Food banks denied break on power bills

By CBC.ca


High Voltage Maintenance Training Online

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$599
Coupon Price:
$499
Reserve Your Seat Today
Food banks in Saint John won't be getting a break on power rates this winter from Saint John Energy.

Saint John Common Council had requested a subsidy or discount on power rates for food banks in the city, but the utility says it doesn't have the money.

That's disappointing news for food banks that rely on donations to survive.

Carolyn Danells, chairwoman of the Saint John Community Food Basket's board of directors, said they were hoping for extra help.

"We would like very much to see our electrical bill cut down some for us in some way because the less we have to pay in bills, the more we have to buy the essential foods that people need that are relying on us," she said.

The power bill last month at the Saint John Community Food Basket was over $700 — a lot of money for a non-profit organization, Danells said.

Eric Marr, president of Saint John Energy, said the utility can't afford a discount across the board for food banks without driving up power rates for other customers.

"It would be an impact on the rest of our customers in order to provide free power or subsidized power to those customers," he said.

Marr said charitable organizations are already given the lowest rate possible. They are classified as residential customers, which means they are given 25 per cent-benefit.

"We also offer them various energy savings or energy conservation-type advice," he said.

Non-profit groups should confirm their charitable status with Saint John Energy to make sure they're already getting the best rate, Marr said.

Related News

Cape Town to Build Own Power Plants, Buy Additional Electricity

Cape Town Renewable Energy Plan targets 450+ MW via solar, wind, and battery storage, cutting Eskom reliance, lowering greenhouse gas emissions, stabilizing electricity prices, and boosting grid resilience through municipal procurement, PPAs, and city-owned plants.

 

Key Points

A municipal plan to procure over 450 MW, cut Eskom reliance, stabilize prices, and reduce Cape Town emissions.

✅ Up to 150 MW from private plants within the city

✅ 300 MW to be purchased from outside Cape Town later

✅ City financing 100-200 MW of its own generation

 

Cape Town is seeking to secure more than 450 megawatts of power from renewable sources to cut reliance on state power utility Eskom Holdings SOC Ltd., where wind procurement cuts were considered during lockdown, and reduce greenhouse gas emissions.

South Africa’s second-biggest city is looking at a range of options, including geothermal exploration in comparable markets, and expects the bulk of the electricity to be generated from solar plants, Kadri Nassiep, the city’s executive director of energy and climate change, said in an interview.

On July 14 the city of 4.6 million people released a request for information to seek funding to build its own plants. This month or next it will seek proposals for the provision of as much as 150 megawatts from privately owned plants, largely solar additions, to be built and operated within the city, he said. As much as 300 megawatts may also be purchased at a later stage from plants outside of Cape Town, according to Nassiep.

The city could secure finance to build 100 to 200 megawatts of its own generation capacity, Nassiep said. “We realized that it is important for the city to be more in control around the pricing of the power,” he added.

Power Outages

Cape Town’s foray into the securing of power from sources other than Eskom comes after more than a decade of intermittent electricity outages, while elsewhere in Africa coal projects face scrutiny from lenders, because the utility can’t meet national demand. The government last year said municipalities could find alternative suppliers.

Earlier this month Ethekwini, the municipal area that includes the city of Durban, issued a request for information for the provision of 400 megawatts of power, similar to BC Hydro’s call for power driven by EV uptake.

The City of Johannesburg will in September seek information and proposals for the construction of a 150-megawatt solar plant, reflecting moves like Ontario’s new wind and solar procurements to tackle supply gaps, 50 megawatts of rooftop solar panels and the refurbishment of an idle gas-fired plant that could generate 20 megawatts, it said in June. It will also seek information for the installation of 100 megawatts of battery storage.

Cape Town, which uses a peak of 1,800 megawatts of electricity in winter, hopes to start generating some of its own power next year, aligning with SaskPower’s 2030 renewables plan seen in Canada, according to a statement that accompanied its request for financing proposals.
 

 

Related News

View more

Seattle Apartment Fire Caused by Overheated Power Strip

Seattle Capitol Hill Apartment Fire highlights an electrical fire from an overheated power strip, a two-alarm response by 70 firefighters, safe evacuation, displaced resident aid, and prevention tips like smoke detectors and load limits.

 

Key Points

Two-alarm early-morning blaze in Seattle traced to an overheated power strip, displacing one resident and injuring none.

