Honda introduces zero emissions cars

By Fox News


High Voltage Maintenance Training Online

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$599
Coupon Price:
$499
Reserve Your Seat Today
Honda's new zero-emission, hydrogen fuel cell car rolled off a Japanese production line and is headed to southern California, where Hollywood is already abuzz over the latest splash in green motoring.

The FCX Clarity, which runs on hydrogen and electricity, emits only water and none of the gases believed to induce global warming. It is also two times more energy efficient than a gas-electric hybrid and three times that of a standard gasoline-powered car, the company says.

Honda expects to lease out a "few dozen" units this year and about 200 units within a year. In California, a three-year lease will run $600 a month, which includes maintenance and collision coverage.

Related News

Global Energy War Escalates: Price Hikes and Instability

Russia-Ukraine Energy War disrupts infrastructure, oil, gas, and electricity, triggering supply shocks, price spikes, and inflation. Global markets face volatility, import risks, and cybersecurity threats, underscoring energy security, grid resilience, and diversified supply.

 

Key Points

It is Russia's strategic targeting of Ukraine's energy system to disrupt supplies, raise prices, and hit global markets.

✅ Attacks weaponize energy to strain Ukraine and allies

✅ Supply shocks risk oil, gas, and electricity price spikes

✅ Urgent need for cybersecurity, grid resilience, diversification

 

Russia's targeting of Ukraine's energy infrastructure has unleashed an "energy war" that could lead to widespread price increases, supply disruptions, and ripple effects throughout the global energy market, felt across the continent, with warnings of Europe's energy nightmare taking shape.

This highlights the unprecedented scale and severity of the attacks on Ukrainian energy infrastructure. These attacks have disrupted power supplies, prompting increased electricity imports to keep the lights on, hindered oil and gas production, and damaged refineries, impacting Ukraine and the broader global energy system.


Energy as a Weapon

Experts claim that Russia's deliberate attacks on Ukraine's energy infrastructure represent a strategic escalation, amid energy ceasefire violations alleged by both sides, demonstrating the Kremlin's willingness to weaponize energy as part of its war effort. By crippling Ukraine's energy system, Russia aims to destabilize the country, inflict suffering on civilians, and undermine Western support for Ukraine.


Impacts on Global Oil and Gas Markets

The ongoing attacks on Ukraine's energy infrastructure could significantly impact global oil and gas markets, leading to supply shortages and dramatic price increases, even as European gas prices briefly returned to pre-war levels earlier this year, underscoring extreme volatility. Ukraine's oil and gas production, while not massive in global terms, is still significant, and its disruption feeds into existing anxieties about global energy supplies already affected by the war.


Ripple Effects Beyond Ukraine

The impacts of the "energy war" won't be limited to Ukraine or its immediate neighbours. Price increases for oil, gas, and electricity are expected worldwide, further fueling inflation and exacerbating the global cost of living crisis.  Additionally, supply disruptions could disproportionately affect developing nations and regions heavily dependent on energy imports, making targeted energy security support to Ukraine and other vulnerable importers vital.


Vulnerability of Energy Infrastructure

The attacks on Ukraine highlight the vulnerability of critical energy infrastructure worldwide, as the country prepares for winter under persistent threats. The potential for other state or non-state actors to use similar tactics raises concerns about security and long-term stability in the global energy sector.


Strengthening Resilience

Experts emphasize the urgent need for global cooperation in strengthening the resilience of energy infrastructure. Investments in cybersecurity, diverse energy sources, and decentralized grids are crucial for mitigating the risks of future attacks, with some arguing that stepping away from fossil fuels would improve US energy security over time. International cooperation will be key in identifying vulnerable areas and providing aid to nations whose infrastructure is under threat.


The Unpredictable Future of Energy

The "energy war" unleashed by Russia has injected a new level of uncertainty into the global energy market. In addition to short-term price fluctuations and supply issues, the conflict could accelerate the long-term transition towards renewable energy sources and reshape how nations approach energy security.

 

Related News

View more

SaskPower eyes buying $300M worth of electricity from Flying Dust First Nation

SaskPower-Flying Dust flare gas power deal advances a 20 MW, 20-year Power Purchase Agreement, enabling grid supply from FNPA-backed generation, supporting renewable strategy, lower carbon footprint targets, and First Nation economic development in Saskatchewan.

 

Key Points

A 20 MW, 20-year PPA converting flare gas to grid power, with SaskPower buying from Flying Dust First Nation via FNPA.

✅ 20 MW of flare gas generation linked to Saskatchewan's grid

✅ 20-year term; about $300M total value to SaskPower

✅ FNPA-backed project; PPA targeted in 6-12 months

 

An agreement signed between SaskPower, which reported $205M income in 2019-20, and Flying Dust First Nation is an important step toward a plan that could see the utility buy $300 million worth of electricity from Flying Dust First Nation, according to Flying Dust's chief.

"There's still a lot of groundwork that needs to be done before we get building but you know we're a lot closer today with this signing," Jeremy Norman told reporters Friday.

Norman's community was assisted by the First Nations Power Authority (FNPA), a non-profit that helps First Nations get into the power sector, with examples like the James Bay project showing what Indigenous ownership can achieve.

The agreement signed Friday says SaskPower will explore the possibility of buying 20 megawatts of flare gas power from FNPA, which it will look to Flying Dust to produce.

#google#

 

20-year plan

The proposed deal would span 20 years and cost SaskPower around $300 million over those years, as the utility also explores geothermal power to meet 2030 targets.

The exact price would be determined once a price per metawatt is brought forward.

"We won't be able to do this ourselves," Norman said.

Flare gas power generation works by converting flares from the oil and gas sector into electricity. Under this plan, SaskPower would take the electricity provided by Flying Dust and plug it into the provincial power grid, complementing a recent move to buy more power from Manitoba Hydro to support system reliability.

"This is a great opportunity as we advance our renewable strategy, including progress on doubling renewables by 2030, and try to achieve a lower carbon footprint by 2030 and beyond," Marsh said.

Ombudsman report details dispute between senior with breathing disorder, SaskPower

Norman said the business deal presents an opportunity to raise money to reinvest into the First Nation for things like more youth programming.

For the next steps, both parties will need to sign a power purchase agreement that spells out the exact prices for the power generation.

Marsh expects to do so in the next six to 12 months, with development of the required infrastructure to take place after that.

 

Related News

View more

Tube Strikes Disrupt London Economy

London Tube Strikes Economic Impact highlights transport disruption reducing foot traffic, commuter flows, and tourism, squeezing small businesses, hospitality revenue, and citywide growth while business leaders urge negotiations, resolution, and policy responses to stabilize operations.

 

Key Points

Reduced transport options cut foot traffic and sales, straining small businesses and slowing London-wide growth.

✅ Hospitality venues report lower revenue and temporary closures

✅ Commuter and tourism declines reduce daily sales and bookings

✅ Business groups urge swift negotiations to restore services

 

London's economy is facing significant challenges due to ongoing tube strikes, challenges that are compounded by scrutiny of UK energy network profits and broader cost pressures across sectors, with businesses across the city experiencing disruptions that are impacting their operations and bottom lines.

Impact on Small Businesses

Small businesses, particularly those in the hospitality sector, are bearing the brunt of the disruptions caused by the strikes. Many establishments rely on the steady flow of commuters and tourists that the tube system facilitates, while also hoping for measures like temporary electricity bill relief that can ease operating costs during downturns. With reduced transportation options, foot traffic has dwindled, leading to decreased sales and, in some cases, temporary closures.

Economic Consequences

The strikes are not only affecting individual businesses but are also having a ripple effect on the broader economy, a dynamic seen when commercial electricity consumption plummeted in B.C. during the pandemic. The reduced activity in key sectors is contributing to a slowdown in economic growth, echoing periods when BC Hydro demand fell 10% and prompting policy responses such as Ontario electricity rate reductions for businesses, with potential long-term consequences if the disruptions continue.

Calls for Resolution

Business leaders and industry groups are urging for a swift resolution to the strikes. They emphasize the need for dialogue between the involved parties to reach an agreement that minimizes further economic damage and restores normalcy to the city's transportation system.

The ongoing tube strikes in London are causing significant disruptions to the city's economy, particularly affecting small businesses that depend on the efficient movement of people. Immediate action is needed to address the issues, drawing on tools like a subsidized hydro plan used elsewhere to spur recovery, to prevent further economic downturn.

 

Related News

View more

Hydro One deal to buy Avista receives U.S. antitrust clearance

Hydro One-Avista Acquisition secures U.S. antitrust clearance under Hart-Scott-Rodino, pending approvals from state utility commissions, the FCC, and CFIUS, with prior FERC approval and shareholder vote supporting the cross-border utility merger.

 

Key Points

A $6.7B cross-border utility merger cleared under HSR, still awaiting state, FCC, and CFIUS approvals; FERC approved earlier.

✅ HSR waiting period expired; U.S. antitrust clearance obtained

✅ Approvals pending: state commissions, FCC, and CFIUS

✅ FERC and Avista shareholders have approved the transaction

 

Hydro One Ltd. says it has received antitrust clearance in the United States for its deal to acquire U.S. energy company Avista Corp., even as it sought to redesign customer bills in Ontario.

The Ontario-based utility says the 30-day waiting period under the Hart-Scott-Rodino Antitrust Improvements Act expired Thursday night.

Hydro One announced the friendly deal to acquire Avista last summer, amid customer backlash in some service areas, in an agreement that valued the company at $6.7 billion.

The deal still requires several other approvals, including those from utility commissions in Washington, Idaho, Oregon, Montana and Alaska.

Analysts also warned of political risk for Hydro One during this period, reflecting concerns about provincial influence.

The U.S. Federal Communications Commission must also sign off on the transaction, and although U.S. regulators later rejected the $6.7B takeover following review, clearance is required by the Committee on Foreign Investment in the United States.

The agreement has received approval from the U.S. Federal Energy Regulatory Commission as well as Avista shareholders, and it mirrored other cross-border deals such as Algonquin Power's acquisition of Empire District that closed in the sector.

 

Related News

View more

Ukraine Resumes Electricity Exports

Ukraine Electricity Exports resume as the EU grid links stabilize; ENTSO-E caps, megawatt capacity, renewables, and infrastructure repairs enable power flows to Moldova, Poland, Slovakia, and Romania despite ongoing Russian strikes.

 

Key Points

Resumed cross-border power sales showing grid stability under ENTSO-E limits and surplus generation.

✅ Exports restart to Moldova; Poland, Slovakia, Romania next.

✅ ENTSO-E cap limits to 400 MW; more capacity under negotiation.

✅ Revenues fund grid repairs after Russian strikes.

 

Ukraine began resuming electricity exports to European countries on Tuesday, its energy minister said, a dramatic turnaround from six months ago when fierce Russian bombardment of power stations plunged much of the country into darkness in a bid to demoralize the population.

The announcement by Energy Minister Herman Halushchenko that Ukraine was not only meeting domestic consumption demands but also ready to restart exports to its neighbors was a clear message that Moscow’s attempt to weaken Ukraine by targeting its infrastructure did not work.

Ukraine’s domestic energy demand is “100%” supplied, he told The Associated Press in an interview, and it has reserves to export due to the “titanic work” of its engineers and international partners.

Russia ramped up infrastructure attacks in September, when waves of missiles and exploding drones destroyed about half of Ukraine's energy system, even as it built lines to reactivate the Zaporizhzhia plant in occupied territory. Power cuts were common across the country as temperatures dropped below freezing and tens of millions struggled to keep warm.

Moscow said the strikes were aimed at weakening Ukraine’s ability to defend itself, and both sides have floated a possible agreement on power plant attacks amid mounting civilian harm, while Western officials said the blackouts that caused civilians to suffer amounted to war crimes. Ukrainians said the timing was designed to destroy their morale as the war marked its first anniversary.


Ukraine had to stop exporting electricity in October to meet domestic needs.

Engineers worked around the clock, often risking their lives to come into work at power plants and keep the electricity flowing. Kyiv’s allies also provided help. In December, U.S. Secretary of State Antony Blinken announced $53 million in bilateral aid to help the country acquire electricity grid equipment, on top of $55 million for energy sector support.

Much more work remains to be done, Halushchenko said. Ukraine needs funding to repair damaged generation and transmission lines, and revenue from electricity exports would be one way to do that.

The first country to receive Ukraine’s energy exports will be Moldova, he said.

Besides the heroic work by engineers and Western aid, warmer temperatures are enabling the resumption of exports by making domestic demand lower, and across Europe initiatives like virtual power plants for homes are helping balance grids. Nationwide consumption was already down at least 30% due to the war, Halushchenko said, with many industries having to operate with less power.

Renewables like solar and wind power also come into play as temperatures rise, taking some pressure off nuclear and coal-fired power plants.

But it’s unclear if Ukraine can keep up exports amid the constant threat of Russian bombardment.

“Unfortunately now a lot of things depend on the war,” Halushchenko said. “I would say we feel quite confident now until the next winter.”

Exports to Poland, Slovakia and Romania are also on schedule to resume, he said.

“Today we are starting with Moldova, and we are talking about Poland, we are talking about Slovakia and Romania,” Halushchenko added, noting that how much will depend on their needs.

“For Poland, we have only one line that allows us to export 200 megawatts, but I think this month we will finish another line which will increase this to an additional 400 MW, so these figures could change,” he said.

Export revenue will depend on fluctuating electricity prices in Europe, where stunted hydro and nuclear output may hobble recovery efforts. In 2022, while Ukraine was still able to export energy, Ukrainian companies averaged 40 million to 70 million euros a month depending on prices, Halushchenko said.

“Even if it’s 20 (million euros) it’s still good money. We need financial resources now to restore generation and transmission lines,” he said.

Ukraine has the ability to export more than the 400 megawatt capacity limit imposed by the European Network of Transmission System Operators for Electricity, or ENTSO-E, and rising EU wind and solar output is reshaping cross-border flows. “We are in negotiations to increase this cap because today we can export even more, we have the necessary reserves in the system,” the minister said.

The current capacity limit is in line with what Ukraine was exporting in September 2022 before Ukraine diverted resources to meet domestic needs amid the Russian onslaught.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.