SaskPower and UK announce new carbon capture and storage program

By SaskPower


Substation Relay Protection Training

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today
SaskPower and the UK Carbon Capture and Storage Research Centre UKCCSRC have established a joint initiative to link practical experience on SaskPowerÂ’s Boundary Dam project with a wide-ranging academic carbon capture and storage CCS research program.

The three-year Memorandum of Understanding was recently signed between SaskPower and the UKCCSRC to facilitate research and related opportunities aimed at improving costs and performance of CCS.

In support of the MOU program, the UKCCSRC has allocated an initial budget of $390,000 CAD £250,000 to meet the additional costs to UK academic researchers. A joint SaskPower/UKCCSRC panel will provide oversight and planning for the coordinated research activities.

“The knowledge and expertise that SaskPower has gained through its carbon capture and storage project at Boundary Dam Power Station is now in demand by other organizations around the world,” said SaskPower President and CEO Robert Watson. “This type of international collaboration is very welcome and will benefit the energy industry as a whole.”

“This joint initiative will add significant impact and value to the UKCCSRC’s research base. The ability to undertake research linked to the world’s largest post-combustion CCS project is crucial for keeping our program at the leading edge of work to help meet global climate change targets” said Prof. Jon Gibbins, UKCCSRC Director.

The MOU comes after researchers from UKCCSRC and SaskPower officials met in 2012 on a visit to Canada supported by the UK Foreign and Commonwealth Office, followed by a visit to the UK made by SaskPower. Results and outcomes will be shared with both organization members, with scope for extended and expanded research projects in future years.

Related News

Blizzard and Extreme Cold Hit Calgary and Alberta

Calgary Winter Storm and Extreme Cold delivers heavy snowfall, ECCC warnings, blowing snow, icy roads, and dangerous wind chill across southern Alberta, as a low-pressure system and northerly inflow fuel hazardous travel and frostbite risks.

 

Key Points

A severe Alberta storm with heavy snow, strong winds, ECCC warnings, dangerous wind chill, and high frostbite risk.

✅ ECCC extends snowfall and winter storm warnings regionwide.

✅ Wind chill -28 to -47; frostbite possible within 5-30 minutes.

✅ AMA rescues surge; non-essential travel strongly discouraged.

 

Calgary and much of southern Alberta faced a significant winter storm that brought heavy snowfall, strong winds, and dangerously low temperatures. Environment and Climate Change Canada (ECCC) issued extended and expanded snowfall and winter storm warnings as persistent precipitation streamed along the southern borders. The combination of a low-pressure system off the West Coast, where a B.C. 'bomb cyclone' had left tens of thousands without power, and a northerly inflow at the surface led to significant snow accumulations in a short period.

The storm resulted in poor driving conditions across much of southern Alberta, with snow-packed and icy roads, as well as limited visibility due to blowing snow. ECCC advised postponing non-essential travel until conditions improved. As of 10 a.m. on January 17, the 511 Alberta map showed poor driving conditions throughout the region, while B.C. electricity demand hit an all-time high amid the cold.

In Calgary, the city recorded four centimeters of snow on January 16, with an additional four centimeters expected on January 17. Temperatures remained far below seasonal averages until the end of the week, and Calgary electricity use tends to surge during such cold snaps according to Enmax, with improvements starting on Sunday.

The extreme cold posed significant risks, with wind chills of -28 to -39 capable of causing frostbite in 10 to 30 minutes, as a Quebec power demand record illustrated during the deep freeze. When wind chills dropped to -40 to -47, frostbite could occur in as little as five to 10 minutes. Residents were advised to watch for signs of frostbite, including color changes on fingers and toes, pain, numbness, tingling sensations, or swelling. Those most at risk included young children, older adults, people with chronic illnesses, individuals working or exercising outdoors, and those without proper shelter.

In response to the severe weather, the Alberta Motor Association (AMA) experienced a surge in calls for roadside assistance. Between January 12 and 14, there were approximately 32,000 calls, with about 22,000 of those requiring rescues between January 12 and 14. The high volume of requests led the AMA to temporarily cease providing wait time updates on their website due to the inability to provide accurate information, while debates over Alberta electricity prices also intensified during the cold.

The storm also had broader implications across Canada. Heavy snow was expected to fall across wide swaths of southern British Columbia and parts of southern Alberta, as BC Hydro's winter payment plan offered billing relief to customers during the stretch. Northern Alberta was under extreme cold warnings, with temperatures expected to dip to -40°C through the rest of the week. Similar extreme cold was forecast for southern Ontario, with wind chill values reaching -30°C.

As the storm progressed, conditions began to improve. The wind warning for central Alberta ended by January 17, though a blowing snow advisory remained in effect for the southeast corner of the province. Northwest winds gusting up to 90 km/h combined with falling snow continued to cause poor visibility in some areas, while California power outages and landslides were reported amid concurrent severe storms along the coast. Conditions were expected to improve by mid-morning.

In the aftermath of the storm, residents were reminded of the importance of preparedness and caution during severe winter weather. Staying informed through official weather advisories, adjusting travel plans, and taking necessary precautions can help mitigate the risks associated with such extreme conditions.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Disrupting Electricity? This Startup Is Digitizing Our Very Analog Electrical System

Solid-State AC Switching reimagines electrification with silicon-based, firmware-driven controls, smart outlets, programmable circuit breakers, AC-DC conversion, and embedded sensors for IoT, energy monitoring, surge protection, and safer, globally compatible devices.

 

Key Points

Solid-state AC switching replaces mechanical switches with silicon chips for intelligent, programmable power control.

✅ Programmable breakers trip faster and add surge and GFCI protection

✅ Shrinks AC-DC conversion, boosting efficiency and device longevity

✅ Enables sensor-rich, IoT-ready outlets with energy monitoring

 

Electricity is a paradox. On the one hand, it powers our most modern clean cars and miracles of computing like your phone and laptop. On the other hand, it’s one of the least updated, despite efforts to build a smarter electricity infrastructure nationwide, and most ready-for-disruption parts of our homes, offices, and factories.

A startup in Silicon Valley plans to change all that, in California’s energy transition where reliability is top of mind, and has just signed deals with leading global electronics manufacturers to make it happen.

“The end point of the electrification infrastructure of every building out there right now is based on old technology,” Thar Casey, CEO of Amber Solutions, told me recently on the TechFirst podcast. “Basically some was invented ... last century and some came in a little bit later on in the fifties and sixties.”

Ultimately, it’s an almost 18th century part of modern homes.

Even smart homes, with add-ons like the Tesla Powerwall, still rely on legacy switching.

The fuses, breakers, light switches, and electrical outlets in your home are ancient technology that would easily understood by Thomas Edison, who was born in 1847. When you flip a switch and instantly flood your room with light, it feels like a modern right. But you are simply pushing a piece of plastic which physically moves one wire to touch another wire. That completes a circuit, electricity flows, and ... let there be light.

Casey wants to change all that. To transform our hard-wired electrical worlds and make them, in a sense, soft wired. And the addressable market is literally tens of billions of devices.

The core innovation is a transition to solid-state switches.

“Take your table, which is a solid piece of wood,” Casey says. “If you can mimic what an electromechanical switch does, opening and closing, inside that table without any actual moving parts, that means you are now solid state AC switching.”

And solid-state is exactly what Silicon Valley is all about.

“Solid state it means it can be silicon,” Casey says. “It can be a chip, it can be smaller, it can be intelligent, you can have firmware, you can add software ... now you have a mini computer.”

That’s a significant innovation with a huge number of implications. It means that the AC to DC converters attached to every appliance you plug into the wall — the big “bricks” that are part of your power cord, for instance — can now be a tiny fraction of the size. Appliance run on DC, direct current, and the electricity in your walls is AC, alternating current; similar principles underpin advanced smart inverters in solar systems, and it needs to be converted before it’s usable, and that chunk of hardware, with electrolytics, magnetics, transformers and more, can now be replaced, saving space in thermostats, CO2 sensors, coffee machines, hair dryers, smoke detectors ... any small electric device.

(Since those components generally fail before the device does, replacing them is a double win.)

Going solid state also means that you can have dynamic input range: 45 volts all the way up to 600 volts.

So you can standardize one component across many different electric devices, and it’ll work in the U.S., it’ll work in Europe, it’ll work in Japan, and it will work whether it’s getting 100 or 120 or 220 volts.

Building it small and building it solid state has other benefits as well, Casey says, including a much better circuit breaker for power spikes as the U.S. grid faces climate change impacts today.

“This circuit breaker is programmable, it has intelligence, it has WiFi, it has Bluetooth, it has energy monitoring metering, it has surge protection, it has GFCI, and here’s the best part: we trip 3000 times faster than a mechanical circuit breaker.”

What that means is much more ambient intelligence that can be applied all throughout your home. Rather than one CO2 sensor in one location, every power outlet is now a CO2 sensor that can feed virtual power plant programs, too. And a particulate matter sensor and temperature sensor and dampness sensor and ... you name it.

Amber’s next-generation system-on-chip complete replacement for smart outlets
Amber’s next-generation system-on-chip complete replacement for smart outlets JOHN KOETSIER
“We put as many as fifteen functions ... in one single gang box in a wall,” Casey told me.

Solid state is the gift that keeps giving, because now every outlet can be surge-protected. Every outlet can have GFCI — ground fault circuit interruption — not just the ones in your bathroom. And every outlet and light switch in your home can participate in the sensor network that powers your home security system. Oh, and, if you want, Alexa or Siri or the Google Assistant too. Plus energy-efficient dimmers for all lighting appliances that don’t buzz.

So when can you buy Amber switches and outlets?

In a sense, never.

Casey says Amber isn’t trying to be a consumer-facing company and won’t bring these innovations to market themselves. This July, Amber announced a letter of intent with a global manufacturer that includes revenue, plus MOUs with six other major electronics manufacturers. Letters of intent can be a dime a dozen, as can memoranda of understanding, but attaching revenue makes it more serious and significant.

The company has only raised $6.7 million, according to Craft, and has a number of competitors, such as Blixt, which has funding from the European Union, and Atom Power, which is already shipping technology. But since Amber is not trying to be a consumer product and take its innovations to market itself, it needs much less cash to build a brand and a market. You’ll be able to buy Amber’s technology at some point; just not under the Amber name.

“We have over 25 companies that we’re in discussions with,” Casey says. “We’re going to give them a complete solution and back them up and support them toward success. Their success will be our success at the end of the day.”

Ultimately, of course, cost will be a big part of the discussion.

There are literally tens of billions of switches and outlets on the planet, and modernizing all of them won’t happen overnight. And if it’s expensive, it won’t happen quickly either, even as California turns to grid-scale batteries to ease strain.

Casey is a big cagey with costs — there are still a lot of variables, after all. But it seems it won’t cost that much more than current technology.

“This can’t be $1.50 to manufacture, at least not right now, maybe down the road,” he told me. “We’re very competitive, we feel very good. We’re talking to these partners. They recognize that what we’re bringing, it’s a cost that is cost effective.”

 

Related News

View more

Nunavut's electricity price hike explained

Nunavut electricity rate increase sees QEC raise domestic electricity rates 6.6% over two years, affecting customer rates, base rates, subsidies, and kWh overage charges across communities, with public housing exempt and territory-wide pricing denied.

 

Key Points

A 6.6% QEC hike over 2018-2019, affecting customer rates, subsidies, and kWh overage; public housing remains exempt.

✅ 3.3% on May 1, 2018; 3.3% on Apr 1, 2019

✅ Subsidy caps: 1,000 kWh Oct-Mar; 700 kWh Apr-Sep

✅ Territory-wide base rate denied; public housing exempt

 

Ahead of the Nunavut government's approval of the general rate increase for the Qulliq Energy Corporation, many Nunavummiut wondered how the change would impact their electricity bills.

QEC's request for a 6.6-per-cent increase was approved by the government last week. The increase will be spread out over two years, a pattern similar to BC Hydro's two-year rate plan, with the first increase (3.3 per cent) effective May 1, 2018. The remaining 3.3 per cent will be applied on April 1, 2019.

Public housing units, however, are exempt from the government's increase altogether.

The power corporation also asked for a territory-wide rate, so every community would pay the same base rate (we'll go over specific terms in a minute if you're not familiar with them). But that request was denied, even as Manitoba Hydro scaled back increases next year, and QEC will now take the next two years reassessing each community's base rate.

#google#

So, what does this mean for your home's power bill? Well, there's a few things you need to know, which we'll get to in a second.

But in essence, as long as you don't go over the government-subsidized monthly electricity usage limit, you're paying an extra 3.61 cents per kilowatt hour (kWh).

To be clear, we're talking about non-government domestic rates — basically, private homeowners — and those living in a government-owned unit but pay for their own power.

 

The basics

First, some quick terminology. The "base rate" term we're going to use (and used above) in this story refers to the community rate. As in, what QEC charges customers in every community. The "customer rate" is the rate customers actually pay, after the government's subsidy.

 

The first thing you need to know is everyone in Nunavut starts off by paying the same customer rate, unlike jurisdictions using a price cap to limit spikes.

That's because the government subsidizes electricity costs, and that subsidy is different in every community, because the base rate is different.

For example, Iqaluit's new base rate after the 3.3 per cent increase (remember, the 6.6 per cent is being applied over two years) is 56.69 cents per kWh, while Kugaaruk's base rate rose to 112.34 cents per kWh. Those, by the way, are the territory's lowest and highest respective base rates.

However, customers in both Iqaluit and Kugaaruk will each now pay 28.35 cents per kWh because, remember, the government subsidizes the base rates in every community.

Now, remember earlier we mentioned a "government-subsidized monthly electricity usage limit?" That's where customers in various communities start to pay different amounts.

As simply as we can explain it, the government will only cover so much electricity usage in a month, in every household.

Between October and March, the government will subsidize the first 1,000 kilowatt hours, and only 700 kilowatt hours from April to September. QEC says the average Nunavut home will use about 500 kilowatt hours every month over the course of a year.

But if your household goes over that limit, you're at the mercy of your community's base rate for any extra electricity you use. Homes in Kugaaruk in December, for instance, will have to pay that 122.34 cents for every extra kilowatt hour it uses, while homes in Iqaluit only have to pay 56.69 cents per kWh for its extra electricity.

That's where many Nunavummiut have criticized the current rate structure, because smaller communities are paying more for their extra costs than larger communities.

QEC had hoped — as it had asked for — to change the structure so every community pays the same base rate. So regardless of if people go over their electricity usage limits for the government subsidy, everyone would pay the same overage rates.

But the government denied that request.

 

New rate is actually lower

The one thing we should highlight, however, is the new rate after the increase is actually lower than what customers were paying in 2014.

For the past seven months, customers have been getting power from QEC at a discount, whereas Newfoundland customers began paying for Muskrat Falls during the same period, to different effect.

That's because when QEC sets its rates, it does so based on global oil price forecasts. Since 2014, the price of oil worldwide has slumped, and so QEC was able to purchase it at less than it had anticipated.

When that happens, and QEC makes more than $1 million within a six month period thanks to the lower oil prices, it refunds the excess profits back to customers through a discount on electricity base rates — a mechanism similar to a lump-sum credit used elsewhere — the government subsidy, however, doesn't change so the savings are passed on directly to customers.

Now, the 6.6 per cent increase to electricity rates, is actually being applied to the discounted base rate from the last seven months.

So again, while customers are paying more than they have been for the last seven months, it's lower than what they were paying in 2014.

Lastly, to be clear, all the figures used in this story are only for domestic non-government rates. Commercial rates and changes have not been explored in this story, given the differences in subsidy and rate application.

 

Related News

View more

Reliability of power winter supply puts Newfoundland 'at mercy of weather': report

Labrador Island Link Reliability faces scrutiny as Nalcor Energy and General Electric address software issues; Liberty Consulting warns of Holyrood risks, winter outages, grid stability concerns, and PUB oversight for Newfoundland and Labrador.

 

Key Points

It is the expected dependability of the link this winter, currently uncertain due to GE software and Holyrood risks.

✅ GE software delays may hinder reliable in-service by mid-November.

✅ Holyrood performance issues increase winter outage risk.

✅ PUB directs Hydro to plan contingencies and improve assets.

 

An independent consultant is questioning if the brand new Labrador Island link can be counted on to supply power to Newfoundland this coming winter.

In June, Nalcor Energy confirmed it had successfully sent power from Churchill Falls to the Avalon Peninsula through its more than 1500-kilometre link, but now the Liberty Consulting Group says it doesn't expect the link will be up and running consistently this winter.

"What we have learned supports a conclusion that the Labrador Island Link is unlikely to be reliably in commercial operation at the start of the winter," says the report dated Aug. 30, 2018.

The link relies on software provided by General Electric but Liberty says there are lingering questions about GE's ability to ensure the necessary software will be in place this fall.

"At an August meeting, company representatives did not express confidence in GE's ability to meet an in-service date for the Labrador Island Link of mid-November," says the report.

Liberty also says testing the link for a brief period this spring and fall doesn't demonstrate long-term reliability.

"The link will remain prone to the uncertainties any new major facility faces early in its operating life, especially one involving technology new to the operating company," according to the report.

Holyrood trouble

The report goes on to say island residents should also be worried about the reliability of the troubled Holyrood facility — a facility that's important when demand for energy is high during winter months.

Liberty says "poor performance at the Holyrood thermal generating station increases the risk of outages considerably."

The group's report concludes the deteriorating condition of Holyrood is a major threat to the island's power supply and Liberty says that threat "could produce very severe consequences when the Labrador Island Link is unavailable."

The consultant says questions about the Labrador Island Link's readiness combined with concerns about the reliability of Holyrood may mean power outages, and for vulnerable customers, debates over hydro disconnections policies often intensify during winter.

"This all suggests that, for at least part of this winter, the island interconnected system may be at the mercy of the weather, where severe events can test utilities' storm response efforts further."

The consultant's report also includes five recommendations to the PUB, reflecting the kind of focused nuclear alert investigation follow-up seen elsewhere.

In essence, Liberty is calling for the board to direct Newfoundland and Labrador Hydro to make plans for the possibility that the link won't be available this winter. It's also calling on hydro to do more to improve the reliability of its other assets, such as Holyrood, as some operators have even contemplated locking down key staff to maintain operations during crises.

Response to Liberty's report

Nalcor CEO Stan Marshall defended the Crown corporation's winter preparedness in an email statement to CBC.

"The right level of planning and investment has been made for our existing equipment so we can continue to meet all of our customer electricity needs for this coming winter season," he wrote.

Regarding the Labrador Island Link, Marshall called for patience.

"This is new technology for our province and integrating the new transmission assets into our current electricity system is complex work that takes time," he said.

There is also a more detailed response from Newfoundland and Labrador Hydro which was sent to the province's Public Utiltiies Board.

Hydro says it will keep testing the Labrador Island Link and increasing the megawatts that are wheeled through it. It also says in October it will begin to give the PUB regular reports on the link's anticipated in-service date.

 

 

Related News

View more

Group to create Canadian cyber standards for electricity sector IoT devices

Canadian Industrial IoT Cybersecurity Standards aim to unify device security for utilities, smart grids, SCADA, and OT systems, aligning with NERC CIP, enabling certification, trust marks, compliance testing, and safer energy sector deployments.

 

Key Points

National standards to secure industrial IoT for utilities and grids, enabling certification and NERC CIP alignment.

✅ Aligns with NERC CIP and NIST frameworks for energy sector security

✅ Defines certification, testing tools, and a trusted device repository

✅ Enhances OT, SCADA, and smart grid resilience against cyber threats

 

The Canadian energy sector has been buying Internet-connected sensors for monitoring a range of activities in generating plants, distribution networks facing harsh weather risks and home smart meters for several years. However, so far industrial IoT device makers have been creating their own security standards for devices, leaving energy producers and utilities at their mercy.

The industry hopes to change that by creating national cybersecurity standards for industrial IoT devices, with the goal of improving its ability to predict, prevent, respond to and recover from cyber threats, such as emerging ransomware attacks across the grid.

To help, the federal government today announced an $818,000 grant support a CIO Strategy Council project oversee the setting of standards.

In an interview council executive director Keith Jansa said the money will help a three-year effort that will include holding a set of cross-country meetings with industry, government, academics and interest groups to create the standards, tools to be able to test devices against the standards and the development of product repository of IoT safe devices companies can consult before making purchases.

“The challenge is there are a number of these devices that will be coming online over the next few years,” Jansa said. “IoT devices are designed for convenience and not for security, so how do you ensure that a technology an electricity utility secures is in fact safeguarded against cyber threats? Currently, there is no associated trust mark or certification that gives confidence associated with these devices.”

He also said the council will work with the North American Electric Reliability Corporation (NERC), which sets North American-wide utility safety procedural standards and informs efforts on protecting the power grid across jurisdictions. The industrial IoT standards will be product standards.

According to Robert Wong, vice-president and CIO of Toronto Hydro, all the big provincial utilities are subject to adhering to NERC CIP standards which have requirements for both cyber and physical security. Ontario is different from most provinces in that it has local distribution companies — like Toronto Hydro — which buy electricity in bulk and resell it to customers.  These LDCs don’t own or operate critical infrastructure and therefore don’t have to follow the NERC CIP standards.

Regional reforms, such as regulatory changes in Atlantic Canada, aim to bring greener power options to the grid.

Electricity is considered around the world as one of a country’s critical national infrastructure. Threats to the grid can be used for ransom or by a country for political pressure. Ukraine had its power network knocked offline in 2015 and 2016 by what were believed to be Russian-linked attackers operating against utilities.

All the big provincial utilities operate “critical infrastructure” and are subject to adhering to NERC CIP (critical infrastructure protection) standards, which have requirements for both cyber and physical security, as similar compromises at U.S. electric utilities have highlighted recently.  There are audited on a regular basis for compliance and can face hefty fines if they fail to meet the requirements.  The LDCs in Ontario don’t own or operate “critical infrastructure” and therefore are not required to adopt NERC CIP standards (at least for now).

The CIO Strategy Council is a forum for chief information officers that is helping set standards in a number of areas. In January it announced a partnership with the Internet Society’s Canada Chapter to create standards of practice for IoT security for consumer devices. As part of the federal government’s updated national cybersecurity strategy it is also developing a national cybersecurity standard for small and medium-sized businesses. That strategy would allow SMBs to advertise to customers that they meet minimum security requirements.

“The security of Canadians and our critical infrastructure is paramount,” federal minister of natural resources Seamus O’Regan said in a statement with today’s announcement. “Cyber attacks are becoming more common and dangerous. That’s why we are supporting this innovative project to protect the Canadian electricity sector.”

The announcement was welcomed by Robert Wong, Toronto Hydro’s vice-president and CIO. “Any additional investment towards strengthening the safeguards against cyberattacks to Canada’s critical infrastructure is definitely good news.  From the perspective of the electricity sector, the convergence of IT and OT (operational technology) has been happening for some time now as the traditional electricity grid has been transforming into a Smart Grid with the introduction of smart meters, SCADA systems, electronic sensors and monitors, smart relays, intelligent automated switching capabilities, distributed energy resources, and storage technologies (batteries, flywheels, compressed air, etc.).

“In my experience, many OT device and system manufacturers and vendors are still lagging the traditional IT vendors in incorporating Security by Design philosophies and effective security features into their products.  This, in turn, creates greater risks and challenges for utilities to protecting their critical infrastructures and ensuring a reliable supply of electricity to its customers.”

The Ontario Energy Board, which regulates the industry in the province, has led an initiative for all utilities to adopt the National Institute of Standards and Technology (NIST) Cybersecurity Framework, along with the ES-C2M2 maturity and Privacy By Design models, he noted.  Toronto Hydro has been managing its cybersecurity practice in adherence to these standards, as the city addresses growing electricity needs as well, he said.

“Other jurisdictions, such as Israel, have invested heavily on a national level in developing its cybersecurity capabilities and are seen as global leaders.  I am confident that given the availability of talent, capabilities and resources in Canada (especially around the GTA) if we get strong support and leadership at a federal level we can also emerge as a leader in this area as well.”

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.