✅ Origin: overheated power strip ignited nearby combustibles

✅ Response: 70 firefighters, two-alarm, rapid containment

✅ Safety: avoid overloads; inspect cords; use smoke detectors

 

An early-morning fire in Seattle’s Capitol Hill neighborhood severely damaged a three-story apartment building, displacing one resident. The blaze, which broke out around 4:34 a.m. on a Friday, drew more than 70 firefighters to the scene, as other critical sectors have implemented on-site staffing during outbreaks to maintain operations, and was later traced to an overheated power strip.

The Fire Incident

The Seattle Fire Department responded to the fire, which had started on the second floor of the building in the 1800 block of 12th Avenue. Upon arrival, crews were met with heavy smoke and flames coming from one unit. The fire quickly spread to a unit on the third floor, prompting the Seattle Fire Department to escalate their response to a two-alarm fire due to its size and the potential threat to nearby structures.

Firefighters initially attempted to contain the blaze from the exterior before they moved inside the building to fully extinguish the fire. Thankfully, the fire was contained to the two affected units, preventing the destruction of the remaining seven apartments in the building.

All residents safely evacuated the building on their own. Despite the substantial damage to the two apartments, no injuries were reported. One resident was displaced by the fire and was assisted by the Red Cross in finding temporary accommodation.

Cause of the Fire

Investigators later determined that the fire was accidental, most likely caused by an overheated electrical power strip. The power strip had reportedly ignited nearby combustible materials, sparking the flames that quickly spread throughout the unit. Although the exact details are still under investigation, the fire serves as a stark reminder of the potential risks associated with overloaded or damaged electrical equipment and how electrical safety knowledge gaps can contribute to incidents.

The Risks of Power Strips

Power strips, while essential for providing multiple outlets, can pose a serious fire hazard if used improperly, and specialized arc flash training in Vancouver underscores the importance of understanding electrical hazards across settings.

This fire in Seattle highlights the importance of maintaining electrical devices and following proper usage guidelines. According to experts, it is crucial to regularly inspect power strips for any visible damage, such as frayed cords or scorch marks, and to replace them if necessary. It's also advisable to avoid using power strips with high-power appliances like space heaters, microwaves, or refrigerators.

Impact and Community Response

The fire has raised awareness about the dangers of electrical hazards in residential buildings, especially in older apartment complexes where wiring systems may not be up to modern standards. Local authorities and fire safety experts are urging residents to review safety guidelines and ensure that their living spaces are free from potential fire hazards and to avoid dangerous stunts at dams and towers that can lead to serious injuries.

Seattle's fire department, which responded to this incident, continues to emphasize fire prevention and safety education. This event also highlights the importance of having working smoke detectors and clear escape routes in apartment buildings, and ongoing fire alarm training can improve system reliability. The Seattle Fire Department recommends that all tenants know the locations of fire exits and practice safe evacuation procedures, especially in high-rise or multi-unit buildings.

Additionally, the Red Cross has stepped in to assist the displaced resident. The organization provides temporary shelter, food, and financial aid for those affected by disasters like fires. The fire underscores the importance of having emergency preparedness plans in place and the need for immediate relief for those who lose their homes in such incidents.

The Seattle apartment fire, which displaced one resident and caused significant damage to two units, serves as a reminder of the potential dangers associated with improperly maintained or overloaded electrical devices, especially power strips, and how industry recognition, such as a utility safety award, reinforces best practices. While the cause of this fire was linked to an overheated power strip, it could have easily been prevented with regular inspections and safer practices.

As fire departments continue to respond to similar incidents, it is critical for residents to stay informed about fire safety, particularly regarding electrical equipment and outdoor hazards like safety near downed power lines in storm conditions. Awareness, proper maintenance, and following safety protocols can significantly reduce the risk of electrical fires and help protect residents from harm.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

U.S. Launches $250 Million Program To Strengthen Energy Security For Rural Communities

DOE RMUC Cybersecurity Program supports rural, municipal, and small investor-owned utilities with grants, technical assistance, grid resilience, incident response, workforce training, and threat intelligence sharing to harden energy systems and protect critical infrastructure.

 

Key Points

A $250M DOE program providing grants to boost rural and municipal utilities' cybersecurity and incident response.

✅ Grants and technical assistance for grid security

✅ Enhances incident response and threat intel sharing

✅ Builds cybersecurity workforce in rural utilities

 

The U.S. Department of Energy (DOE) today issued a Request for Information (RFI) seeking public input on a new $250 million program to strengthen the cybersecurity posture of rural, municipal, and small investor-owned electric utilities.

Funded by President Biden’s Bipartisan Infrastructure Law and broader clean energy funding initiatives, the Rural and Municipal Utility Advanced Cybersecurity Grant and Technical Assistance (RMUC) Program will help eligible utilities harden energy systems, processes, and assets; improve incident response capabilities; and increase cybersecurity skills in the utility workforce. Providing secure, reliable power to all Americans, with a focus on equity in electricity regulation across communities, will be a key focus on the pathway to achieving President Biden’s goal of a net-zero carbon economy by 2050. 

“Rural and municipal utilities provide power for a large portion of low- and moderate-income families across the nation and play a critical role in ensuring the economic security of our nation’s energy supply,” said U.S. Secretary of Energy Jennifer M. Granholm. “This new program reflects the Biden Administration's commitment to improving energy reliability and connecting our nation’s rural communities to resilient energy infrastructure and the transformative benefits that come with it.” 

Nearly one in six Americans live in a remote or rural community. Utilities in these communities face considerable obstacles, including difficulty recruiting top cybersecurity talent, inadequate infrastructure, as the aging U.S. power grid struggles to support new technologies, and lack of financial resources needed to modernize and harden their systems. 

The RMUC Program will provide financial and technical assistance to help rural, municipal, and small investor-owned electric utilities improve operational capabilities, increase access to cybersecurity services, deploy advanced cyber security technologies, and increase participation of eligible entities in cybersecurity threat information sharing programs and coordination with federal partners initiatives. Priority will be given to eligible utilities that have limited cybersecurity resources, are critical to the reliability of the bulk power system, or those that support our national defense infrastructure. 

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER), which advances U.S. energy security objectives, will manage the RMUC Program, providing $250 million dollars in BIL funding over five years. To help inform Program implementation, DOE is seeking input from the cybersecurity community, including eligible utilities and representatives of third parties and organizations that support or interact with these utilities. The RFI seeks input on ways to improve cybersecurity incident preparedness, response, and threat information sharing; cybersecurity workforce challenges; risks associated with technologies deployed on the electric grid; national-scale initiatives to accelerate cybersecurity improvements in these utilities; opportunities to strengthen partnerships and energy security support efforts; the selection criteria and application process for funding awards; and more. 

 

Related News

View more

US looks to decommission Alaskan military reactor

SM-1A Nuclear Plant Decommissioning details the US Army Corps of Engineers' removal of the Fort Greely reactor, Cold War facility dismantling, environmental monitoring, remote-site power history, and timeline to 2026 under a deactivated nuclear program.

 

Key Points

Army Corps plan to dismantle Fort Greely's SM-1A reactor and complete decommissioning of remaining systems by 2026.

✅ Built for remote Arctic radar support during the Cold War

✅ High costs beat diesel; program later deemed impractical

✅ Reactor parts removed; residuals monitored; removal by 2026

 

The US Army Corps of Engineers has begun decommissioning Alaska’s only nuclear power plant, SM-1A, which is located at Fort Greely, even as new US reactors continue to take shape nationwide. The $17m plant closed in 1972 after ten years of sporadic operation. It was out of commission from 1967 to 1969 for extensive repairs. Much of has already been dismantled and sent for disposal, and the rest, which is encased in concrete, is now to be removed.

The plant was built as part of an experimental programme to determine whether nuclear facilities, akin to next-generation nuclear concepts, could be built and operated at remote sites more cheaply than diesel-fuelled plants.

"The main approach was to reduce significant fuel-transportation costs by having a nuclear reactor that could operate for long terms, a concept echoed in the NuScale SMR safety evaluation process, with just one nuclear core," Brian Hearty said. Hearty manages the Army Corps of Engineers’ Deactivated Nuclear Power Plant Program.

#google#

He said the Army built SM-1A in 1962 hoping to provide power reliably at remote Arctic radar sites, where in similarly isolated regions today new US coal plants may still be considered, intended to detect incoming missiles from the Soviet Union at the height of the Cold War. He added that the programme worked but not as well as Pentagon officials had hoped. While SM-1A could be built and operated in a cold and remote location, its upfront costs were much higher than anticipated, and it costs more to maintain than a diesel power plant. Moreover, the programme became irrelevant because of advances in Soviet rocket science and the development of intercontinental ballistic missiles.

Hearty said the reactor was partially dismantled soon after it was shut down. “All of the fuel in the reactor core was removed and shipped back to the Atomic Energy Commission (AEC) for them to either reprocess or dispose of,” he noted. “The highly activated control and absorber rods were also removed and shipped back to the AEC.”

The SM-1A plant produced 1.8MWe and 20MWt, including steam, which was used to heat the post. Because that part of the system was still needed, Army officials removed most of the nuclear-power system and linked the heat and steam components to a diesel-fired boiler. However, several parts of the nuclear system remained, including the reactor pressure vessel and reactor coolant pumps. “Those were either kept in place, or they were cut off and laid down in the tall vapour-containment building there,” Hearty said. “And then they were grouted and concreted in place.” The Corps of Engineers wants to remove all that remains of the plant, but it is as yet unclear whether that will be feasible.

Meanwhile, monitoring for radioactivity around the facility shows that it remains at acceptable levels. “It would be safe to say there’s no threat to human health in the environment,” said Brenda Barber, project manager for the decommissioning. Work is still in its early stages and is due to be completed in 2026 at the earliest. Barber said the Corps awarded the $4.6m contract in December to a Virginia-based firm to develop a long-range plan for the project, similar in scope to large reactor refurbishment efforts elsewhere. Among other things, this will help officials determine how much of the SM-1A will remain after it’s decommissioned. “There will still be buildings there,” she said. “There will still be components of some of the old structure there that may likely remain.”

 

Related News

View more

Power firms win UK subsidies for new Channel cables project

UK Electricity Interconnectors secure capacity market subsidies, supporting winter reliability with seabed cables to France and Belgium via the Channel Tunnel, lowering consumer costs, squeezing coal, and challenging new gas plants through cross-border energy trading.

 

Key Points

High-voltage cables linking Britain to Europe, securing backup capacity, cutting costs and boosting winter reliability.

✅ Won capacity market contracts at record-low prices

✅ Cables to France and Belgium via Channel Tunnel, seabed routes

✅ Squeezes coal, challenges new gas; renewables may join market

 

New electricity cables across the Channel to France and Belgium will be a key part of keeping Britain’s lights on during winter amid record electricity prices across Europe in the early 2020s, after their owners won backup power subsidies in a government auction this week.

For the first time, interconnector operators successfully bid for a slice of hundreds of millions’ worth of contracts in the capacity market. That will help cut costs for consumers, given how electricity is priced in Europe today, and squeeze out old coal power plants.

Three new interconnectors are currently being built to Europe, almost doubling existing capacity, with one along the Channel Tunnel and two on the seabed: one between Kent and Zeebrugge and one from Hampshire to Normandy. 

The interconnectors were success stories in this week’s capacity auction, which saw power firms bid to provide backup electricity in the winter of 2021/22. Prices for the four-year contracts hit a record low of £8.40 per kilowatt per year, which analysts described as a shock and well below expectations.

One industry source said the figure was “miles away” from what is needed to encourage companies to build big new gas power stations, which some argue are necessary to fill the gap when the UK’s ageing nuclear reactors close as Europe loses nuclear power across the region over the next decade.

While bad news for those firms, the low price is good for consumers. The subsidies will add about £525m to energy bills, or £5.68 for the average household, compared with £11 for the year before, according to analysts Cornwall Insight.

Existing gas power stations scooped up most of the contracts, but new gas ones lost out, as did several coal plants. Battery storage plants, a standout success in the last auction, fared comparatively poorly after changes to the rules.

Experts at Bernstein bank said the the misses by coal meant that around half the UK’s remaining coal power capacity could close from October 2019, when existing capacity market contracts run out. Chaitanya Kumar, policy adviser at thinktank Green Alliance, said: “Coal’s exit from the UK’s energy system just moved a step closer as coal contracts fell by half compared with last year.”

Tom Edwards, an analyst at Cornwall Insight, said that more interconnectors were likely to bid into future rounds of the capacity market, such as the cable being laid between Norway and the UK. Relying on foreign power supplies was fine, he said, provided Brexit did not make energy trading more difficult and the interconnectors delivered at times of need, where events like Irish grid price spikes illustrate the stress points.

However, one industry source, who wants to see new gas plants built in the UK, said the results showed that the system was not working, amid UK peak power prices that have climbed in recent trading. “That self-sufficiency doesn’t seem to be a priority at a time when we’re breaking away from Europe is a bit weird,” they said.

But the prospects for new gas plants in future rounds of the capacity market look bleak. They will very likely face a new source of competition next year, if energy regulator Ofgem approves a proposal to allow renewables to compete too.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.