Energy Department erred on coal project

By New York Times


Substation Relay Protection Training

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today
The Energy Department made a $500 million math error a year ago when it withdrew its support from a “near-zero emissions” coal plant in Illinois, Congressional auditors said in a report.

The error led the department to say mistakenly that the project, known as FutureGen, had nearly doubled in cost — an increase the Bush administration deemed too expensive.

At the time, FutureGen was the leading effort to capture and sequester carbon dioxide, the main heat-trapping gas linked to global warming. If the project were resumed and proved successful, it could provide a model for curbing the carbon dioxide that coal adds to the atmosphere.

The new energy secretary, Steven Chu, has said that he will consider renewing support for FutureGen but that changes will be needed. He did not specify what those might be.

The report was prepared by the Government Accountability Office for Representative Bart Gordon, chairman of the House Science Committee. The panelÂ’s subcommittee on energy and environment is holding a hearing on the issue.

Mr. Gordon, Democrat of Tennessee, said, “I am astonished to learn that the top leadership of the Department of Energy in the last administration made critical decisions about our nation’s energy future and capacity to combat global warming based on fundamental budget math errors.”

He added, “This is math illiteracy on a grand scale and with global consequences.”

According to the report, in calculating the costs of the project, the Energy Department mistakenly compared two numbers that should not have been used together. One cost estimate was made in so-called constant dollars, reflecting the purchasing power of a dollar in 2005, and the other in dollars as they would have been spent over the following few years, worth less each year because of inflation.

The Bush administration said the projected cost had nearly doubled, to $1.8 billion from $950 million; the auditors said it had gone to $1.3 billion, up 39 percent.

In January 2008, after investing $174 million in FutureGen, the Bush administration withdrew support. The staff of the House committee found internal communications indicating that the leaders of the Energy Department were looking for reasons to kill the project.

Under the deal, the private sector was supposed to pay 26 percent of FutureGenÂ’s costs. The other 74 percent would have been paid mostly by the federal government, although 8 percent would have come from foreign government partners, including China and India, two countries that Washington was hoping to persuade to shift to coal plants that can capture their carbon.

Some executives of utilities not involved with FutureGen have said the arrangement was too generous to the private partners. But the cancellation was costly, too. The internal documents found by the staff members of the House committee predicted that killing the Illinois project would set back the technology of carbon capture by 10 years.

What the Energy Department proposed instead was to support carbon capture technologies that would be added to coal plants already built or in the planning stages. But that effort has bogged down, partly because a number of the planned plants were canceled because of high costs.

The stimulus bill passed by Congress may provide money for the original FutureGen project.

Related News

"Energy war": Ukraine tries to protect electricity supply before winter

Ukraine Power Grid Resilience details preparations for winter blackouts, airstrike defense, decentralized generation, backup generators, battery storage, DTEK restorations, EU grid synchronization, and upgraded air defenses to safeguard electricity, heating, water, and essential services.

 

Key Points

Ukraine Power Grid Resilience is a strategy to harden energy systems against winter attacks and outages.

✅ DTEK repairs, backup equipment, and fortified plants across Ukraine

✅ Expanded air defenses targeting missiles and attack drones

✅ EU grid sync enables emergency imports and power trading

 

Oleksandr Gindyuk is determined not to be caught off guard if electricity supplies fail again this winter. When Russia pounded Ukraine’s power grid with widespread and repeated waves of airstrikes last year, causing massive rolling blackouts, his wife had just given birth to their second daughter.

“It was quite difficult,”  Gindyuk, who lives with his family in the suburbs of the capital, Kyiv, told CNN. “There is no life in our house if there is no electricity. Without electricity, we have no water, light or heating.”

He has spent the summer preparing for Russia to repeat its strategy, which was designed to sow terror and make life unsustainable, robbing Ukrainians of heat, water and health services. “We are totally ready — we have a diesel generator and a powerful 9 kWh battery. We are not scared, we are ready,” Gindyuk told CNN.

As families like Gindyuk’s gird themselves for the possibility of another dark winter, Ukraine has been rushing to rebuild and, drawing on protecting the grid lessons, protect its fragile energy infrastructure.

The summer provided a respite for Ukraine’s power grid. Russia focused its attacks on military targets and on ports on the Black Sea and the Danube River, to hinder Ukraine’s efforts to move grain and choke off an important income stream.

As the days grow shorter and the temperatures drop, Russia has another opportunity to try to break Ukrainian resilience with punishing blackouts. But this winter, defense and energy officials say Ukraine is better prepared.

With limited Ukrainian air defenses in operation last year, Russia was able to target and hit the energy grid easily, including during missile and drone assaults on Kyiv’s grid that strained responders.

“The Russians may use a combination of missile weapons and attack UAVs (unmanned aerial vehicles, or drones). These will definitely not be such primitive attacks as last year. It will be difficult for the Russians to achieve a result - we are also preparing and understanding how they act.”

DTEK, the country’s largest private energy company, has spent the past seven months restoring infrastructure, trying to boost output and bolstering defenses at its facilities across Ukraine, mindful of Russian utility hacks reported elsewhere.

“We restored what could be restored, bought back-up equipment and installed defenses around power plants, as Russian-linked breaches at US plants have underscored risks,” DTEK chief executive Maxim Timchenko told CNN.

The company generates around a quarter of Ukraine’s electricity and runs 40% of its grid network, making it a prime target for Russian attacks. Four DTEK employees have been killed while on duty and its power stations have been attacked nearly 300 times since the start of the full-scale invasion, according to the company. “Last winter, determination carried us through. This winter we are stronger, and our people are more experienced,” Timchenko said.

Russia launched 1,200 attacks on Ukraine’s energy system between October 2022 and April 2023, with every thermal power and hydro-electric plant in the country sustaining some damage, according to DTEK.

In a damage assessment report released in June, the United Nations Development Programme said that Ukraine’s power generation capacity had been reduced to about half of what it was before Russia’s full-scale invasion. “Ukraine’s power system continues to operate in an emergency mode, which affects both power grids and generation, amid rising concerns about state-backed grid hacking worldwide,” a news release accompanying the report said.

The report also laid out a roadmap to rebuilding the energy sector, prioritizing decentralization, renewable energy sources and greater integration with the European Union. Ukraine has been hooked into the EU’s power grid since the full-scale invasion, allowing it to synchronize and trade power with the bloc. But the massive wave of attacks on energy infrastructure last winter threw that balance off kilter.

 

Related News

View more

Toronto Cleans Up After Severe Flooding

Toronto Flood Cleanup details the citywide response to storm damage after heavy rain, stressing drainage system upgrades, emergency services, transit disruptions, infrastructure repair, financial aid, insurance claims, and climate resilience planning for future weather.

 

Key Points

Toronto Flood Cleanup is the city's flood response, restoring infrastructure, aiding residents, and upgrading drainage.

✅ Emergency services and public works lead debris removal.

✅ Repairs to roads, bridges, transit, and utilities underway.

✅ Aid, insurance claims, and drainage upgrades prioritized.

 

Toronto is grappling with significant cleanup efforts following severe storms that unleashed heavy rains and caused widespread flooding across the city. The storms, which hit the area over the past week, have left a trail of damage and disruption, prompting both immediate response measures and longer-term recovery plans.

The intense rainfall began with a powerful storm system that moved through southern Ontario, with Sudbury Hydro crews working to reconnect service as the system pressed toward the GTA, delivering an unprecedented volume of water in a short period. The resulting downpours overwhelmed the city's drainage systems, leading to severe flooding in multiple neighborhoods. Streets, basements, and parks were inundated, with many areas experiencing water levels not seen in recent memory.

Emergency services were quickly mobilized to address the immediate impact of the floods. Toronto’s Fire Services, along with other first responders and skilled utility teams, as Ontario recently sent 200 workers to Florida to help restore power, were deployed to assist residents affected by the rising waters. Rescue operations were carried out to help people trapped in their homes or vehicles, and temporary shelters were set up for those displaced by the flooding.

The storm's impact was felt across various sectors of the city. Public transportation services were disrupted, as strong gusts led to significant power outages in parts of the region, with numerous subway stations and bus routes affected by the high water levels. Major roads were closed due to flooding, causing significant traffic delays and affecting daily commutes for many residents. Local businesses also faced challenges, with some forced to close their doors as a result of the water damage.

The city's infrastructure bore the brunt of the storm's fury. Several key infrastructure components, including roads, bridges, and utilities, suffered damage. The city's water treatment plants and sewage systems were stressed by the volume of water, raising concerns about potential contamination and the need for extensive maintenance and repair work.

In the wake of the flooding, the Toronto Municipal Government has launched a comprehensive cleanup and recovery effort. The city's Public Works Department is spearheading the operation, focusing on clearing debris, repairing damaged infrastructure, and restoring essential services, as Hydro One crews restore power to hundreds of thousands across Ontario. Teams of workers are diligently addressing the damage to roads and bridges, ensuring that they are safe for use and functioning properly.

Efforts are also underway to assist residents and businesses affected by the flooding. Financial aid and support programs are being implemented to help those who have suffered property damage or loss, including customers affected by Toronto power outages as repairs continue. The city is working closely with insurance companies to facilitate claims and provide relief to those in need.

In addition to the immediate cleanup, there is a heightened focus on evaluating and improving the city's flood management systems. The recent storms have highlighted vulnerabilities in Toronto’s infrastructure, prompting calls for enhanced flood prevention measures. City officials and urban planners are assessing the current drainage systems and exploring ways to bolster their capacity to handle future extreme weather events.

The storms have also sparked discussions about the broader implications of climate change and its impact on urban areas. Experts suggest that increasingly severe weather events, including heavy rainfall and flooding, may become more common, as seen with Houston's extended power outage after severe storms, as global temperatures rise. This has led to a call for more resilient and adaptable infrastructure to better withstand such events.

Community organizations and volunteers have played a vital role in the recovery process. Local groups have come together to support their neighbors, providing assistance with cleanup efforts, distributing supplies, and offering emotional support to those affected by the disaster. Their contributions underscore the importance of community solidarity in times of crisis.

As Toronto works towards recovery, there is a clear recognition of the need for a comprehensive strategy to address both the immediate and long-term challenges posed by severe weather events. The city’s response will involve not only repairing the damage caused by this storm but also investing in infrastructure improvements, drawing lessons from London power outage disruption cases to harden critical systems, and adopting measures to mitigate the impact of future floods.

In summary, the severe storms that recently struck Toronto have led to widespread flooding and significant disruption across the city. The immediate response has involved extensive cleanup efforts, damage assessment, and support for affected residents and businesses. Looking ahead, Toronto faces the challenge of enhancing its flood management systems and preparing for the potential impacts of climate change. The collective efforts of emergency services, city officials, and community members will be crucial in ensuring a swift recovery and building resilience against future storms.

 

Related News

View more

Philippines Reaffirms Clean Energy Commitment at APEC Summit

Philippines Clean Energy Commitment underscores APEC-aligned renewables, energy transition, and climate resilience, backed by policy incentives, streamlined regulation, technology transfer, and public-private investments to boost energy security, jobs, and sustainable growth.

 

Key Points

It is the nation's pledge to scale renewables and build climate resilience through APEC-aligned energy policy.

✅ Policy incentives, PPPs, and streamlined permits

✅ Grid upgrades, storage, and smart infrastructure

✅ Regional cooperation on tech transfer and capacity building

 

At the recent Indo-Pacific Economic Cooperation (APEC) Summit, the Philippines reiterated its dedication to advancing clean energy initiatives as part of its sustainable development agenda. This reaffirmation underscores the country's commitment to mitigating climate change impacts, promoting energy security, and fostering economic resilience through renewable energy solutions, with insights from an IRENA study on the power crisis informing policy direction.

Strategic Goals and Initiatives

During the summit, Philippine representatives highlighted strategic goals aimed at enhancing clean energy adoption and sustainability practices. These include expanding renewable energy infrastructure, accelerating energy transition efforts toward 100% renewables targets, and integrating climate resilience into national development plans.

Policy Framework and Regulatory Support

The Philippines has implemented a robust policy framework to support clean energy investments and initiatives. This includes incentives for renewable energy projects, streamlined regulatory processes, and partnerships with international stakeholders, such as ADFD-IRENA funding initiatives, to leverage expertise and resources in advancing sustainable energy solutions.

Role in Regional Cooperation

As an active participant in regional economic cooperation, the Philippines collaborates with APEC member economies to promote knowledge sharing, technology transfer, and capacity building in renewable energy development, as over 30% of global electricity is now generated from renewables, reinforcing the momentum. These partnerships facilitate collective efforts to address energy challenges and achieve mutual sustainability goals.

Economic and Environmental Benefits

Investing in clean energy not only reduces greenhouse gas emissions but also stimulates economic growth and creates job opportunities in the renewable energy sector. The Philippines recognizes the dual benefits of transitioning to cleaner energy sources, with projects like the Aboitiz geothermal financing award illustrating private-sector momentum, contributing to long-term economic stability and environmental stewardship.

Challenges and Opportunities

Despite progress, the Philippines faces challenges such as energy access disparities, infrastructure limitations, and financing constraints in scaling up clean energy projects, amid regional signals like India's solar slowdown and coal resurgence that underscore transition risks. Addressing these challenges requires innovative financing mechanisms, public-private partnerships, and community engagement to ensure inclusive and sustainable development.

Future Outlook

Moving forward, the Philippines aims to accelerate clean energy deployment through strategic investments, technology innovation, and policy coherence, aligning with the U.S. clean energy market trajectory toward majority share to capture emerging opportunities. Embracing renewable energy as a cornerstone of its economic strategy positions the country to attract investments, enhance energy security, and achieve resilience against global energy market fluctuations.

Conclusion

The Philippines' reaffirmation of its commitment to clean energy at the APEC Summit underscores its leadership in promoting sustainable development and addressing climate change challenges. By prioritizing renewable energy investments and fostering regional cooperation, the Philippines aims to build a resilient energy infrastructure that supports economic growth and environmental sustainability. As the country continues to navigate its energy transition journey, collaboration and innovation will be key in realizing a clean energy future that benefits present and future generations.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Group to create Canadian cyber standards for electricity sector IoT devices

Canadian Industrial IoT Cybersecurity Standards aim to unify device security for utilities, smart grids, SCADA, and OT systems, aligning with NERC CIP, enabling certification, trust marks, compliance testing, and safer energy sector deployments.

 

Key Points

National standards to secure industrial IoT for utilities and grids, enabling certification and NERC CIP alignment.

✅ Aligns with NERC CIP and NIST frameworks for energy sector security

✅ Defines certification, testing tools, and a trusted device repository

✅ Enhances OT, SCADA, and smart grid resilience against cyber threats

 

The Canadian energy sector has been buying Internet-connected sensors for monitoring a range of activities in generating plants, distribution networks facing harsh weather risks and home smart meters for several years. However, so far industrial IoT device makers have been creating their own security standards for devices, leaving energy producers and utilities at their mercy.

The industry hopes to change that by creating national cybersecurity standards for industrial IoT devices, with the goal of improving its ability to predict, prevent, respond to and recover from cyber threats, such as emerging ransomware attacks across the grid.

To help, the federal government today announced an $818,000 grant support a CIO Strategy Council project oversee the setting of standards.

In an interview council executive director Keith Jansa said the money will help a three-year effort that will include holding a set of cross-country meetings with industry, government, academics and interest groups to create the standards, tools to be able to test devices against the standards and the development of product repository of IoT safe devices companies can consult before making purchases.

“The challenge is there are a number of these devices that will be coming online over the next few years,” Jansa said. “IoT devices are designed for convenience and not for security, so how do you ensure that a technology an electricity utility secures is in fact safeguarded against cyber threats? Currently, there is no associated trust mark or certification that gives confidence associated with these devices.”

He also said the council will work with the North American Electric Reliability Corporation (NERC), which sets North American-wide utility safety procedural standards and informs efforts on protecting the power grid across jurisdictions. The industrial IoT standards will be product standards.

According to Robert Wong, vice-president and CIO of Toronto Hydro, all the big provincial utilities are subject to adhering to NERC CIP standards which have requirements for both cyber and physical security. Ontario is different from most provinces in that it has local distribution companies — like Toronto Hydro — which buy electricity in bulk and resell it to customers.  These LDCs don’t own or operate critical infrastructure and therefore don’t have to follow the NERC CIP standards.

Regional reforms, such as regulatory changes in Atlantic Canada, aim to bring greener power options to the grid.

Electricity is considered around the world as one of a country’s critical national infrastructure. Threats to the grid can be used for ransom or by a country for political pressure. Ukraine had its power network knocked offline in 2015 and 2016 by what were believed to be Russian-linked attackers operating against utilities.

All the big provincial utilities operate “critical infrastructure” and are subject to adhering to NERC CIP (critical infrastructure protection) standards, which have requirements for both cyber and physical security, as similar compromises at U.S. electric utilities have highlighted recently.  There are audited on a regular basis for compliance and can face hefty fines if they fail to meet the requirements.  The LDCs in Ontario don’t own or operate “critical infrastructure” and therefore are not required to adopt NERC CIP standards (at least for now).

The CIO Strategy Council is a forum for chief information officers that is helping set standards in a number of areas. In January it announced a partnership with the Internet Society’s Canada Chapter to create standards of practice for IoT security for consumer devices. As part of the federal government’s updated national cybersecurity strategy it is also developing a national cybersecurity standard for small and medium-sized businesses. That strategy would allow SMBs to advertise to customers that they meet minimum security requirements.

“The security of Canadians and our critical infrastructure is paramount,” federal minister of natural resources Seamus O’Regan said in a statement with today’s announcement. “Cyber attacks are becoming more common and dangerous. That’s why we are supporting this innovative project to protect the Canadian electricity sector.”

The announcement was welcomed by Robert Wong, Toronto Hydro’s vice-president and CIO. “Any additional investment towards strengthening the safeguards against cyberattacks to Canada’s critical infrastructure is definitely good news.  From the perspective of the electricity sector, the convergence of IT and OT (operational technology) has been happening for some time now as the traditional electricity grid has been transforming into a Smart Grid with the introduction of smart meters, SCADA systems, electronic sensors and monitors, smart relays, intelligent automated switching capabilities, distributed energy resources, and storage technologies (batteries, flywheels, compressed air, etc.).

“In my experience, many OT device and system manufacturers and vendors are still lagging the traditional IT vendors in incorporating Security by Design philosophies and effective security features into their products.  This, in turn, creates greater risks and challenges for utilities to protecting their critical infrastructures and ensuring a reliable supply of electricity to its customers.”

The Ontario Energy Board, which regulates the industry in the province, has led an initiative for all utilities to adopt the National Institute of Standards and Technology (NIST) Cybersecurity Framework, along with the ES-C2M2 maturity and Privacy By Design models, he noted.  Toronto Hydro has been managing its cybersecurity practice in adherence to these standards, as the city addresses growing electricity needs as well, he said.

“Other jurisdictions, such as Israel, have invested heavily on a national level in developing its cybersecurity capabilities and are seen as global leaders.  I am confident that given the availability of talent, capabilities and resources in Canada (especially around the GTA) if we get strong support and leadership at a federal level we can also emerge as a leader in this area as well.”

 

Related News

View more

Bitcoin consumes 'More electricity than Argentina' - Cambridge

Bitcoin energy consumption is driven by mining electricity demand, with TWh-scale power use, carbon footprint concerns, and Cambridge estimates. Rising prices incentivize more hardware; efficiency gains and renewables adoption shape sustainability outcomes.

 

Key Points

Bitcoin energy consumption is mining's electricity use, driven by price, device efficiency, and energy mix.

✅ Cambridge tool estimates ~121 TWh annual usage

✅ Rising BTC price incentivizes more mining hardware

✅ Efficiency, renewables, and costs shape footprint

 

"Mining" for the cryptocurrency is power-hungry, with power curtailments reported during heat waves, involving heavy computer calculations to verify transactions.

Cambridge researchers say it consumes around 121.36 terawatt-hours (TWh) a year - and is unlikely to fall unless the value of the currency slumps, even as Americans use less electricity overall.

Critics say electric-car firm Tesla's decision to invest heavily in Bitcoin undermines its environmental image.

The currency's value hit a record $48,000 (£34,820) this week. following Tesla's announcement that it had bought about $1.5bn bitcoin and planned to accept it as payment in future.

But the rising price offers even more incentive to Bitcoin miners to run more and more machines.

And as the price increases, so does the energy consumption, according to Michel Rauchs, researcher at The Cambridge Centre for Alternative Finance, who co-created the online tool that generates these estimates.

“It is really by design that Bitcoin consumes that much electricity,” Mr Rauchs told BBC’s Tech Tent podcast. “This is not something that will change in the future unless the Bitcoin price is going to significantly go down."

The online tool has ranked Bitcoin’s electricity consumption above Argentina (121 TWh), the Netherlands (108.8 TWh) and the United Arab Emirates (113.20 TWh) - and it is gradually creeping up on Norway (122.20 TWh).

The energy it uses could power all kettles used in the UK, where low-carbon generation stalled in 2019, for 27 years, it said.

However, it also suggests the amount of electricity consumed every year by always-on but inactive home devices in the US alone could power the entire Bitcoin network for a year, and in Canada, B.C. power imports have helped meet demand.

Mining Bitcoin
In order to "mine" Bitcoin, computers - often specialised ones - are connected to the cryptocurrency network.

They have the job of verifying transactions made by people who send or receive Bitcoin.

This process involves solving puzzles, which, while not integral to verifying movements of the currency, provide a hurdle to ensure no-one fraudulently edits the global record of all transactions.

As a reward, miners occasionally receive small amounts of Bitcoin in what is often likened to a lottery.

To increase profits, people often connect large numbers of miners to the network - even entire warehouses full of them, as seen with a Medicine Hat bitcoin operation backed by an electricity deal.

That uses lots of electricity because the computers are more or less constantly working to complete the puzzles, prompting some utilities to consider pauses on new crypto loads in certain regions.

The University of Cambridge tool models the economic lifetime of the world's Bitcoin miners and assumes that all the Bitcoin mining machines worldwide are working with various efficiencies.

Using an average electricity price per kilowatt hour ($0.05) and the energy demands of the Bitcoin network, it is then possible to estimate how much electricity is being consumed at any one time, though in places like China's power sector data can be opaque.
 

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified