fraud-related complaints this year over 2017. There have been 862 phone, text and e-mail scams and that could still go much higher.

The current statistics from 2018 have only calculated up to Oct. 31. In 2017, there were 221.

That jump in numbers doesn't necessarily mean there are more scammers out there.

It could simply mean people are finally getting wise to fraudsters and reporting it more, Owen says.

"At the same token, we don't hear of everybody who's been taking advantage of because once they've found out that they've been hoodwinked they don't want to tell anybody because they're so embarrassed," he said.

"These scammers can be very convincing and anyone can be victimized," McColm said.

If you are able to think clearly when some high-pressure caller gets you on the line, Owen suggests asking a few simple questions to challenge their legitimacy:

  • What street am I on?
  • What does my business look like? 
  • What's the weather outside right now?

Phone scammers can falsify their caller ID information to make it appear they're calling from a local number, but what you'll find is most of them aren't in Winnipeg or Manitoba and likely not even this country or continent, Owen says.

The key to being safe is simply to never give out banking information, Owen says. It's a message that has been stressed for years and 80-90 per cent of people understand it, but it's that other 10-20 per cent that are still being victimized.And it's not just phone calls. Many other fraud-related complaints to Manitoba Hydro this year concerned unsolicited text messages to customers saying they had been overbilled, or faced retroactive charges elsewhere, and were eligible for a refund.

This scam is also aimed at getting a customer's personal banking information, under the guise of having money put back into their account.

Also, many people, especially seniors living alone, continue to be targeted by aggressive door-to-door fraudsters, and cases like the electricity theft ring in Montreal underscore the risks, McColm says. However, he adds, hydro employees always display photo ID and will never demand to come into a home. 

If you're unsure whether a phone call, text or email is real or a scam, contact Manitoba Hydro at 1-888-624-9376.

 

Related News

View more

USDA Grants $4.37 Billion for Rural Energy Upgrades

USDA Rural Energy Infrastructure Funding boosts renewable energy, BESS, and transmission upgrades, delivering grid modernization, resilience, and clean power to rural cooperatives through loans and grants aligned with climate goals, decarbonization, and energy independence.

 

Key Points

USDA Rural Energy Infrastructure Funding is a $4.37B program advancing renewables, BESS, and grid upgrades for rural power.

✅ Loans and grants for cooperatives modernizing rural grids.

✅ Prioritizes BESS to integrate wind and solar reliably.

✅ Upgrades transmission to cut losses and boost grid stability.

 

The U.S. Department of Agriculture (USDA) has announced a major investment of $4.37 billion aimed at upgrading rural electric cooperatives across the nation. This funding will focus on advancing renewable energy projects, enhancing battery energy storage systems (BESS), and upgrading transmission infrastructure to support a grid overhaul for renewables nationwide.

The USDA’s Rural Development initiative will provide loans and grants to cooperatives, supporting efforts to transition to cleaner energy sources that help rural America thrive, improve energy resilience, and modernize electrical grids in rural areas. These upgrades are expected to bolster the reliability and efficiency of energy systems, making rural communities more resilient to extreme weather events and fostering the expansion of renewable energy.

The funding will primarily support energy storage technologies, such as BESS, which allow excess energy from renewable sources like wind energy, solar, and hydropower technology to be stored and used during periods of high demand or when renewable generation is low. These systems are critical for integrating more renewable energy into the grid, ensuring a stable and sustainable power supply.

In addition to energy storage, the USDA’s investment will go toward enhancing the transmission networks that carry electricity across rural regions, aligning with a recent rule to boost renewable transmission across the U.S. By upgrading these systems, the USDA aims to reduce energy losses, improve grid stability, and ensure that rural communities have reliable access to power, particularly in remote and underserved areas.

This investment aligns with the Biden administration’s broader climate and clean energy goals, focusing on reducing greenhouse gas emissions and fostering sustainable energy practices, including next-generation building upgrades that lower demand. The USDA's support will also promote energy independence in rural areas, enabling local cooperatives to meet the energy demands of their communities while decreasing reliance on fossil fuels.

The funding is expected to have a far-reaching impact, not only reducing carbon footprints but also creating jobs in the renewable energy and construction sectors. By modernizing energy infrastructure, rural electric cooperatives can expand access to clean, affordable energy while contributing to the nationwide shift toward a more sustainable energy future.

The USDA’s commitment to supporting rural electric cooperatives marks a significant step in the transition to a more resilient and sustainable energy grid, mirroring grid modernization projects in Canada seen in recent years. By investing in renewables and modernizing transmission and storage systems, the government aims to improve energy access and reliability in rural communities, ultimately driving the growth of a cleaner, more energy-efficient economy.

As part of the initiative, the USDA has also highlighted its commitment to helping rural cooperatives navigate the challenges of implementing new technologies and infrastructure. The agency has pledged to provide technical assistance, ensuring that cooperatives have the resources and expertise needed to successfully complete these projects.

In conclusion, the USDA’s $4.37 billion investment represents a significant effort to improve the energy landscape of rural America. By supporting the development of renewable energy, energy storage, and transmission upgrades, the USDA is not only fostering a cleaner energy future but also enhancing the resilience of rural communities. This initiative will contribute to the nationwide transition toward a sustainable, low-carbon economy, ensuring that rural areas are not left behind in the global push for renewable energy.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.