Wal-Mart Goes Solar

By Fortune


Electrical Testing & Commissioning of Power Systems

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$599
Coupon Price:
$499
Reserve Your Seat Today
In one of the biggest solar deals to date, Wal-Mart will buy 22 million kilowatt-hours of greenhouse gas-free electricity produced from solar arrays to be installed as a pilot project at 22 stores in California and Hawaii.

The retail giant estimates the move will reduce planet-warming emissions by 6,500 to 10,000 metric tons a year.

The solar systems will be installed by SunPower's (SPWR) PowerLight subsidiary at seven California stores, by SunEdison at four stores in California and four in Hawaii, and by BP Solar (BP) at seven stores in the Golden State. Wal-Mart (WMT) will buy electricity produced by the arrays at market or below market rates and retain ownership of any Renewable Credits.

RECs potentially could be worth a bundle if they're allowed to be traded on carbon markets under consideration in California and Hawaii. For instance, a company that exceeds its limit on greenhouse gas emissions could buy Wal-Mart RECs, which represent CO2 avoided through the use of solar energy. Hawaii recently became the second state after California to pass a cap on greenhouse gas emissions.

The solar companies will arrange financing and installation of the arrays and retain ownership. In SunEdison's case, the Maryland company will finance, operate and own the solar arrays it installs for Wal-Mart. A SunPower spokesperson told reporters that the San Jose company is working with a third party to finance the deal but hasn't finalized the arrangements.

When the power purchase agreements expires, Wal-Mart will have the option to renew the deals, move the equipment to other stores or buy the solar arrays. SunPower, which previously installed solar arrays at three other Wal-Mart stores, will build systems for seven stores to produce 4.6 megawatts of electricity. Each solar array will provide about a quarter of a store's power, according to SunPower.

Related News

Indian government takes steps to get nuclear back on track

India Nuclear Generation Shortfall highlights missed five-year plan targets due to uranium fuel scarcity, commissioning delays at Kudankulam, PFBR slippage, and PHWR equipment bottlenecks under IAEA safeguards and domestic supply constraints.

 

Key Points

A gap between planned and actual nuclear output due to fuel shortages, reactor delays, and first-of-a-kind hurdles.

✅ Fuel scarcity pre-2009-10 constrained unsafeguarded reactors.

✅ Kudankulam delays from protests, litigation, and remobilisation.

✅ FOAK PHWR equipment bottlenecks and PFBR slippage.

 

A lack of available domestically produced nuclear fuel and delays in constructing and commissioning nuclear power plants, including first-of-a-kind plants and the Prototype Fast Breeder Reactor (PFBR), meant that India failed to meet its nuclear generation targets under the governmental plans over the decade to 2017, even as global project milestones were being recorded elsewhere.

India's nuclear generation target under its 11th five-year plan, covering the period 2007-2012, was 163,395 million units (MUs) and the 12th five-year Plan (2012-17) was 241,748 MUs, Minister of state for the Department of Atomic Energy and the Prime Minister's Office Jitendra Singh told parliament on 6 February. Actual nuclear generation in those periods was 109,642 MUs and 183,488 MUs respectively, Singh said in a written answer to questions in the Lok Sabah.

Singh attributed the shortfall in generation to a lack of availability of the necessary quantities of domestically produced fuel during the three years before 2009-2010; delays to the commissioning of two 1000 MWe nuclear power plants at Kudankulam due to local protests and legal challenges; and delays in the completion of two indigenously designed pressurised heavy water reactors and the PFBR.

Kudankulam 1 and 2 are VVER-1000 pressurised water reactors (PWRs) supplied by Russia's Atomstroyexport under a Russian-financed contract. The units were built by Nuclear Power Corporation of India Ltd (NPCIL) and were commissioned and are operated by NPCIL under International Atomic Energy Agency (IAEA) safeguards, with supervision from Russian specialists, while China's nuclear program advanced on a steady development track in the same period. Construction of the units - the first PWRs to enter operation in India - began in 2002.

Singh said local protests resulted in the halt of commissioning work at Kudankulam for nine months from September 2011 to March 2012, when he said project commissioning had been at its peak. As a consequence, additional time was needed to remobilise the workforce and contractors, he said. Litigation by anti-nuclear groups, and compliance with supreme court directives, impacted commissioning in 2013, he said. Unit 1 entered commercial operation in December 2014 and unit 2 in April 2017.

Delays in the manufacture and supply by domestic industry of critical equipment for first-of-a-kind 700 MWe pressurised heavy water reactors -  Kakrapar units 3 and 4, and Rajasthan units 7 and 8 - has led to delays in the completion of those units, the minister said, as well as noting the delay in completion of the PFBR, which is being built at Kalpakkam by Bhavini. In answer to a separate question, Singh said the PFBR is in an "advance stage of integrated commissioning" and is "expected to approach first criticality by the year 2020."

Eight of India's operating nuclear power plants are not under IAEA safeguards and can therefore only use indigenously-sourced uranium. The other 14 units operate under IAEA safeguards and can use imported uranium. The Indian government has taken several measures to secure fuel supplies for reactors in operation and under construction, amid coal supply rationing pressures elsewhere in the power sector, concluding fuel supply contracts with several countries for existing and future reactors under IAEA Safeguards and by "augmentation" of fuel supplies from domestic sources, Singh said.

Kakrapar 3 and 4, with Kakrapar 3 criticality already reported, and Rajasthan 7 and 8 are all currently expected to enter service in 2022, according to World Nuclear Association information.

 

Joint venture discussions

In February 2016 the government amended the Atomic Energy Act to allow NPCIL to form joint venture companies with other public sector undertakings (PSUs) for involvement in nuclear power generation and possibly other aspects of the fuel cycle, reflecting green industrial strategies shaping future reactor waves globally. In answer to another question, Singh confirmed that NPCIL has entered into joint ventures with NTPC Limited (National Thermal Power Corporation, India's largest power company) and Indian Oil Corporation Limited. Two joint venture companies - Anushakti Vidhyut Nigam Limited and NPCIL-Indian Oil Nuclear Energy Corporation Limited - have been incorporated, and discussions on possible projects to be set up by the joint venture companies are in progress.

An exploratory discussion had also been held with Oil & Natural Gas Corporation, Singh said. Indian Railways - which has in the past been identified as a potential joint venture partner for NPCIL - had "conveyed that they were not contemplating entering into an MoU for setting up of nuclear power plants," Singh said.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Energy crisis: EU outlines possible gas price cap strategies

EU Gas Price Cap Strategies aim to curb inflation during an energy crisis by capping wholesale gas and electricity generation costs, balancing supply and demand, mitigating subsidies, and safeguarding supply security amid Russia-Ukraine shocks.

 

Key Points

Temporary EU measures to cap gas and power prices, curb inflation, manage demand, and protect supply security.

✅ Flexible temporary price limits to secure gas supplies

✅ Framework cap on gas for electricity generation with demand checks

✅ Risk: subsidies, higher demand, and market distortions

 

The European Commission has outlined possible strategies to cap gas prices as the bloc faces a looming energy crisis this winter. 

Member states are divided over the emergency measures designed to pull down soaring inflation amid Russia's war in Ukraine. 

One proposal is a temporary "flexible" limit on gas prices to ensure that Europe can continue to secure enough gas, EU energy commissioner Kadri Simson said on Tuesday. 

Another option could be an EU-wide "framework" for a price cap on gas used to generate electricity, which would be combined with measures to ensure gas demand does not rise as a result, she said.

EU leaders are meeting on Friday to debate gas price cap strategies amid warnings that Europe's energy nightmare could worsen this winter.

Last week, France, Italy, Poland and 12 other EU countries urged the Commission to propose a broader price cap targeting all wholesale gas trade. 

But Germany -- Europe's biggest gas buyer -- and the Netherlands are among those opposing electricity market reforms within the bloc.

Russia has slashed gas deliveries to Europe since its February invasion of Ukraine, with Moscow blaming the cuts on Western sanctions imposed in response to the invasion, as the EU advances a plan to dump Russian energy across the bloc.

Since then, the EU has agreed on emergency laws to fill gas storage and windfall profit levies to raise money to help consumers with bills. 

Price cap critics
One energy analyst told Euronews that an energy price cap was an "unchartered territory" for the European Union. 

The EU's energy sector is largely liberalised and operates under the fundamental rules of supply and demand, making rolling back electricity prices complex in practice.

"My impression is that member states are looking at prices and quantities in isolation and that's difficult because of economics," said Elisabetta Cornago, a senior energy researcher at the Centre for European Reform.

"It's hard to picture such a level of market intervention This is uncharted territory."

The energy price cap would "quickly start costing billions" because it would force governments to continually subsidise the difference between the real market price and the artificially capped price, another expert said. 

"If you are successful and prices are low and you still get gas, consumers will increase their demand: low price means high demand. Especially now that winter is coming," said Bram Claeys, a senior advisor at the Regulatory Assistance Project. 

 

Related News

View more

Why Is Central Asia Suffering From Severe Electricity Shortages?

Central Asia power shortages strain grids across Kazakhstan, Uzbekistan, Kyrgyzstan, Tajikistan, and Turkmenistan, driven by drought-hit hydropower, aging coal and gas plants, rising demand, cryptomining loads, and winter peak consumption risks.

 

Key Points

Regionwide blackouts from drought, aging plants and grids, rising demand, and winter peaks stressing Central Asia.

✅ Drought slashes hydropower in Kyrgyzstan, Tajikistan, Uzbekistan

✅ Aging coal and gas TPPs and weak grids cause frequent outages

✅ Cryptomining loads and winter heating spike demand and stress supply

 

Central Asians from western Kazakhstan to southern Tajikistan are suffering from power and energy shortages that have caused hardship and emergency situations affecting the lives of millions of people.

On October 14, several units at three power plants in northeastern Kazakhstan were shut down in an emergency that resulted in a loss of more than 1,000 megawatts (MW) of electricity.

It serves as an example of the kind of power failures that plague the region 30 years after the Central Asian countries gained independence and despite hundreds of millions of dollars being invested in energy infrastructure and power grids, and echo risks seen in other advanced markets such as Japan's near-blackouts during recent cold snaps.

Some of the reasons for these problems are clear, but with all the money these countries have allocated to their energy sectors and financial help they have received from international financial institutions, it is curious the situation is already so desperate with winter officially still weeks away.


The Current Problems
Three power plants were affected in the October 14 shutdowns of units: Ekibastuz-1, Ekibastuz-2, and the Aksu power plant.

Ekibastuz-1 is the largest power plant in Kazakhstan, capable of generating some 4,000 MW, roughly 13 percent of Kazakhstan’s total power output.

The Kazakhstan Electricity Grid Operating Company (KEGOC) explained the problems resulted partially from malfunctions and repair work, but also from overuse of the system that the government would later say was due to cryptominers, a large number of whom have moved to Kazakhstan recently from China after Beijing banned the mining needed by Bitcoin and other cryptocurrencies, amid its own China's power cuts across several provinces in 2021.

But between November 8 and 9, rolling blackouts were reported in the East Kazakhstan, North Kazakhstan, and Kyzylorda provinces, as well as the area around Almaty, Kazakhstan’s biggest city, and Shymkent, its third largest city.

People in Uzbekistan say they, too, are facing blackouts that the Energy Ministry described as “short-term outages,” even as authorities have looked to export electricity to Afghanistan to support regional demand, though it has been clear for several weeks that the country will have problems with natural gas supplies this winter.


Power lines in Uzbekistan
Kyrgyz President Sadyr Japarov continues to say there won't be any power rationing in Kyrgyzstan this winter, but at the end of September the National Energy Holding Company ordered “restrictions on the lighting of secondary streets, advertisements, and facades of shops, cafes, and other nonresidential customers.”

Many parts of Tajikistan are already experiencing intermittent supplies of electricity.

Even in Turkmenistan, a country with the fourth-largest reserves of natural gas in the world, there were reports of problems with electricity and heating in the capital, Ashgabat.


What Is Going On?
The causes of some of these problems are easy to see.

The population of the region has grown significantly, with the population of Central Asia when the Soviet Union collapsed in late 1991 being some 50 million and today about 75 million.

Kyrgyzstan and Tajikistan are mountainous countries that have long been touted for their hydropower potential and some 90 percent of Kyrgyzstan’s domestically produced electricity and 98 percent of Tajikistan’s come from hydropower.

But a severe drought that struck Central Asia this year has resulted in less hydropower and, in general, less energy for the region, similar to constraints seen in Europe's reduced hydro and nuclear output this year.

Tajik authorities have not reported how low the water in the country’s key reservoirs is, but Kyrgyzstan has reported the water level in the reservoir at its Toktogul hydropower plant (HPP) is 11.8 billion cubic meters (bcm), the lowest level in years and far less than the 14.7 bcm of water it had in November 2020.

The Toktogul HPP, with an installed capacity of 1,200 MW, provides some 40 percent of the country's domestically produced electricity, but operating the HPP this winter to generate desperately needed energy brings the risk of leaving water levels at the reservoir critically low next spring and summer when the water is also needed for agricultural purposes.

This year’s drought is something Kyrgyzstan and Tajikistan will have to take into consideration as they plan how to provide power for their growing populations in the future. Hydropower is a desirable option but may be less reliable with the onset of climate change, prompting interest in alternatives such as Ukraine's wind power to diversify generation.

Uzbekistan is also feeling the effects of this year’s drought, and, like the South Caucasus where Georgia's electricity imports have increased, supply shortfalls are testing grids.

According to the International Energy Agency, HPPs account for some 12 percent of Uzbekistan’s generating capacity.

Uzbekistan’s Energy Ministry attributed low water levels at HPPs that have caused a 23 percent decrease in hydropower generation this year.


A reservoir in Kyrgyzstan
Kazakhstan and Uzbekistan are the most populous Central Asian countries, and both depend on thermal power plants (TPP) for generating most of their electricity.

Most of the TPPs in Kazakhstan are coal-fired, while most of the TPPs in Uzbekistan are gas-fired.

Kazakhstan has 68 power plants, 80 percent of which are coal-fired TPPs, and most are in the northern part of the country where the largest deposits of coal are located. Kazakhstan has the world's 10th largest reserves of coal.

About 88 percent of Uzbekistan’s electricity comes from TTPs, most of which use natural gas.

Uzbekistan’s proven reserves are some 800 billion cubic meters, but gas production in Uzbekistan has been decreasing.

In December 2020, Uzbek President Shavkat Mirziyoev ordered a halt to the country’s gas exports and instructed that gas to be redirected for domestic use. Mirziyoev has already given similar instructions for this coming winter.


How Did It Come To This?
The biggest problem with the energy infrastructure in Central Asia is that it is generally very old. Nearly all of its power plants date back to the Soviet era -- and some well back into the Soviet period.

The use of power plants and transmission lines that some describe as “obsolete” and a few call “decrepit” has unfortunately been a necessity in Central Asia, even as regional players pursue new interconnections like Iran's plan to transmit electricity to Europe as a power hub.

Reporting on Kazakhstan in September 2016, the Asian Development Bank (ADB) said, “70 percent of the power generation infrastructure is in need of rehabilitation.”

The Ekibastuz-1 TPP is relatively new by the power-plant standards of Central Asia. The first unit of the eight units of the TPP was commissioned in 1980.

The first unit at the AKSU TPP was commissioned in 1968, and the first unit of the gas- and fuel-fired TPP in southern Kazakhstan’s Zhambyl Province was commissioned in 1967.

 

Related News

View more

Global CO2 emissions 'flatlined' in 2019, says IEA

2019 Global CO2 Emissions stayed flat, IEA reports, as renewable energy growth, wind and solar deployment, nuclear output, and coal-to-gas switching in advanced economies offset increases elsewhere, supporting climate goals and clean energy transitions.

 

Key Points

33 gigatonnes, unchanged YoY, as advanced economies cut power emissions via renewables, gas, and nuclear.

✅ IEA reports emissions flat at 33 Gt despite 2.9% GDP growth

✅ Advanced economies cut power-sector CO2 via wind, solar, gas

✅ Nuclear restarts and mild weather aided reductions

 

Despite widespread expectations of another increase, global energy-related CO2 emissions stopped growing in 2019, according to International Energy Agency (IEA) data released today. After two years of growth, global emissions were unchanged at 33 gigatonnes in 2019, a notable marker in the global energy transition narrative even as the world economy expanded by 2.9%.

This was primarily due to declining emissions from electricity generation in advanced economies, thanks to the expanding role of renewable sources (mainly wind and solar across many markets), fuel switching from coal to natural gas, and higher nuclear power generation, the Paris-based organisation says in the report.

"We now need to work hard to make sure that 2019 is remembered as a definitive peak in global emissions, not just another pause in growth," said Fatih Birol, the IEA's executive director. "We have the energy technologies to do this, and we have to make use of them all."

Higher nuclear power generation in advanced economies, particularly in Japan and South Korea, avoided over 50 Mt of CO2 emissions. Other factors included milder weather in several countries, and slower economic growth in some emerging markets. In China, emissions rose but were tempered by slower economic growth and higher output from low-carbon sources of electricity. Renewables continued to expand in China, and 2019 was also the first full year of operation for seven large-scale nuclear reactors in the country.

A significant decrease in emissions in advanced economies in 2019 offset continued growth elsewhere. The USA recorded the largest emissions decline on a country basis, with a fall of 140 million tonnes, or 2.9%. US emissions are now down by almost 1 gigatonne from their peak in 2000. Emissions in the European Union fell by 160 million tonnes, or 5%, in 2019 driven by reductions in the power sector as electricity producers move away from coal in the generation mix. Japan’s emissions fell by 45 million tonnes, or around 4%, the fastest pace of decline since 2009, as output from recently restarted nuclear reactors increased.

Emissions in the rest of the world grew by close to 400 million tonnes in 2019, with almost 80% of the increase coming from countries in Asia where coal-fired power generation continued to rise, and in Australia emissions rose 2% due to electricity and transport. Coal-fired power generation in advanced economies declined by nearly 15%, reflecting a sharp fall in coal-fired electricity across multiple markets, as a result of growth in renewables, coal-to-gas switching, a rise in nuclear power and weaker electricity demand.

The IEA will publish a World Energy Outlook Special Report in June that will map out how to cut global energy-related carbon emissions by one-third by 2030 and put the world on track for longer-term climate goals, a pathway that, in Canada, will require more electricity to hit net-zero. It will also hold an IEA Clean Energy Transitions Summit in Paris on 9 July, bringing together key government ministers, CEOs, investors and other major stakeholders.

Birol will discuss the results published today tomorrow at an IEA Speaker Series event at its headquarters with energy and climate ministers from Poland, which hosted COP24 in Katowice; Spain, which hosted COP25 in Madrid; and the UK, which will host COP26 in Glasgow this year, as greenhouse gas concentrations continue to break records worldwide.

 

Related News

View more

State-sponsored actors 'very likely' looking to attack electricity supply, says intelligence agency

Canada Critical Infrastructure Cyber Risks include state-sponsored actors probing the electricity grid and ICS/OT, ransomware on utilities, and espionage targeting smart cities, medical devices, and energy networks, pre-positioning for disruptive operations.

 

Key Points

Nation-state and criminal cyber risks to Canada's power, water, and OT/ICS, aiming to disrupt, steal data, or extort.

✅ State-sponsored probing of power grid and utilities

✅ OT/ICS exposure grows as systems connect to IT networks

✅ Ransomware, espionage, and pre-positioning for disruption

 

State-sponsored actors are "very likely" trying to shore up their cyber capabilities to attack Canada's critical infrastructure — such as the electricity supply, as underscored by the IEA net-zero electricity report indicating rising demand for clean power, to intimidate or to prepare for future online assaults, a new intelligence assessment warns.

"As physical infrastructure and processes continue to be connected to the internet, cyber threat activity has followed, leading to increasing risk to the functioning of machinery and the safety of Canadians," says a new national cyber threat assessment drafted by the Communications Security Establishment.

"We judge that state-sponsored actors are very likely attempting to develop the additional cyber capabilities required to disrupt the supply of electricity in Canada, even as cleaning up Canada's electricity remains critical for climate goals."

Today's report — the second from the agency's Canadian Centre for Cyber Security wing — looks at the major cyber threats to Canadians' physical safety and economic security.

The CSE does say in the report that while it's unlikely cyber threat actors would intentionally disrupt critical infrastructure — such as water and electricity supplies — to cause major damage or loss of life, they would target critical organizations "to collect information, pre-position for future activities, or as a form of intimidation."

The report said Russia-associated actors probed the networks of electricity utilities in the U.S. and Canada last year and Chinese state-sponsored cyber threat actors have targeted U.S. utility employees. Other countries have seen their industrial control systems targeted by Iranian hacking groups and North Korean malware was found in the IT networks of an Indian power plant, it said.

The threat grows as more critical infrastructure goes high-tech.

In the past, the operational technology (OT) used to control dams, boilers, electricity and pipeline operations has been largely immune to cyberattacks — but that's changing as manufacturers incorporate newer information technology in their systems and products and as the race to net-zero drives grid modernization, says the report.

That technology might make things easier and lower costs for utilities already facing debates over electricity prices in Alberta amid affordability concerns, but it comes with risks, said Scott Jones, the head of the cyber centre.

"So that means now it is a target, it is accessible and it's vulnerable. So what you could see is shutting off of transmission lines, you can see them opening circuit breakers, meaning electricity simply won't flow to our homes to our business," he told reporters Wednesday.

While the probability of such attacks remains low, Jones said the goal of Wednesday's briefing is to send out the early warnings.

"We're not trying to scare people. We're certainly not trying to scare people into going off grid by building a cabin in the woods. We're here to say, 'Let's tackle these now while they're still paper, while they're still a threat we're writing down.'"

Steve Waterhouse, a former cybersecurity officer for the Department of National Defence who now teaches at Université de Sherbrooke, said a saving grace for Canada could be the makeup of its electrical systems.

"Since in Canada, they're very centralized, it's easier to defend, and debates about bridging Alberta and B.C. electricity aim to strengthen resilience, while down in the States, they have multiple companies all around the place. So the weakest link is very hard to identify where it is, but the effect is a cascading effect across the country ... And it could impact Canada, just like we saw in the big Northeastern power outage, the blackout of 2003," he said.

"So that goes to say, we have to be prepared. And I believe most energy companies have been taking extra measures to protect and defend against these type of attacks, even as Canada points to nationwide climate success in electricity to meet emissions goals."

In the future, attacks targeting so-called smart cities and internet-connected devices, such as personal medical devices, could also put Canadians at risk, says the report. 

Earlier this year, for example, Health Canada warned the public that medical devices containing a particular Bluetooth chip — including pacemakers, blood glucose monitors and insulin pumps — are vulnerable to cyber attacks that could crash them.

The foreign signals intelligence agency also says that while state-sponsored programs in China, Russia, Iran and North Korea "almost certainly" pose the greatest state-sponsored cyber threats to Canadian individuals and organizations, many other states are rapidly developing their own cyber programs.

Waterhouse said he was glad to see the government agency call out the countries by name, representing a shift in approach in recent years.

"To tackle on and be ready to face a cyber-attack, you have to know your enemy," he said.

"You have to know what's vulnerable inside of your organization. You have to know how ... vulnerable it is against the threats that are out there."


Commercial espionage continues
State-sponsored actors will also continue their commercial espionage campaigns against Canadian businesses, academia and governments — even as calls to make Canada a post-COVID manufacturing hub grow — to steal Canadian intellectual property and proprietary information, says the CSE.

"We assess that these threat actors will almost certainly continue attempting to steal intellectual property related to combating COVID-19 to support their own domestic public health responses or to profit from its illegal reproduction by their own firms," says the "key judgments" section of the report.

"The threat of cyber espionage is almost certainly higher for Canadian organizations that operate abroad or work directly with foreign state-owned enterprises."

The CSE says such commercial espionage is happening already across multiple fields, including aviation, technology and AI, energy and biopharmaceuticals.

While state-sponsored cyber activity tends to offer the most sophisticated threats, CSE said that cybercrime continues to be the threat most likely to directly affect Canadians and Canadian organizations, through vectors like online scams and malware.

"We judge that ransomware directed against Canada will almost certainly continue to target large enterprises and critical infrastructure providers. These entities cannot tolerate sustained disruptions and are willing to pay up to millions of dollars to quickly restore their operations," says the report.


Cybercrime becoming more sophisticated 
According to the Canadian Anti-Fraud Centre, Canadians lost over $43 million to cybercrime last year. The CSE reported earlier this year that online thieves have been using the COVID-19 pandemic to trick Canadians into forking over their money — through scams like a phishing campaign that claimed to offer access to a Canada Emergency Response Benefit payment in exchange for the target's personal financial details.

Online foreign influence activities — a dominant theme in the CSE's last threat assessment briefing — continue and constitute "a new normal" in international affairs as adversaries seek to influence domestic and international political events, says the agency.

"We assess that, relative to some other countries, Canadians are lower-priority targets for online foreign influence activity," it said.

"However, Canada's media ecosystem is closely intertwined with that of the United States and other allies, which means that when their populations are targeted, Canadians become exposed to online influence as a type of collateral damage."

According to the agency's own definition, "almost certainly" means it is nearly 100 per cent certain in its analysis, while "very likely" means it is 80-90 per cent certain of its conclusions. The CSE says its analysis is based off of a mix of confidential and non-confidential intelligence and sources. 

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified