Utilities team up to build transmission lines

By Associated Press


Protective Relay Training - Basic

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today
Two utilities are seeking approval to build transmission lines across southern Colorado to serve a growing population and carry more electricity from renewable energy.

Xcel Energy and Tri-State Generation and Transmission Association filed applications with the Colorado Public Utilities Commission. The transmission lines would stretch from the San Luis Valley in south-central Colorado to Pueblo.

Xcel Energy gets power from a SunEdison solar plant in the San Luis Valley.

The utilities must get approval from local governments for the transmission lines. The project is expected to cost about $180 million and be in service in 2013.

"We are combining our resources and assets to put forward a strong plan that addresses load growth and supports future renewable energy development," said Kent Larson, Xcel Energy's vice president for transmission and operating services.

Xcel Energy spokesman Tom Henley said the application is the first joint project proposed for renewable energy zones identified by the Legislature.

Minneapolis-based Xcel Energy is Colorado's largest provider of electricity. Westminster-based Tri-State supplies wholesale power to 18 electric cooperatives in Colorado, New Mexico, Wyoming and Nebraska.

Related News

Coronavirus impacts dismantling of Germany's Philippsburg nuclear plant

Philippsburg Demolition Delay: EnBW postpones controlled cooling-tower blasts amid the coronavirus pandemic, affecting decommissioning timelines in Baden-Wurttemberg and grid expansion for a transformer station to route renewable power and secure supply in southern Germany.

 

Key Points

EnBW's COVID-19 delay of Philippsburg cooling-tower blasts, affecting decommissioning and grid plans.

✅ Controlled detonation shifted to mid-May at earliest

✅ Demolition links to transformer station for north-south grid

✅ Supports security of supply in southern Germany

 

German energy company EnBW said the coronavirus outbreak has impacted plans to dismantle its Philippsburg nuclear power plant in Baden-Wurttemberg, southwest Germany, amid plans to phase out coal and nuclear nationally.

The controlled detonation of Phillipsburg's cooling towers will now take place in mid-May at the earliest, subject to coordination as Germany debates whether to reconsider its nuclear phaseout in light of supply needs.

However, EnBW said the exact demolition date depends on many factors - including the further development in the coronavirus pandemic and ongoing climate policy debates about energy choices.

Philippsburg 2, a 1402MWe pressurised water reactor unit permanently shut down on 31 December 2019, as part of Germany's broader effort to shut down its remaining reactors over time.

At the end of 2019, the Ministry of the Environment gave basic approval for decommissioning and dismantling of unit 2 of the Philippsburg nuclear power plant, inluding explosive demolition of the colling towers. Since then EnBW has worked intensively on getting all the necessary formal steps on the way and performing technical and logistical preparatory work, even as discussions about a potential nuclear resurgence continue nationwide.

“The demolition of the cooling towers is directly related to future security of supply in southern Germany. We therefore feel obliged to drive this project forward," said Jörg Michels head of the EnBW nuclear power division.

The timely removal of the cooling towers is important as the area currently occupied by nuclear plant components is needed for a transformer station for long-distance power lines, an issue underscored during the energy crisis when Germany temporarily extended nuclear power to bolster supply. These will transport electricity from renewable sources in the north to industrial centres in the south.

As of early 2020, there six nuclear reactors in operation in Germany, even as the country turned its back on nuclear in subsequent years. According to research institute Fraunhofer ISE, nuclear power provided about 14% of Germany's net electricity in 2019, less than half of the figure for 2000.

 

Related News

View more

U.S. Grid overseer issues warning on Coronavirus

NERC COVID-19 Grid Security Alert urges utilities to update business continuity plans, assess supply chain risk, and harden cybersecurity against spearphishing, social engineering, and remote-work vulnerabilities to protect the U.S. power grid and critical infrastructure.

 

Key Points

A notice urging U.S. utilities to fortify pandemic continuity, secure supply chains, and enhance cybersecurity.

✅ Mandates updates to business continuity and pandemic readiness plans

✅ Flags supply chain risks for PPE, electronics, chemicals, and logistics

✅ Warns of spearphishing, social engineering, VPN and remote-work threats

 

The top U.S. grid security monitor urged power utilities to prepare for the new coronavirus in a rare alert yesterday, adding to a chorus of warnings from federal and private organizations.

The North American Electric Reliability Corp. called for power providers to update business continuity plans in case of a pandemic outbreak and weigh the need to prioritize construction or maintenance projects, including updates on major projects like BC Hydro's Site C, while the COVID-19 virus continues to spread.

NERC is requiring electric utilities to answer questions on their readiness for a possible pandemic, including potential staffing strategies such as on-site sequestering, by March 20, an unusual step that underscores the severity of the threat to U.S. power systems.

The Electricity Information Sharing and Analysis Center, NERC's hub for getting the word out on dangers and vulnerabilities for the grid, also sent out an "all-points bulletin" on Feb. 5 addressing the coronavirus outbreak. That nonpublic document covered "potential supply chain issues stemming from a manufacturing slowdown in Asia," NERC spokeswoman Kimberly Mielcarek said.

Among offering basic hygiene and awareness recommendations, NERC's latest alert also encourages utilities to take stock of resources with supply chains affected by the virus. Because "China and nearby southeast Asian nations" have been impacted, NERC said, the supply chain hits will likely include "electronics, personal protective equipment and sanitation supplies, chemicals, and raw materials." The nonprofit grid overseer also warned of global transportation disruptions.

NERC also recommended utilities be on the lookout for cyberattacks taking advantage of the panic and using "coronavirus-themed opportunistic social engineering attacks" to hack into power companies' networks. Social engineering attacks are when hackers use social interactions to manipulate targets into giving up sensitive information.

"Spearphishing, watering hole, and other disinformation tactics are commonly used to exploit public interest in significant events," the alert said.

Electric utility representatives said they're working on or have already completed some of the steps outlined in NERC's alert, though nuclear plant workers have cited a lack of precautions in some cases.

"At this point, many of our members are activating and/or reviewing their business continuity and preparedness plans to ensure that operations and infrastructure are properly supported," said Tobias Sellier, director of media relations for the American Public Power Association, which represents around 1,400 electric utilities.

The power providers are also collaborating with other utilities such as "water, wastewater and gas," Sellier said.

Stephen Bell, senior director of media and public relations at the National Rural Electric Cooperative Association, said his group's members "have already taken a number of steps recommended by NERC" while continuing to maintain operations.

"Co-ops continue working with local, state and federal stakeholders to remain vigilant and prepared. These preparations include more frequent communications to key stakeholders, updating business continuity plans and monitoring new information from public health officials," said Bell.

Last week the Electricity Subsector Coordinating Council (ESCC), a panel of government and industry officials charged with responding to power-sector emergencies, scheduled a conference call discussing how to protect the grid from disruption if the virus infects system operators. Ohio-based utility American Electric Power Co. said it is limiting public visits, has created a high-level response team and is working to ensure operations can continue, while reinforcing downed power line safety, if the virus keeps spreading (Energywire, March 6).

Scott Aaronson, vice president for security and preparedness of the Edison Electric Institute, which represents major investor-owned utilities, said that the electric sector practices "contingency planning" to deal with unusual situations such as the coronavirus. That means that while the type of emergency may be new, dealing with an emergency situation is not, he said. Aaronson added that many of NERC's recommendations are based on what companies are already doing.

"We have heightened awareness given the circumstances, and we have messaging to employees all the way up and down the chain — from CEOs to frontline workers — that: given this time of heightened awareness and potential vulnerability, we have to practice hygiene both of the personal and cyber variety," said Aaronson.

Aaronson said that the ESCC had another call this week with the departments of Energy and Homeland Security and the Centers for Disease Control and Prevention to stay on top of the issue.

Hacking concerns
In a cybersecurity event yesterday, Lisa Monaco, co-chair of the Aspen Cybersecurity Group and former homeland security adviser during the Obama administration, warned that the coronavirus should be considered a national security threat.

"Frankly, [pandemic] is the thing that kept me up at night amongst many, many things that kept me up at night for four years in the White House," Monaco said.

Monaco went on to say the virus will strain organizations' IT infrastructure as more employees work remotely and households face higher electricity bills, and lead to "potentially more vulnerabilities for bad actors when it comes to cybersecurity."

On Friday, the DHS's Cybersecurity and Infrastructure Security Agency released advice on steps that can be taken to lessen the virus's impact on supply chains and cybersecurity, as well as tips for defending against scams exploiting coronavirus fears.

Cybersecurity firms also have been reporting a dramatic increase in spear-phishing attacks, with hackers reportedly using the coronavirus topic as a lure to trick victims into clicking a malicious link. Whether it's hackers aiming at industries susceptible to shipping disruptions, attacking countries like Italy hit particularly hard by the virus or even masquerading as the World Health Organization, cybercriminals are taking full advantage of the crisis, experts say.

Greg Young, vice president of cybersecurity at Trend Micro, said businesses should continue to expect an increase in targeted phishing attacks.

"With a large majority of businesses switching to a work-from-home model and less emphasis on in-person meetings, we also anticipate that malicious actors will start to impersonate digital tools such as 'free' remote conferencing services and other cloud computing software," said Young.

Working from home can be especially risky, as often home networks are less secure than corporate offices, Young said — meaning a hacker aiming to get into an enterprise network could find an "easier attack path" from a home office.

The Department of Energy is asking employees to make sure they can work remotely when needed, even as some agencies set limits with EPA telework policy, including updating security questions and asking those with government-furnished laptops to be sure they have a VPN, or virtual private network, account. In a post added this week to the agency's website, Chief Information Officer Rocky Campione said the department over the next two weeks will be initiating steps to ensure there is adequate network capacity to carry out DOE's work.

"Ensuring the continued operations of the department's many varied missions requires diligence," Campione said.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Adani Electricity's Power Supply Cuts in Mumbai

Adani Electricity Mumbai Power Cuts follow non-payment rules, reflecting billing disputes, regulatory compliance, consumer impact, and affordability concerns, while prompting mitigation measures like flexible payment plans, assistance programs, and clearer communication for residents.

 

Key Points

AEML cutoffs for unpaid bills per rules, raising affordability worries, billing issues, and calls for flexible aid.

✅ Triggered by unpaid bills under regulatory guidelines

✅ Affordability and billing transparency concerns raised

✅ Mitigation: flexible plans, aid for low-income users

 

Adani Electricity Mumbai Limited (AEML) recently made headlines by cutting power supply to around 100 homes in Mumbai, sparking discussions about the reasons behind this action and its implications for consumers, especially as reports like the Northeast D.C. outage continue to surface.

Background of the Incident

The power supply disconnections by AEML were reportedly due to non-payment of electricity bills by the affected households. This action, although necessary under AEML's policies and in accordance with regulatory guidelines, has raised concerns about the impact on residents, particularly during challenging economic times when pandemic electricity shut-offs highlighted energy insecurity.

Reasons for Non-Payment

Non-payment of electricity bills can stem from various reasons, including financial hardships, disputes over billing accuracy, or unforeseen circumstances affecting household finances. In Mumbai, where the cost of living is high, utility bills constitute a significant portion of monthly expenses for many households, mirroring trends of rising electricity bills seen elsewhere.

Regulatory and Legal Framework

AEML's decision to disconnect power supply aligns with regulatory provisions governing utility services, which may include emergency disconnection moratoriums in other jurisdictions. Utility companies are mandated to enforce bill payments to maintain operational sustainability and ensure fair distribution of resources among consumers.

Consumer Impact and Response

The power disconnections have prompted reactions from affected residents and consumer advocacy groups, highlighting issues related to affordability, transparency in billing practices, and the need for supportive measures during times of economic distress amid heat-related electricity struggles that pressure vulnerable households.

Mitigation Measures

In response to such incidents, utility companies and regulatory authorities often implement mitigation measures. These may include flexible payment options, financial assistance programs for low-income households, and enhanced communication about billing procedures and payment deadlines, along with policy scrutiny such as utility spending oversight to curb unnecessary costs.

Future Considerations

As cities like Mumbai continue to grow and face challenges related to urbanization and infrastructure development, ensuring reliable and affordable access to essential services like electricity, including efforts to prevent summer power outages, remains a priority. Balancing the operational needs of utility providers with consumer welfare concerns requires ongoing dialogue and proactive measures from all stakeholders.

Conclusion

The power supply cuts by Adani Electricity in Mumbai underscore the complexities of managing utility services in urban centers. While necessary for financial viability and regulatory compliance, such actions also highlight broader issues of affordability and consumer protection. Moving forward, collaborative efforts between utility companies, regulatory authorities, and community stakeholders are essential in addressing these challenges and ensuring equitable access to essential services for all residents.

 

Related News

View more

How Bitcoin's vast energy use could burst its bubble

Bitcoin Energy Consumption drives debate on blockchain mining, proof-of-work, carbon footprint, and emissions, with CCAF estimates in terawatt hours highlighting electricity demand, fossil fuel reliance, and sustainability concerns for data centers and cryptocurrency networks.

 

Key Points

Electricity used by Bitcoin proof-of-work mining, often fossil-fueled, estimated by CCAF in terawatt hours.

✅ CCAF: 40-445 TWh, central estimate ~130 TWh

✅ ~66% of mining electricity sourced from fossil fuels

✅ Proof-of-work increases hash rate, energy, and emissions

 

The University of Cambridge Centre for Alternative Finance (CCAF) studies the burgeoning business of cryptocurrencies.

It calculates that Bitcoin's total energy consumption is somewhere between 40 and 445 annualised terawatt hours (TWh), with a central estimate of about 130 terawatt hours.

The UK's electricity consumption is a little over 300 TWh a year, while Argentina uses around the same amount of power as the CCAF's best guess for Bitcoin, as countries like New Zealand's electricity future are debated to balance demand.

And the electricity the Bitcoin miners use overwhelmingly comes from polluting sources, with the U.S. grid not 100% renewable underscoring broader energy mix challenges worldwide.

The CCAF team surveys the people who manage the Bitcoin network around the world on their energy use and found that about two-thirds of it is from fossil fuels, and some regions are weighing curbs like Russia's proposed mining ban amid electricity deficits.

Huge computing power - and therefore energy use - is built into the way the blockchain technology that underpins the cryptocurrency has been designed.

It relies on a vast decentralised network of computers.

These are the so-called Bitcoin "miners" who enable new Bitcoins to be created, but also independently verify and record every transaction made in the currency.

In fact, the Bitcoins are the reward miners get for maintaining this record accurately.

It works like a lottery that runs every 10 minutes, explains Gina Pieters, an economics professor at the University of Chicago and a research fellow with the CCAF team.

Data processing centres around the world, including hotspots such as Iceland's mining strain, race to compile and submit this record of transactions in a way that is acceptable to the system.

They also have to guess a random number.

The first to submit the record and the correct number wins the prize - this becomes the next block in the blockchain.

Estimates for bitcoin's electricity consumption
At the moment, they are rewarded with six-and-a-quarter Bitcoins, valued at about $50,000 each.

As soon as one lottery is over, a new number is generated, and the whole process starts again.

The higher the price, says Prof Pieters, the more miners want to get into the game, and utilities like BC Hydro suspending new crypto connections highlight grid pressures.

"They want to get that revenue," she tells me, "and that's what's going to encourage them to introduce more and more powerful machines in order to guess this random number, and therefore you will see an increase in energy consumption," she says.

And there is another factor that drives Bitcoin's increasing energy consumption.

The software ensures it always takes 10 minutes for the puzzle to be solved, so if the number of miners is increasing, the puzzle gets harder and the more computing power needs to be thrown at it.

Bitcoin is therefore actually designed to encourage increased computing effort.

The idea is that the more computers that compete to maintain the blockchain, the safer it becomes, because anyone who might want to try and undermine the currency must control and operate at least as much computing power as the rest of the miners put together.

What this means is that, as Bitcoin gets more valuable, the computing effort expended on creating and maintaining it - and therefore the energy consumed - inevitably increases.

We can track how much effort miners are making to create the currency.

They are currently reckoned to be making 160 quintillion calculations every second - that's 160,000,000,000,000,000,000, in case you were wondering.

And this vast computational effort is the cryptocurrency's Achilles heel, says Alex de Vries, the founder of the Digiconomist website and an expert on Bitcoin.

All the millions of trillions of calculations it takes to keep the system running aren't really doing any useful work.

"They're computations that serve no other purpose," says de Vries, "they're just immediately discarded again. Right now we're using a whole lot of energy to produce those calculations, but also the majority of that is sourced from fossil energy, and clean energy's 'dirty secret' complicates substitution."

The vast effort it requires also makes Bitcoin inherently difficult to scale, he argues.

"If Bitcoin were to be adopted as a global reserve currency," he speculates, "the Bitcoin price will probably be in the millions, and those miners will have more money than the entire [US] Federal budget to spend on electricity."

"We'd have to double our global energy production," he says with a laugh, even as some argue cheap abundant electricity is getting closer to reality today. "For Bitcoin."

He says it also limits the number of transactions the system can process to about five per second.

This doesn't make for a useful currency, he argues.

Rising price of bitcoin graphic
And that view is echoed by many eminent figures in finance and economics.

The two essential features of a successful currency are that it is an effective form of exchange and a stable store of value, says Ken Rogoff, a professor of economics at Harvard University in Cambridge, Massachusetts, and a former chief economist at the International Monetary Fund (IMF).

He says Bitcoin is neither.

"The fact is, it's not really used much in the legal economy now. Yes, one rich person sells it to another, but that's not a final use. And without that it really doesn't have a long-term future."

What he is saying is that Bitcoin exists almost exclusively as a vehicle for speculation.

So, I want to know: is the bubble about to burst?

"That's my guess," says Prof Rogoff and pauses.

"But I really couldn't tell you when."

 

Related News

View more

More Managers Charged For Price Fixing At Ukraine Power Producer

DTEK Rotterdam+ price-fixing case scrutinizes alleged collusion over coal-based electricity tariffs in Ukraine, with NABU probing NERC regulators, market manipulation, consumer overpayment, and wholesale pricing tied to imported coal benchmarks.

 

Key Points

NABU probes alleged DTEK-NERC collusion to inflate coal power tariffs via Rotterdam+; all suspects deny wrongdoing.

✅ NABU alleges tariff manipulation tied to coal import benchmarks.

✅ Four DTEK execs and four NERC officials reportedly charged.

✅ Probe centers on 2016-2017 overpayments; defendants contest.

 

Two more executives of DTEK, Ukraine’s largest private power and coal producer and recently in energy talks with Octopus Energy, have been charged in a criminal case on August 14 involving an alleged conspiracy to fix electricity prices with the state energy regulator, Interfax reported.

They are Ivan Helyukh, the CEO of subsidiary DTEK Grid, which operates as Ukraine modernizes its network alongside global moves toward a smart electricity grid, and Borys Lisoviy, a top manager of power generation company Skhidenergo, according to Kyiv-based Concorde Capital investment bank.

Ukraine’s Anti-Corruption Bureau (NABU) alleges that now four DTEK managers “pressured” and colluded with four regulators at the National Energy and Utilities Regulatory Commission to manipulate tariffs on electricity generated from coal that forced consumers to overpay, reflecting debates about unjustified profits in the UK, $747 million in 2016-2017.

 

DTEK allegedly benefited $560 million in the scheme.

All eight suspects are charged with “abuse of office” and deny wrongdoing, similar to findings in a B.C. Hydro regulator report published in Canada.

There is “no legitimate basis for suspicions set out in the investigation,” DTEK said in an August 8 statement.

Suspect Dmytro Vovk, the former head of NERC, dismissed the investigation as a “wild goose chase” on Facebook.

In separate statements over the past week, DTEK said the managers who are charged have prematurely returned from vacation to “fully cooperate” with authorities in order to “help establish the truth.”

A Kyiv court on August 14 set bail at $400,000 for one DTEK manager who wasn’t named, as enforcement actions like the NT Power penalty highlight regulatory consequences.

The so-called Rotterdam+ pricing formula that NABU has been investigating since March 2017, similar to federal scrutiny of TVA rates, was in place from April 2016 until July of this year.

It based the wholesale price of electricity by Ukrainian thermal power plants on coal prices set in the Rotterdam port plus delivery costs to Ukraine.

NABU alleges that at certain times it has not seen documented proof that the purchased coal originated in Rotterdam, insisting that there was no justification for the price hikes, echoing issues around paying for electricity in India in some markets.

Ukraine started facing thermal-coal shortages after fighting between government forces and Russia-backed separatists in the eastern part of the country erupted in April 2014. A vast majority of the anthracite-coal mines on which many Ukrainian plants rely are located on territory controlled by the separatists.

Overnight, Ukraine went from being a net exporter of coal to a net importer and started purchasing coal from as far away as South Africa and Australia.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified