Isotope firm urges Ottawa to revive new reactors

By Toronto Star


Substation Relay Protection Training

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today
A supplier of medical isotopes crucial to diagnostic tests urged the federal government to bring a project that would have replaced the aging nuclear reactor at Chalk River back from the dead.

Ottawa-based MDS Nordion wants a panel of international experts to weigh in on whether the shelved MAPLE project at the heart of its $1.6 billion lawsuit against Atomic Energy of Canada Ltd. and the Canadian government should be revived as a long-term solution to the fragile global supply.

"I think these are exceptional circumstances," MDS Nordion president Steve West said in an interview, on why his company decided to break the silence on its dispute over the project.

MDS Nordion has an exclusive revenue-sharing agreement with AECL to distribute the isotopes produced by the NRU reactor, which is now expected to be out of service for at least three months.

"We felt that we had to encourage the government to bring in this consortium of experts to restart the MAPLE project because it really truly is the only viable option going forward for a secure long-term supply of isotopes," West said.

The government supported an AECL decision to cancel the MAPLE 1 and MAPLE 2 reactors in May 2008 due to design flaws and significant cost overruns.

Natural Resources Minister Lisa Raitt said that MDS Nordion could submit its proposal to an expert panel reviewing alternatives but reviving the project would not be a quick fix. "I wouldn't want people to think that it can just be switched on because it simply cannot," Raitt told reporters.

Related News

Working From Home Will Drive Up Electricity Bills for Consumers

Remote Work Energy Costs are rising as home offices and telecommuting boost electricity bills; utilities, broadband usage, and COVID-19-driven stay-at-home policies affect productivity, consumption patterns, and household budgets across the U.K. and Europe.

 

Key Points

Remote Work Energy Costs are increased household electricity and utility expenses from telecommuting and home office use.

✅ WFH shifts energy load from offices to households.

✅ Higher device, lighting, and heating/cooling usage drives bills.

✅ Broadband access gaps limit remote work equity.

 

Household electricity bills are set to soar, with rising residential electricity use tied to the millions of people now working at home to avoid catching the coronavirus.

Running laptops and other home appliances will cost consumers an extra 52 million pounds ($60 million) each week in the U.K., according to a study from Uswitch, a website that helps consumers compare the energy prices that utilities charge.

For each home-bound household, the pain to the pocketbook may be about 195 pounds per year extra, even as some utilities pursue pandemic cost-cutting to manage financial pressures.

The rise in price for households comes even as overall demand is falling rapidly in Europe, with wide swaths of the economy shut down to keep workers from gathering in one place, and the U.S. grid overseer issuing warnings about potential pandemic impacts on operations.

People stuck at home will plug in computers, lights and appliances when they’d normally be at the office, increasing their consumption.

With the Canadian government declaring a state of emergency due to the coronavirus, companies are enabling work-from-home structures to keep business running and help employees follow social distancing guidelines, and some utilities have even considered housing critical staff on site to maintain operations. However, working remotely has been on the rise for a while.

“The coronavirus is going to be a tipping point. We plodded along at about 10% growth a year for the last 10 years, but I foresee that this is going to really accelerate the trend,” Kate Lister, president of Global Workplace Analytics.

Gallup’s State of the Workplace 2017 study found that 43% of employees work remotely with some frequency. Research indicates that in a five-day workweek, working remotely for two to three days is the most productive. That gives the employee two to three days of meetings, collaboration and interaction, with the opportunity to just focus on the work for the other half of the week.

Remote work seems like a logical precaution for many companies that employ people in the digital economy, even as some federal agencies sparked debate with an EPA telework policy during the pandemic. However, not all Americans have access to the internet at home, and many work in industries that require in-person work.

According to the Pew Research Center, roughly three-quarters of American adults have broadband internet service at home. However, the study found that racial minorities, older adults, rural residents and people with lower levels of education and income are less likely to have broadband service at home. In addition, 1 in 5 American adults access the internet only through their smartphone and do not have traditional broadband access. 

Full-time employees are four times more likely to have remote work options than part-time employees. A typical remote worker is college-educated, at least 45 years old and earns an annual salary of $58,000 while working for a company with more than 100 employees, according to Global Workplace Analytics, and in Canada there is growing interest in electricity-sector careers among younger workers. 

New York, California and other states have enacted strict policies for people to remain at home during the coronavirus pandemic, which could change the future of work, and Canadian provinces such as Saskatchewan have documented how the crisis has reshaped local economies across sectors.

“I don’t think we’ll go back to the same way we used to operate,” Jennifer Christie, chief HR officer at Twitter, told CNBC. “I really don’t.”

 

Related News

View more

B.C. residents and businesses get break on electricity bills for three months

BC Hydro COVID-19 Bill Relief offers pandemic support with bill credits, rate cuts, and deferred payments for residential, small business, and industrial customers across B.C., easing utilities costs during COVID-19 economic hardship.

 

Key Points

COVID-19 bill credits, a rate cut, and deferred payments for eligible B.C. homes, small businesses, and industrial customers.

✅ Non-repayable credits equal to 3 months of average bills.

✅ Small businesses closed can skip bills for three months.

✅ Large industry may defer 50% of electricity costs.

 

B.C. residents who have lost their jobs or had their wages cut will get a three-month break on BC Hydro bills, while small businesses, amid commercial consumption plummets during COVID-19, are also eligible to apply for similar relief.

Premier John Horgan said Wednesday the credit for residential customers will be three times a household’s average monthly bill over the past year and does not have to be repaid as part of the government’s support package during the COVID-19 pandemic, as BC Hydro demand down 10% highlights the wider market pressures.

He said small businesses that are closed will not have to pay their power bills for three months, and in Ontario an Ontario COVID-19 hydro rebate complemented similar relief, and large industrial customers, including those operating mines and pulp mills, can opt to have 50 per cent of their electricity costs deferred, though a deferred costs report warned of long-term liabilities.

BC Hydro rates will be cut for all customers by one per cent as of April 1, a move similar to Ontario 2021 rate reductions that manufacturers supported lower rates at the time, after the B.C. Utilities Commission provided interim approval of an application the utility submitted last August.

Eligible residential customers can apply for bill relief starting next week and small business applications will be accepted as of April 14, while staying alert to BC Hydro scam attempts during this period, with the deadline for both categories set at June 30.

 

Related News

View more

Carbon emissions fall as electricity producers move away from coal

Global Electricity Emissions Decline highlights a 2% drop as coal power falls, while wind and solar surge. EU and US decarbonize faster; China expands coal and gas, challenging Paris Agreement climate targets.

 

Key Points

A 2% annual fall in power-sector CO2, led by less coal and rising wind and solar in the EU and US.

✅ Coal generation fell 3% globally despite China growth

✅ EU and US cut coal; wind and solar up 15% worldwide

✅ Gas gains in US; rapid renewables rollout needed for targets

 

Carbon emissions from the global electricity system fell by 2% last year, the biggest drop in almost 30 years, as countries began to turn their backs on coal-fired power plants.

A new report on the world’s electricity generation revealed the steepest cut in carbon emissions since 1990, with IEA data indicating global totals flatlined in 2019 as the US and the EU turned to cleaner energy sources.

Overall, power from coal plants fell by 3% last year, even as China’s reliance on coal plants climbed for another year to make up half the world’s coal generation for the first time.

Coal generation in the US and Europe has halved since 2007, and last year collapsed by almost a quarter in the EU and by 16% in the US.

The report from climate thinktank Ember, formerly Sandbag, warned that the dent in the world’s coal-fired electricity generation relied on many one-off factors, including milder winters across many countries.

“Progress is being made on reducing coal generation, but nothing like with the urgency needed to limit climate change,” the report said.

Dave Jones, the lead author of the report, said governments must dramatically accelerate the global energy transition so that global coal generation collapses throughout the 2020s.

“To switch from coal into gas is just swapping one fossil fuel for another. The cheapest and quickest way to end coal generation is through a rapid rollout of carbon-free electricity such as wind and solar,” he said.

“But without concerted policymaker efforts to boost wind and solar, we will fail to meet climate targets. China’s growth in coal, and to some extent gas, is alarming but the answers are all there.”

The EU has made the fastest progress towards replacing coal with wind and solar power, while the US has increased its reliance on gas as Wall Street’s energy strategy shifted following its shale boom in recent years.

The report revealed that renewable wind and solar power rose by 15% in 2019 to make up 8% of the world’s electricity.

In the EU, wind and solar power made up almost a fifth of the electricity generated last year, and Europe’s oil majors are turning electric as the bloc stayed ahead of the US which relied on these renewable sources for 11% of its electricity. In China and India, renewable energy made up 8% and 9% of the electricity system, respectively.

To meet the Paris climate goals, the world needs to record a compound growth rate of 15% for wind and solar generation every year – which will require “a colossal effort”, the report warned.

The electricity generation report was published as a separate piece of research claimed that 38 out of 75 of the world’s largest asset managers are stalling on taking action on environmental, social and governance (ESG) issues, and amid investor pressure on utilities to release climate reports.

The latest ranking by Asset Owners Disclosure Project, a scheme managed by the investment campaign group ShareAction, found that the 38 asset managers have weak or nonexistent policy commitments and fail to account for their real-world impacts across their mainstream assets.

The survey also claimed that the investment managers often lack appropriate engagement and escalation processes on climate change, human rights and biodiversity.

Scores were based on a survey of activities in responsible investment governance, climate change, human rights, and biodiversity and ranged between AAA to E. Not a single asset manager was granted an AAA or AA rating, the top two scores available.

Felix Nagrawala, ShareAction analyst, said: “While many in the industry are eager to promote their ESG credentials, our analysis clearly indicates that few of the world’s largest asset managers can lay claim to having a truly sustainable approach across all their investments.”

ShareAction said the world’s six largest asset managers – including BlackRock (rated D), State Street (D) and Vanguard (E) – were among the worst performers.

Vanguard said it was committed to companies making “appropriate disclosures on governance, strategy and performance on relevant ESG risks”. BlackRock and State Street did not respond to a request for comment.

 

Related News

View more

Next Offshore Wind in U.S. Can Compete With Gas, Developer Says

Offshore Wind Cost Competitiveness is rising as larger turbines boost megawatt output, cut LCOE, and trim maintenance and installation time, enabling projects in New England to rival natural gas pricing while scaling reliably.

 

Key Points

It describes how larger offshore turbines lower LCOE and O&M, making U.S. projects price competitive with natural gas.

✅ Larger turbines boost MW output and reduce LCOE.

✅ Lower O&M and faster installation cut lifecycle costs.

✅ Competes with gas in New England bids, per BNEF.

 

Massive offshore wind turbines keep getting bigger, as projects like the biggest UK offshore wind farm come online, and that’s helping make the power cheaper — to the point where developers say new projects in U.S. waters can compete with natural gas.

The price “is going to be a real eye-opener,” said Bryan Martin, chairman of Deepwater Wind LLC, which won an auction in May to build a 400-megawatt wind farm southeast of Rhode Island.

Deepwater built the only U.S. offshore wind farm, a 30-megawatt project that was completed south of Block Island in 2016. The company’s bid was selected by Rhode Island the same day that Massachusetts picked Vineyard Wind to build an 800-megawatt wind farm in the same area, while international investors such as Japanese utilities in UK projects signal growing confidence.

#google#

Bigger turbines that make more electricity have cut the cost per megawatt by about half, a trend aided by higher-than-expected wind potential in many markets, said Tom Harries, a wind analyst at Bloomberg New Energy Finance. That also reduces maintenance expenses and installation time. All of this is helping offshore wind vie with conventional power plants.

“You could not build a thermal gas plant in New England for the price of the wind bids in Massachusetts and Rhode Island,” Martin said Friday at the U.S. Offshore Wind Conference in Boston. “It’s very cost-effective for consumers.”

The Massachusetts project could be about $100 to $120 a megawatt hour, according to a February estimate from Harries, though recent UK price spikes during low wind highlight volatility. The actual prices there and in Rhode Island weren’t disclosed.

For comparison, a new U.S. combine-cycle gas turbine ranges from $40 to $60 a megawatt-hour, and a new coal plant is $67 to $113, according to BNEF data.

 

A new power plant in land-constrained New England would probably be higher than that, and during winter peaks the region has seen record oil-fired generation in New England that underscores reliability concerns. More importantly, gas plants get a significant portion of their revenue from being able to guarantee that power is always available, something wind farms can’t do, said William Nelson, a New York-based analyst with BNEF. Looking only at the price at which offshore turbines can deliver electricity is a “narrow mindset,” he said.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Hydro One Q2 profit plunges 23% as electricity revenue falls, costs rise

Hydro One Q2 Earnings show lower net income and EPS as mild weather curbed electricity demand; revenue missed Refinitiv estimates, while tree-trimming costs rose and the dividend remained unchanged for Ontario's grid operator.

 

Key Points

Hydro One Q2 earnings fell to $155M, EPS $0.26, revenue $1.41B; costs rose, demand eased, dividend held at $0.2415.

✅ Net income $155M; EPS $0.26 vs $0.34 prior year

✅ Revenue $1.41B; missed $1.44B estimate

✅ Dividend steady at $0.2415 per share

 

Hydro One Ltd.'s (H.TO 0.25%) second-quarter profit fell by nearly 23 per cent from last year to $155 million as the electricity utility reported spending more on tree-trimming work due to milder temperatures that also saw customers using less power, notwithstanding other periods where a one-time court ruling gain shaped quarterly results.

The Toronto-based company - which operates most of Ontario's power grid - and whose regulated rates are subject to an OEB decision, says its net earnings attributable to shareholders dropped to 26 cents per share from 34 cents per share when Hydro One had $200 million in net income.

Adjusted net income was also 26 cents per share, down from 33 cents per diluted share in the second quarter of 2018, while executive pay, including the CEO salary, drew public scrutiny during the period.

Revenue was $1.41 billion, down from $1.48 billion, while revenue net of purchased power was $760 million, down from $803 million, and across the sector, Manitoba Hydro's debt has surged as well.

Separately, Ontario introduced a subsidized hydro plan and tax breaks to support economic recovery from COVID-19, which could influence consumption patterns.

Analysts had estimated $1.44 billion of revenue and 27 cents per share of adjusted income, and some investors cite too many unknowns in evaluating the stock, according to financial markets data firm Refinitiv.

The publicly traded company, which saw a share-price drop after leadership changes and of which the Ontario government is the largest shareholder, says its quarterly dividend will remain at 24.15 cents per share for its next payment to shareholders in September.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified