Officials say criminals are posing as city workers to gain access to homes

By Knight Ridder Tribune


NFPA 70e Training

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$199
Coupon Price:
$149
Reserve Your Seat Today
Homeowners beware.

Thieves posing as utility workers are targeting residents across Danville and the surrounding area, said Joe King, assistant city manager for utilities. King said people claiming to be working on the behalf of Danville Utilities are knocking on doors and telling people that their utility or energy consumption is running unusually high.

The impostors then offer to inspect the home or apartment for free to find out why energy costs are so high. They walk through the home, but may actually be casing the home for a future burglary, or they may steal something, officials said. Using the ruse that they're conducting an energy audit might make sense to customers, but the utility company doesn't even do energy audits.

"We do not have an energy audit program or an energy inspection team or anything like that," said Kevin Martin, key accounts manager for Danville Utilities. "Anyone showing up at a door saying that they're with an audit or inspection team is suspect," he said. "For most of the services Danville Utilities offers, the utility service does not go in the home.

"The only time a Danville utility worker would have a reason to be in the home is if a customer calls us to come out and light a pilot light and we schedule a time to meet you. There's no door-to-door soliciting or selling services." If a Danville utility worker ever did show up at a customer's door they'd be in uniform, with an identity badge and driving a clearly marked city vehicle, King said. "Scam artists rely on people believing they are a person with some authority when they do this," he said. "These guys are counting on people thinking they are legitimate. They manipulate people into thinking they have nothing to fear." Customers also may find an independent contractor at their door selling windows or other services and claiming to be authorized by Danville Utilities to sell their product. "We don't do that," King said of contractors selling products. "And, we never ask for entry into anybody's house." Not everyone falls for the energy audit scam. But the elderly and those not familiar with how the utility company works may fall victim to the ruse.

Some people get the feeling that something's not quite right, or they may feel fearful when pressured to let a stranger in their home and let the person in anyway. "If you feel threatened in any way, call the police first," King said. "There is nobody working for the city or representing the city that is doing this (audits)." He said after calling the police, victims of the scam should call the utility company's customer service department. At least one of these so-called home surveys has turned into a theft, King said. One elderly Pittsylvania County resident on Franklin Turnpike reported her purse was stolen during a fake energy audit.

King said the woman allowed a man claiming to be with the utility company into her home to do an energy audit. He walked through the house with the woman and then told the woman that Danville Utilities would mail her a copy of his report with advice on hat conservation measures to use. He then left. It was only later that the woman discovered her purse was missing. Danville Utilities does have information about energy conservation they can send customers, but they do not do not inspect homes at all, Martin said. King and Martin also noted that being a city employee does not give anyone the right to come into a person's home.

Related News

Ontario will refurbish Pickering B NGS

Pickering nuclear refurbishment will modernize Ontario's Candu reactors at Pickering B, sustaining 2,000 MW of clean electricity, aiding net-zero goals, and aligning with Ontario Power Generation plans and Canadian Nuclear Safety Commission reviews.

 

Key Points

An 11-year overhaul of Pickering B Candu reactors to extend life, keep 2,000 MW online, and back Ontario net-zero grid.

✅ 11-year project; 11,000 annual jobs; $19.4B GDP impact.

✅ Refurbishes four Pickering B Candu units; maintains 2,000 MW.

✅ Requires Canadian Nuclear Safety Commission license approvals.

 

The Ontario government has announced its intention to pursue a Pickering refurbishment at the venerable nuclear power station, which has been operational for over fifty years. This move could extend the facility's life by another 30 years.

This decision is timely, as Ontario anticipates a significant surge in electricity demand and a growing electricity supply gap in the forthcoming years. Additionally, all provinces are grappling with new federal mandates for clean electricity, necessitating future power plants to achieve net-zero carbon emissions.

Todd Smith, the Energy Minister, is expected to endorse Ontario Power Generation's proposal for the plant's overhaul, as per a preliminary version of a government press release.

The renovation will focus on four Candu reactors, known collectively as Pickering B, which were originally commissioned in the early 1980s. This upgrade is projected to continue delivering 2,000 megawatts of power, equivalent to the current output of these units.

According to the press release, the project will span 11 years, create approximately 11,000 annual jobs, and contribute $19.4 billion to Ontario's GDP. However, the total budget for the project remains unspecified.

The project follows the ongoing refurbishment of four units at the nearby Darlington nuclear station, which is more than halfway completed with a budget of $12.8 billion.

The proposal awaits the Canadian Nuclear Safety Commission's approval, and officials face extension request timing considerations before key deadlines.

The Commission is also reviewing a prior request from OPG to extend the operational license of the existing Pickering B units until 2026. This extension would allow the plant to safely continue operating until the commencement of its renovation, pending approval.

 

Ontario's Ambitious Nuclear Strategy

The announcement regarding Pickering is part of Ontario's broader clean energy plan for an unprecedented expansion of nuclear power in Canada.

Last summer, the province announced its intention to nearly double the output at Bruce Power, currently the world's largest nuclear generating station.

Additionally, Ontario revealed SMR plans to construct three more alongside the existing project at Darlington. These reactors are expected to supply enough electricity to power around 1.2 million homes.

Discussions about revitalizing the Pickering facility began in 2022, after the station had been slated to close as planned amid debate, with Ontario Power Generation submitting a feasibility report to the government last summer.

The Ford government emphasized the necessity of this nuclear expansion to meet the increasing electricity demands anticipated from the auto sector's shift to electric vehicles, the steel industry's move away from coal-fired furnaces, and the growing population in Ontario.

Ontario's capability to attract major international car manufacturers like Volkswagen and Stellantis to produce electric vehicles and batteries is partly attributed to the fact that 90% of the province's electricity comes from non-fossil fuel sources.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Japanese utilities buy into vast offshore wind farm in UK

Japan Offshore Wind Investment signals Japanese utilities entering UK offshore wind, as J-Power and Kansai Electric buy into Innogy's Triton Knoll, leveraging North Sea expertise, 9.5MW turbines, and 15-year fixed-rate contracts.

 

Key Points

Japanese utilities buying UK offshore wind stakes to import expertise, as J-Power and Kansai join Innogy's Triton Knoll.

✅ $900M deal: J-Power 25%, Kansai Electric ~16% in Innogy unit

✅ Triton Knoll: 860MW, up to 90 9.5MW turbines, 15-year fixed PPA

✅ Goal: Transfer North Sea expertise to develop Japan offshore wind

 

Two of Japan's biggest power companies will buy around 40% of a German-owned developer of offshore wind farms in the U.K., seeking to learn from Britain's lead in this sector, as highlighted by a UK offshore wind milestone this week, and bring the know-how back home.

Tokyo-based Electric Power Development, better known as J-Power, will join Osaka regional utility Kansai Electric Power in investing in a unit of Germany's Innogy.

The deal, estimated to be worth around $900 million, will give J-Power a 25% stake and Kansai Electric a roughly 16% share. It will mark the first investment in an offshore wind project by Japanese power companies, as other markets shift strategies, with Poland backing wind over nuclear signaling broader momentum.

Innogy plans to start up the 860-megawatt Triton Knoll offshore wind project -- one of the biggest of its kind in the world -- in the North Sea in 2021. The vast installation will have up to 90 9.5MW turbines and sell its output to local utilities under a 15-year fixed-rate contract.

J-Power, which supplies mainly fossil-fuel-based electricity to Japanese regional utilities, will set up a subsidiary backed by the government-run Development Bank of Japan to participate in the Innogy project. Engineers will study firsthand construction and maintenance methods.

While land-based wind turbines are proliferating worldwide, offshore wind farms have progressed mainly in Europe, though U.S. offshore wind competitiveness is improving in key markets. Installed capacity totaled more than 18,000MW at the end of 2017, which at maximum capacity can produce as much power as 18 nuclear reactors.

Japan has hardly any offshore wind farms in commercial operation, and has little in the way of engineering know-how in this field or infrastructure for linking such installations to the land power grid, with a recent Japan grid blackout analysis underscoring these challenges. But there are plans for a total of 4,000MW of offshore wind power capacity, including projects under feasibility studies.

J-Power set up a renewable energy division in June to look for opportunities to expand into wind and geothermal energy in Japan, and efforts like a Japan hydrogen energy system are emerging to support decarbonization. Kansai Electric also seeks know-how for increasing its reliance on renewable energy, even as it hurries to restart idled nuclear reactors.

They are not the only Japanese investors is in this field. In Asia, trading house Marubeni will invest in a Taiwanese venture with plans for a 600MW offshore wind farm.

 

Related News

View more

Are Norwegian energy firms ‘best in class’ for environmental management?

CO2 Tax for UK Offshore Energy Efficiency can accelerate adoption of aero-derivative gas turbines, flare gas recovery, and combined cycle power, reducing emissions on platforms like Equinor's Mariner and supporting net zero goals.

 

Key Points

A carbon price pushing operators to adopt efficient turbines, flare recovery, and combined cycle to cut emissions.

✅ Aero-derivative turbines beat industrial units on efficiency

✅ Flare gas recovery cuts routine flaring and fuel waste

✅ Combined cycle raises efficiency and lowers emissions

 

By Tom Baxter

The recent Energy Voice article from the Equinor chairman concerning the Mariner project heralding a ‘significant point of reference’ for growth highlighted the energy efficiency achievements associated with the platform.

I view energy efficiency as a key enabler to net zero, and alongside this the UK must start large-scale storage to meet system needs; it is a topic I have been involved with for many years.

As part of my energy efficiency work, I investigated Norwegian practices and compared them with the UK.

There were many differences, here are three;


1. Power for offshore installations is usually supplied from gas turbines burning fuel from the oil and gas processing plant, and even as the UK's offshore wind supply accelerates, installations convert that to electricity or couple the gas turbine to a machine such as a gas compressor.

There are two main generic types of gas turbine – aero-derivative and industrial. As the name implies aero-derivatives are aviation engines used in a static environment. Aero-derivative turbines are designed to be energy efficient as that is very import for the aviation industry.

Not so with industrial type gas turbines; they are typically 5-10% less efficient than a comparable aero-derivative.

Industrial machines do have some advantages – they can be cheaper, require less frequent maintenance, they have a wide fuel composition tolerance and they can be procured within a shorter time frame.

My comparison showed that aero-derivative machines prevailed in Norway because of the energy efficiency advantages – not the case in the UK where there are many more offshore industrial gas turbines.

Tom Baxter is visiting professor of chemical engineering at Strathclyde University and a retired technical director at Genesis Oil and Gas Consultants


2. Offshore gas flaring is probably the most obvious source of inefficient use of energy with consequent greenhouse gas emissions.

On UK installations gas is always flared due to the design of the oil and gas processing plant.

Though not a large quantity of gas, a continuous flow of gas is routinely sent to flare from some of the process plant.

In addition the flare requires pilot flames to be maintained burning at all times and, while Europe explores electricity storage in gas pipes, a purge of hydrocarbon gas is introduced into the pipes to prevent unsafe air ingress that could lead to an explosive mixture.

On many Norwegian installations the flare system is designed differently. Flare gas recovery systems are deployed which results in no flaring during continuous operations.

Flare gas recovery systems improve energy efficiency but they are costly and add additional operational complexity.


3. Returning to gas turbines, all UK offshore gas turbines are open cycle – gas is burned to produce energy and the very hot exhaust gases are vented to the atmosphere. Around 60 -70% of the energy is lost in the exhaust gases.

Some UK fields use this hot gas as a heat source for some of the oil and gas treatment operations hence improving energy efficiency.

There is another option for gas turbines that will significantly improve energy efficiency – combined cycle, and in parallel plans for nuclear power under the green industrial revolution aim to decarbonise supply.

Here the exhaust gases from an open cycle machine are taken to a separate turbine. This additional turbine utilises exhaust heat to produce steam with the steam used to drive a second turbine to generate supplementary electricity. It is the system used in most UK power stations, even as UK low-carbon generation stalled in 2019 across the grid.

Open cycle gas turbines are around 30 – 40% efficient whereas combined cycle turbines are typically 50 – 60%. Clearly deploying a combined cycle will result in a huge greenhouse gas saving.

I have worked on the development of many UK oil and gas fields and combined cycle has rarely been considered.

The reason being is that, despite the clear energy saving, they are too costly and complex to justify deploying offshore.

However that is not the case in Norway where combined cycle is used on Oseberg, Snorre and Eldfisk.

What makes the improved Norwegian energy efficiency practices different from the UK – the answer is clear; the Norwegian CO2 tax.

A tax that makes CO2 a significant part of offshore operating costs.

The consequence being that deploying energy efficient technology is much easier to justify in Norway when compared to the UK.

Do we need a CO2 tax in the UK to meet net zero – I am convinced we do. I am in good company. BP, Shell, ExxonMobil and Total are supporting a carbon tax.

Not without justification there has been much criticism of Labour’s recent oil tax plans, alongside proposals for state-owned electricity generation that aim to reshape the power market.

To my mind Labour’s laudable aims to tackle the Climate Emergency would be much better served by supporting a CO2 tax that complements the UK's coal-free energy record by strengthening renewable investment.

 

Related News

View more

Why California's Climate Policies Are Causing Electricity Blackouts

California Rolling Blackouts expose grid reliability risks amid a heatwave, as CAISO curtails power while solar output fades at sunset, wind stalls, and scarce natural gas and nuclear capacity plus PG&E issues strain imports.

 

Key Points

Grid outages during heatwaves from low reserves, fading solar, weak wind, and limited firm capacity.

✅ Heatwave demand rose as solar output dropped at sunset

✅ Limited imports and gas, nuclear shortfalls cut reserves

✅ Policy, pricing, and maintenance gaps increased outage risk

 

Millions of Californians were denied electrical power and thus air conditioning during a heatwave, raising the risk of heatstroke and death, particularly among the elderly and sick. 

The blackouts come at a time when people, particularly the elderly, are forced to remain indoors due to Covid-19, and as later heat waves would test the grid again statewide.

At first, the state’s electrical grid operator last night asked customers to voluntarily reduce electricity use. But after lapses in power supply pushed reserves to dangerous levels it declared a “Stage 3 emergency” cutting off power to people across the state at 6:30 pm.

The immediate reason for the black-outs was the failure of a 500-megawatt power plant and an out-of-service 750-megawatt unit not being available. “There is nothing nefarious going on here,” said a spokeswoman for California Independent System Operator (CAISO). “We are just trying to run the grid.”

But the underlying reasons that California is experiencing rolling black-outs for the second time in less than a year stem from the state’s climate policies, which California policymakers have justified as necessary to prevent deaths from heatwaves, and which it is increasingly exporting to Western states as a model.

In October, Pacific Gas and Electric cut off power to homes across California to avoid starting forest fires after reports that its power lines may have started fires in recent seasons. The utility and California’s leaders had over the previous decade diverted billions meant for grid maintenance to renewables. 

And yesterday, California had to impose rolling blackouts because it had failed to maintain sufficient reliable power from natural gas and nuclear plants, or pay in advance for enough guaranteed electricity imports from other states.

It may be that California’s utilities and their regulator, the California Public Utilities Commission, which is also controlled by Gov. Newsom, didn’t want to spend the extra money to guarantee the additional electricity out of fears of raising California’s electricity prices even more than they had already raised them.

California saw its electricity prices rise six times more than the rest of the United States from 2011 to 2019, helping explain why electricity prices are soaring across the state, due to its huge expansion of renewables. Republicans in the U.S. Congress point to that massive increase to challenge justifications by Democrats to spend $2 trillion on renewables in the name of climate change.

Even though the cost of solar panels declined dramatically between 2011 and 2019, their unreliable and weather-dependent nature meant that they imposed large new costs in the form of storage and transmission to keep electricity as reliable. California’s solar panels and farms were all turning off as the blackouts began, with no help available from the states to the East already in nightfall.

Electricity from solar goes away at the very moment when the demand for electricity rises. “The peak demand was steady in late hours,” said the spokesperson for CAISO, which is controlled by Gov. Gavin Newsom, “and we had thousands of megawatts of solar reducing their output as the sunset.”

The two blackouts in less than a year are strong evidence that the tens of billions that Californians have spent on renewables come with high human, economic, and environmental costs.

Last December, a report by done for PG&E concluded that the utility’s customers could see blackouts double over the next 15 years and quadruple over the next 30.

California’s anti-nuclear policies also contributed to the blackouts. In 2013, Gov. Jerry Brown forced a nuclear power plant, San Onofre, in southern California to close.

Had San Onofre still been operating, there almost certainly would not have been blackouts on Friday as the reserve margin would have been significantly larger. The capacity of San Onofre was double that of the lost generation capacity that triggered the blackout.

California's current and former large nuclear plants are located on the coast, which allows for their electricity to travel shorter distances, and through less-constrained transmission lines than the state’s industrial solar farms, to get to the coastal cities where electricity is in highest demand.

There has been very little electricity from wind during the summer heatwave in California and the broader western U.S., further driving up demand. In fact, the same weather pattern, a stable high-pressure bubble, is the cause of heatwaves, since it brought very low wind for days on end along with very high temperatures.

Things won’t be any better, and may be worse, in the winter, with a looming shortage as it produces far less solar electricity than the summer. Solar plus storage, an expensive attempt to fix problems like what led to this blackout, cannot help through long winters of low output.

California’s electricity prices will continue to rise if it continues to add more renewables to its grid, and goes forward with plans to shut down its last nuclear plant, Diablo Canyon, in 2025.

Had California spent an estimated $100 billion on nuclear instead of on wind and solar, it would have had enough energy to replace all fossil fuels in its in-state electricity mix.

To manage the increasingly unreliable grid, California will either need to keep its nuclear plant operating, build more natural gas plants, underscoring its reliance on fossil fuels for reliability, or pay ever more money annually to reserve emergency electricity supplies from its neighbors.

After the blackouts last October, Gov. Newsom attacked PG&E Corp. for “greed and mismanagement” and named a top aide, Ana Matosantos, to be his “energy czar.” 

“This is not the new normal, and this does not take 10 years to solve,” Newsom said. “The entire system needs to be reimagined.”

 

Related News

View more

DOE Announces $34 Million to Improve America?s Power Grid

DOE GOPHURRS Grid Undergrounding accelerates ARPA-E innovations to modernize the power grid, boosting reliability, resilience, and security via underground power lines, AI-driven surveying, robotic tunneling, and safer cable splicing for clean energy transmission and distribution.

 

Key Points

A DOE-ARPA-E program funding undergrounding tech to modernize the grid and improve reliability and security.

✅ $34M for 12 ARPA-E projects across 11 states

✅ Underground power lines to boost reliability and resilience

✅ Robotics, AI, and safer splicing to cut costs and risks

 

The U.S. Department of Energy (DOE) has earmarked $34 million for 12 innovative projects across 11 states to bolster and modernize the nation’s power grid, complementing efforts like a Washington state infrastructure grant announced to strengthen resilience.

Under the Grid Overhaul with Proactive, High-speed Undergrounding for Reliability, Resilience, and Security (GOPHURRS) program, this funding is focused on developing efficient and secure undergrounding technologies. The initiative is aligned with President Biden’s vision to strengthen America's energy infrastructure and advance smarter electricity infrastructure priorities, thereby creating jobs, enhancing energy and national security, and advancing towards a 100% clean electricity grid by 2035.

U.S. Secretary of Energy Jennifer M. Granholm emphasized the criticality of modernizing the power grid to facilitate a future powered by clean energy, including efforts to integrate more solar into the grid nationwide, thus reducing energy costs and bolstering national security. This development, she noted, is pivotal in bringing the grid into the 21st Century.

The U.S. electric power distribution system, comprising over 5.5 million line miles and over 180 million power poles, is increasingly vulnerable to weather-related damage, contributing to a majority of annual power outages. Extreme weather events, intensified by climate change impacts across the nation, exacerbate the frequency and severity of these outages. Undergrounding power lines is an effective measure to enhance system reliability for transmission and distribution grids.

Managed by DOE’s Advanced Research Projects Agency-Energy (ARPA-E), the newly announced projects include contributions from small and large businesses, national labs, and universities. These initiatives are geared towards developing technologies that will lower costs, expedite undergrounding operations, and enhance safety. Notable projects involve innovations like Arizona State University’s water-jet construction tool for deploying electrical cables underground, GE Vernova Advanced Research’s robotic worm tunnelling construction tool, and Melni Technologies’ redesigned medium-voltage power cable splice kits.

Other significant projects include Oceanit’s subsurface sensor system for avoiding utility damage during undergrounding and Pacific Northwest National Laboratory’s AI system for processing geophysical survey data. Prysmian Cables and Systems USA’s project focuses on a hands-free power cable splicing machine to improve network reliability and workforce safety, complementing state efforts like California's $500 million grid investment to upgrade infrastructure.

Complete descriptions of these projects can be found on the ARPA-E website, while a recent grid report card highlights challenges these efforts aim to address.

ARPA-E’s mission is to advance clean energy technologies with high potential and impact, playing a strategic role in America’s energy security, including military preparedness for grid cyberattacks as a priority. This commitment ensures the U.S. remains a global leader in developing and deploying advanced clean energy technologies.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified