Electromagnetic weapons can wipe out grid: Congressman

By Reuters


Substation Relay Protection Training

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today
There's been plenty of evidence recently that the Smart Grid could become a serious security risk for IT and households. Now comes something potentially just as troubling: the warning that the grid can be taken down by an electromagnetic weapon.

Rep. Roscoe Bartlett (Rep.-Md.) issued that warning recently. He's not your typical "the-sky-is-falling" Congressman — he's a former research scientist and engineer and has previously has worked on projects for NASA and the military. Bartlett issued his warning at a House Science subcommittee hearing about how to roll out the Smart Grid.

At the hearing, he warned that a weapon that fired an electromagnetic pulse (EMP) could wipe out significant sections of the Smart Grid. According to a Science News account of the hearings: “EMP is a powerful and potentially devastating form of electromagnetic ‘fallout.’ It's usually associated with nuclear weapons, although it can be triggered by any major explosive bursts. Unlike radioactive fallout, this rain won't directly harm living things. It will just catastrophically fry all electronics and modern electrical systems by inducing staggeringly large and rapid current or voltage surges.”

The magazine goes on to report that Bartlett warns small nations could use the weapon against the Smart Grid, when it is developed: “All one needs to wreak some serious EMP damage, he charges, is a sea-worthy steamer, $100,000 to buy a scud-missile launcher, and a crude nuclear weapon. Then fling the device high into the air and detonate its warhead.

“Such a system might not paralyze the entire United States, he concedes. ‘But you could shut down all of New England. And if you missed by 100 miles, it's as good as a bulls eye.’”

At the hearing, various people testified about how the grid might be hardened against attack, by protecting key components of it. Bartlett, though, isn't convinced that we're doing enough and wants EMP protection built directly into it.

Related News

N.B. Power hits pause on large new electricity customers during crypto review

N.B. Power Crypto Mining Moratorium underscores electricity demand risks from bitcoin mining, straining the energy grid and industrial load capacity in New Brunswick, as a cabinet order prioritizes grid reliability, utility planning, and allocation.

 

Key Points

Official pause on new large-scale crypto mining to protect N.B. Power grid capacity, stability, and reliable supply.

✅ Cabinet order halts new large-scale crypto load requests

✅ Review targets grid reliability, planning, and capacity

✅ Non-crypto industrial customers exempt from prolonged pause

 

N.B. Power says a freeze on servicing new, large-scale industrial customers in the province remains in place over concerns that the cryptocurrency sector's heavy electricity use could be more than the utility can handle.

The Higgs government quietly endorsed the moratorium in a cabinet order in March 2022 and ordered a review of how the sector might affect the reliable electricity supply and broader electricity future planning in the province.

The cabinet order, filed with the Energy and Utilities Board, said N.B. Power had "policy, technical and operational concerns about [its] capacity to service the anticipated additional load demand" from energy-intensive customers such as crypto mines.

It said the utility had received "several new large-scale, short-notice service requests" to supply electricity to crypto mining companies that could put "significant pressure" on the existing electricity supply.

The order, signed by Premier Blaine Higgs, said non-crypto companies shouldn't be subject to the pause for any longer than required for the review, amid shifts in regional plans like the Atlantic Loop that are altering timelines. Ws.

The freeze was ordered months after Taal Distributed Information Technologies Inc. announced plans to establish a 50-megawatt bitcoin mining operation and transaction processing facility in Grand Falls.

A town official said this week that the deal never went ahead.

24 hours a day
The Taal facility would have joined a 70-megawatt bitcoin mine in Grand Falls operated by Hive Blockchain Technologies.

Hive's Bitcoin mine comprises four large warehouses containing thousands of computers running 24 hours a day to earn cryptocurrency units.

The combined annual electricity consumption of the two mines would exceed what could be produced by the small modular nuclear reactor being designed by ARC Clean Energy Canada of Saint John, even as Nova Scotia advances efforts to harness the Bay of Fundy's powerful tides for clean power.

Put another way, the two mines would gobble up more than three months' electricity from N.B. Power's coal-fired Belledune generating station under current operations.

 

Related News

View more

New Electricity Auctions Will Drive Down Costs for Ontario's Consumers

IESO Capacity Auctions will competitively procure resources for Ontario electricity needs, boosting reliability and resource adequacy through market-based bidding, enabling demand response, energy storage, and flexible supply to meet changing load and regional grid conditions.

 

Key Points

A competitive, technology-neutral auction buys capacity at lowest cost to keep Ontario's grid reliable and flexible.

✅ Market-based procurement reduces system costs.

✅ Enables demand response, storage, and hybrid resources.

✅ Increases flexibility and regional reliability in Ontario.

 

The Independent Electricity System Operator (IESO) is introducing changes to Ontario's electricity system that will help save Ontarians about $3.4 billion over a 10-year period. The changes include holding annual capacity auctions to acquire electricity resources at lowest cost that can be called upon when and where they are needed to meet Ontario electricity needs. 

Today's announcement marks the release of a high level design for future auctions, with changes for electricity consumers expected as the first is set to be held in late 2022.

"These auctions will specify how much electricity we need, and introduce a competitive process to determine who can meet that need. It's a competition among all eligible resources, and it's the Ontario consumer, including industrial electricity ratepayers, who benefits through lower costs and a more flexible system better able to respond to changing demand and supply conditions," says IESO President and CEO Peter Gregg.

In the past decade, electricity supply was typically acquired through very prescriptive means with defined targets for specific types of resources such as wind and solar, and secured through 20-year contracts.  While these long-term commitments helped Ontario transform its generation fleet over the last decade, electricity cost allocation also played a role, but longer term contracts provide limited flexibility in dealing with unexpected changes in the power system. 

"Imagine signing a 20-year contract for your cable TV service. In five years' time, electricity rates could be lower, new competitors may have entered the market, or entirely new and innovative platforms and services like Netflix may have emerged. You miss out on opportunities for improvement by being locked-in," says Gregg.

Provincial electricity demand has traditionally fluctuated over time due to factors like economic growth, conservation and the introduction of generating resources on local distribution systems, with occasional issues such as phantom demand affecting customers' costs as well. Technological changes are adding another layer of uncertainty to future demand as electric vehicles, energy storage and low-cost solar panels become more common.

"Our planners do their best to forecast electricity demand, but the truth is there's no such thing as certainty in electricity planning. That's why flexibility is so important. We don't want Ontarians to have to pay more on the typical Ontario electricity bill for electricity resources than are needed to ensure a reliable power system that can continue to meet Ontario's needs," says IESO Vice President and COO Leonard Kula.

 

Related News

View more

Hydro One delivery rates go up

Hydro One Rate Hike reflects Ontario Energy Board approval for higher delivery charges, impacting seasonal customers more than residential classes, funding infrastructure upgrades like wood pole and transformer replacements across Ontario's medium-density service areas.

 

Key Points

The Hydro One rate hike is an OEB-approved delivery charge increase to fund upgrades, with impacts on seasonal users.

✅ OEB-approved delivery rate increases retroactive to 2018

✅ Seasonal customers see larger monthly bill impacts than residential

✅ Funds pole, transformer replacements and tree trimming work

 

Hydro One seasonal customers will face bigger increases in their bills than the utility's residential customers as a result of an Ontario Energy Board approval of a rate hike, a topic drawing attention from a utilities watchdog in other provinces as well.

Hydro One received permission to increase its delivery charge, as large projects like the Meaford hydro generation proposal are considered across Ontario, retroactive to last year.

It says it needs the money to maintain and upgrade its infrastructure, including efforts to adapt to climate change, much of which was installed in the 1950s.

The utility is notifying customers that new statements reflect higher delivery rates which were not charged in 2018 and the first half of this year, due to delay in receiving the OEB's permission, similar to delays that can follow an energy board recommendation in other jurisdictions.

The amount that customers' bills will increase by depends not only on how much electricity they use, but also on which rate class they belong to, as well as policy decisions affecting remote connections such as the First Nations electricity line in northern Ontario.

For seasonal customers such as summer cottage owners, the impact on a typical user's bill will be 2.9 per cent more per month for 2018, and 1.7 per cent per month for 2019.

There will be further increases of 1.0 per cent, 1.4 per cent and 1.1 per cent per month in 2020, 2021 and 2022 respectively. 

Typical residential customers will experience smaller increases or rate freezes over the same period.

In the residential medium density class, the rate changes are a 2.0 per cent increase for last year, a decrease of 0.5 per cent this year, and an increase of 0.5 per cent in 2021. There will be no increases in 2020 and 2022.

 

Seasonal Rate Class — Estimated bill impact per month

2018 - 2.9 %

2019 - 1.7%

2020 - 1.0%

2021 - 1.4%

2022 - 1.1%

 

Residential Medium Density Rate Class — Estimated bill impact per month

2018 - 2.0%

2019 - -0.5% decrease

2020 - 0.0%

2021 - 0.5%

2022 - 0.0%

A Hydro One spokesperson told tbnewswatch.com that over the next three years, the utility's upgrading plan includes reliability investments such as replacing more than 24,000 wood poles across the province as well as numerous transformers.

In the Thunder Bay area, the spokesperson said, some of the revenue generated by the higher delivery rates will cover the cost of replacing more than 180 poles and trimming hazardous trees around 3,200 kilometres of overhead power lines while sharing electrical safety tips with customers.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Kyiv warns of 'difficult' winter after deadly strikes

Ukraine Winter Energy Attacks strain the power grid as Russian missile strikes hit critical infrastructure, causing blackouts, civilian casualties, and damage in Kyiv, Kherson, and Kharkiv, underscoring air defense needs and looming cold-weather risks.

 

Key Points

Russian strikes on energy infrastructure cause outages, damage, and harm as Ukraine braces for freezing winter months.

✅ Russian missile barrage targets critical infrastructure nationwide.

✅ Power cuts reported in 400 localities; grid stability at risk.

✅ Kyiv seeks more air defenses as winter threats intensify.

 

Ukraine has warned that a difficult winter looms ahead after a massive Russian missile barrage targeted civilian infrastructure, killing three in the south and wounding many across the country.

Russia launched the strikes as Ukraine prepares for a third winter during Moscow's 19-month long invasion and as President Volodymyr Zelensky made his second wartime trip to Washington amid a U.S. end to grid support announcement.

"Most of the missiles were shot down. But only the majority. Not all," Zelensky said, calling for the West to provide Kyiv with more anti-missile systems to help keep the lights on this winter amid ongoing attacks.

The fresh attack came as Poland said it would honour pre-existing commitments of weapons supplies to Kyiv, a day after saying it would no longer arm its neighbour in a mounting row between the two allies.

Moscow hit cities from Rivne in western Ukraine to Kherson in the south, the capital Kyiv and cities in the centre and northeast of the country.

Kyiv also reported power cuts across the country -- in almost 400 cities, towns and villages -- as Russia targeted power plants across the grid, but said it was "too early" to tell if this was the start of a new Russian campaign against its energy sites.

Officials added that electricity reserves could limit scheduled outages if no new large-scale strikes occur.

Last winter many Ukrainians had to go without electricity and heating in freezing temperatures as Russia hit Kyiv's energy facilities.

"Difficult months are ahead: Russia will attack energy and critically important facilities," said Oleksiy Kuleba, the deputy head of Kyiv's presidential office.

Ukraine also said that it had struck a military airfield in Moscow-annexed Crimea, a claim denied by Russian-installed authorities.

'Ceilings fell down'
Russia's overnight strikes were deadliest in the southern Kherson, where three people were killed.

In Kyiv's eastern Darnitsky district, frightened residents of a dormitory woke up to their rooms with shattered windows and parked cars outside completely burnt out.

Communities have also adopted new energy solutions to cope with winter blackouts, from generators to shared warming points.

Debris from a downed missile in the capital wounded seven people, including a child.

"God, god, god," Maya Pelyukh, a cleaner who lives in the building, said as she looked at her living room covered in broken glass and debris on her bed.

Her windows and door were blown away, with the 50-year-old saying she crawled out from under a door frame.

Some residents outside were still in dressing gowns as they watched emergency workers put out a fire the authorities said had spread over 400 square meters (4,300 square feet).

In the northeastern city of Kharkiv seamstresses were clearing a damaged clothing factory, with a Russian missile hitting nearby.

"The ceilings fell down. Windows were blown out. There are chunks of the road inside," Yulia Barantsova said, as she cleared a sewing machine from dust and rubble.

 

Related News

View more

Romania moves to terminate talks with Chinese partner in nuke project

Romania Ends CGN Cernavoda Nuclear Deal, as Nuclearelectrica moves to terminate negotiations on reactors 3 and 4, citing the EU Green Deal, US partnership, NATO, and a shift to alternative nuclear capacity options.

 

Key Points

Romania orders Nuclearelectrica to end CGN talks on Cernavoda units 3-4 and pursue alternative nuclear options.

✅ Negotiations on Cernavoda units 3-4 to be formally terminated

✅ EU Green Deal and US partnership cited over security concerns

✅ Board to draft strategies for new domestic nuclear capacity

 

Romania's government has mandated the managing board of local nuclear power producer Nuclearelectrica to initiate procedures for terminating negotiations with China General Nuclear Power Group (CGN) on building two new reactors at the Cernavoda nuclear power plant, where IAEA safety reports continue to shape operations.

The government also mandated the managing board to analyse and draw up strategic options on the construction of new electricity generation capacities from nuclear sources, as other countries such as India take steps to get nuclear back on track in response to demand.

The company will negotiate the termination of the agreement signed in 2015 for developing and operating units 3 and 4 at Cernavoda, even as Germany turns away from nuclear within the European landscape. 

At the end of last month, Economy Minister Virgil Popescu said that the collaboration with the Chinese company couldn't continue as it has yielded no results in seven years, despite China's nuclear program expanding steadily elsewhere.

"We have a strategic partnership with the US, and we hold on to it, we respect our partners. We are members of the EU and Nato, even as Germany's final reactor closures unfold in Europe. Aside from that, I think that seven years since this collaboration with the Chinese company began is enough to realise that we can't move on," Popescu said at that time.

Liberal Prime Minister Ludovic Orban announced in January that the government would exit the deal with its Chinese partner. He invoked the European Union's Green Deal rather than security issues or cost concerns circulated previously as the main reason behind a potential end of the deal with CGN to expand Romania's only nuclear power plant, amid concerns that Europe is losing nuclear power when it needs energy.

In August last year, the US included CGN on a blacklist for allegedly trying to get nuclear technology from the US to be used for military purposes in China, even as nuclear cooperation with Cambodia expands in the region.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified