Greenpeace urges South Africa to end dependence on coal

By Reuters


Protective Relay Training - Basic

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today
Environmental group Greenpeace opened its first office in Africa and urged South Africa, the continent's biggest economy, to reduce its dependence on coal and cut emissions of greenhouse gases.

Experts say poverty means Africa is ill able to adapt to severe weather changes forecast to be triggered by global warming, while African nations have been among the lowest emitters of the gases blamed for causing it.

South Africa relies on coal to generate much of its electricity. State utility Eskom has previously said it plans to cut emissions by reducing its reliance on coal and to expand future power output using mainly nuclear power stations.

"They need to spend more money not in nuclear power, but in renewable energy and energy efficiency," Amadou Kanoute, executive director of Greenpeace Africa, told Reuters.

The environmental group's office will be in Johannesburg, South Africa's commercial capital.

South Africa's government has said it aims to brake rising emissions. It presents a scenario under which emissions will rise until 2020-25, stay flat for up to a decade and then fall. It will set mandatory energy efficiency targets and a gradual shift away from coal.

A U.N. Climate Panel report last year, projected that up to 250 million people in Africa would be living in areas of stress on water supplies by 2020.

The lobby group said it had opened an office in Johannesburg as a first step to address climate change, deforestation and overfishing in Africa. It plans to open a second office in the Democratic Republic of Congo this month and another in Senegal next year.

"Africa is in a position to leapfrog dirty development and become a leader in helping to avert catastrophic climate change and protect the natural environment. We are here to help make that happen," Kanoute said.

Related News

Residential electricity use -- and bills -- on the rise thanks to more working from home

Work From Home Energy Consumption is driving higher electricity bills as residential usage rises. Smart meter data, ISO-New-England trends, and COVID-19 telecommuting show stronger power demand and sensitivity to utility rates across regions.

 

Key Points

Higher household electricity use from telecommuting, shifting load to residences and raising utility bills.

✅ Smart meters show 5-22 percent residential usage increases.

✅ Commercial demand fell as home cooling and IT loads rose.

✅ Utility rates and AC use drive bill spikes during summer.

 

Don't be surprised if your electric bills are looking higher than usual, with a sizable increase in the amount of power that you have used.

Summer traditionally is a peak period for electricity usage because of folks' need to run fans and air-conditioners to cool their homes or run that pool pump. But the arrival of the coronavirus and people working from home is adding to amount of power people are using.

Under normal conditions, those who work in their employer's offices might not be cooling their homes as much during the middle of the day or using as much electricity for lights and running computers.

For many, that's changed.

Estimates on how much of an increase residential electric customers are seeing as result of working from home vary widely.

ISO-New England, the regional electric grid operator, has seen a 3 percent to 5 percent decrease in commercial and industrial power demand, even as the grid overseer issued pandemic warnings nationally. The expectation is that much of that decrease translates into a corresponding increase in residential electricity usage.

But other estimates put the increase in residential electricity usage much higher. A Washington state company that makes smart electric meters, Itron, estimates that American households are using 5 percent to 10 percent more electricity per month since March, when many people began working from home as part of an effort to prevent the spread of the coronavirus.

Another smart metering company, Cambridge, Mass.-based Sense, found that average home electricity usage increased 22 percent in April compared to the same period in 2019, a reflection of people using more electricity while they stayed home. Based on its analysis of data from 5,000 homes across 30 states, Sense officials said a typical customer's monthly electric bill increased by between $22 and $25, with a larger increase for consumers in states with higher electricity rates.

Connecticut-specfic data is harder to come by.

Officials with Orange-based United Illuminating declined to provide any customer usage data, though, like others in the power industry, they did acknowledge that residential customers are using more electricity. And the state's other large electric distribution utility, Eversource, was unable to provide any recent data on residential electric usage. The company did tell Connecticut utility regulators there was a 3 percent increase in residential power usage for the week of March 21 compared to the week before.

Over the same time period, Eversource officials saw a 3 percent decrease in power usage by commercial and industrial customers.

Separately, nuclear plant workers raised concerns about pandemic precautions at some facilities, reflecting operational strains.

Alan Behm of Cheshire said he normally uses 597 kilowatt hours of electricity during an average month. But in April of this year, the amount of electricity he used rose by nearly 51 percent.

With many offices closed, the expense of heating, cooking and lighting is being shifted from employer to employee, and some utilities such as Manitoba Hydro have pursued unpaid days off to trim costs during the pandemic. And one remote work expert believes some companies are recognizing the burden those added costs are placing on workers -- and are trying to do something about it.

Technology giant Google announced in late May that it was giving employees who work from home $1,000 allowances to cover equipment costs and other expenses associated with establishing a home office.

Moe Vela, chief transparency officer for the New York City-based computer software company TransparentBusiness, said the move by Google executives is a savvy one.

"Google is very smart to have figured this out," Vela said. "This is what employees want, especially millenials. People are so much happier to be working remotely, getting those two to three hours back per day that some people spend getting to and from work is so much more important than a stipend."

Vela predicted that even after a vaccine is found for the corona virus, one of the key worklife changes is likely to be a broader acceptance of telework and working from home.

Beyond the immediate shifts, more young Canadians would work in electricity if awareness improved, pointing to future talent pipelines.

"I think that's where we're headed," he said. "I think it will make an employer more attractive as they try to attract talent from around the world."

Vela said employers save an average of $11,000 per year for each employee they have working from home.

"It would be a brilliant move if a company were to share some of that amount with employees," he said. "I wouldn't do it if it's going to cause a company to not be there (in business) though."

The idea of a company sharing whatever savings it achieves by having employees work from home wasn't well received by many Connecticut residents who responded to questions posed via social media by Hearst Connecticut Media. More than 100 people responded and an overwhelming number of people spoke out against the idea.

"You are saving on gas and other travel related expenses, so the small increase in your electric bill shouldn't really be a concern," said Kathleen Bennett Charest of Wallingford.

Jim Krupp, also of Wallingford, said, "to suggest that the employers compensate the employees makes as much sense as suggesting that the employees should take a pay cut due to their reduced expenses for travel, day care, and eating lunch at work."

"Employers must still maintain their offices and incur all of the fixed expenses involved, including basic utilities, taxes and insurance," Krupp said. "The cost savings (for employers) that are realized are also offset by increased costs of creating and maintaining IT networks that allow employees to access their work sites from home and the costs of monitoring and managing the work force."

Kiki Nichols Nugent of Cheshire said she was against the idea of an employee trying to get their employer to pay for the increased electricity costs associated with working from home.

"I would not nickle and dime," Nugent said. "If companies are saving on electricity now, maybe employers will give better raises next year."

New Haven resident Chris Smith said he is "just happy to have a job where I am able to telecommute."

"When teleworking becomes more the norm, either now or in the future, we may see increased wages for teleworkers either for the lower cost to the employer or for the increase in productivity it brings," Smith said.

 

Related News

View more

'For now, we're not touching it': Quebec closes door on nuclear power

Quebec Energy Strategy focuses on hydropower, energy efficiency, and new dams as Hydro-Que9bec pursues Churchill Falls deals and the Champlain Hudson Power Express to New York, while nuclear power remains off the agenda.

 

Key Points

Quebec's plan prioritizes hydropower, efficiency, and new dams, excludes nuclear, and expands exports via CHPE.

✅ Nuclear power shelved; focus on renewables and dams

✅ Hydro-Que9bec pursues Churchill Falls and Gull Island talks

✅ CHPE line to New York advances; export contract with NYSERDA

 

Quebec Premier François Legault has closed the door on nuclear power, at least for now.

"For the time being, we're not touching it," said Legault when asked about the subject at a press scrum in New York on Tuesday.

The government is looking for new sources of energy as Hydro-Québec begins talks on a $185-billion strategy to wean the province off fossil fuels. In an interview with The Canadian Press at Quebec's official residence in New York, Legault said there are a number of avenues to explore:

  • Energy efficiency.
  • Negotiations with Newfoundland and Labrador over Churchill Falls and Gull Island.
  • Upgrading existing dams and building new ones.

"Nuclear power is not on the agenda," he said.

Yet the premier seemed open to the nuclear question some time ago. In August, Radio-Canada reported that he had raised the idea of nuclear power in front of dozens of MNAs at the National Assembly last April.

Also in August, Hydro-Québec was evaluating the possibility of reopening the Gentilly-2 nuclear power plant, which has been closed since 2012.

Asked about his leader's statement on Tuesday, the Minister of the Economy, Pierre Fitzgibbon, maintained his line: "At the moment, we're looking at everything that's possible because we know that we have a significant deficit in the supply of green energy," he said.

Another step forward for the Quebec-New York line

Premier Legault took part in Tuesday morning's announcement that construction had begun on the New York converter station of the Champlain Hudson Power Express line. New York State Governor Kathy Hochul was present at the announcement.

In November 2021, Hydro-Québec signed a contract with the New York State Energy Research and Development Authority (NYSERDA) to export 10.4 terawatt-hours of electricity to the American metropolis over 25 years, while Ontario declined to renew a deal with Quebec.

At a time when the Quebec government is constantly asserting that more energy will be needed for future economic projects -- particularly the battery industry -- Legault sees no contradiction in selling electricity to the Americans and to neighboring provinces such as NB Power deals to import Hydro-Québec power.

"Whether it's this contract or the contract for companies coming to set up in Quebec, it's out of the surplus we currently have in Quebec. Now, we have dozens of investment project proposals in Quebec where we need additional electricity," he explained.

The line will supply 20 per cent of New York City's electricity needs, despite transmission constraints on Quebec-to-U.S. deliveries. Commissioning is scheduled for May 2026. The spin-offs are estimated at $30 billion, according to the premier.

Will this money be used to finance new dams, such as the La Romaine hydroelectric complex built in recent years?

"It's certain that future projects will cost several tens of billions of dollars. Hydro-Québec has the capacity to borrow. It's a very healthy company. There's no doubt that these revenues will improve Hydro-Québec's image," he said.

 

Related News

View more

U.S. Grid overseer issues warning on Coronavirus

NERC COVID-19 Grid Security Alert urges utilities to update business continuity plans, assess supply chain risk, and harden cybersecurity against spearphishing, social engineering, and remote-work vulnerabilities to protect the U.S. power grid and critical infrastructure.

 

Key Points

A notice urging U.S. utilities to fortify pandemic continuity, secure supply chains, and enhance cybersecurity.

✅ Mandates updates to business continuity and pandemic readiness plans

✅ Flags supply chain risks for PPE, electronics, chemicals, and logistics

✅ Warns of spearphishing, social engineering, VPN and remote-work threats

 

The top U.S. grid security monitor urged power utilities to prepare for the new coronavirus in a rare alert yesterday, adding to a chorus of warnings from federal and private organizations.

The North American Electric Reliability Corp. called for power providers to update business continuity plans in case of a pandemic outbreak and weigh the need to prioritize construction or maintenance projects, including updates on major projects like BC Hydro's Site C, while the COVID-19 virus continues to spread.

NERC is requiring electric utilities to answer questions on their readiness for a possible pandemic, including potential staffing strategies such as on-site sequestering, by March 20, an unusual step that underscores the severity of the threat to U.S. power systems.

The Electricity Information Sharing and Analysis Center, NERC's hub for getting the word out on dangers and vulnerabilities for the grid, also sent out an "all-points bulletin" on Feb. 5 addressing the coronavirus outbreak. That nonpublic document covered "potential supply chain issues stemming from a manufacturing slowdown in Asia," NERC spokeswoman Kimberly Mielcarek said.

Among offering basic hygiene and awareness recommendations, NERC's latest alert also encourages utilities to take stock of resources with supply chains affected by the virus. Because "China and nearby southeast Asian nations" have been impacted, NERC said, the supply chain hits will likely include "electronics, personal protective equipment and sanitation supplies, chemicals, and raw materials." The nonprofit grid overseer also warned of global transportation disruptions.

NERC also recommended utilities be on the lookout for cyberattacks taking advantage of the panic and using "coronavirus-themed opportunistic social engineering attacks" to hack into power companies' networks. Social engineering attacks are when hackers use social interactions to manipulate targets into giving up sensitive information.

"Spearphishing, watering hole, and other disinformation tactics are commonly used to exploit public interest in significant events," the alert said.

Electric utility representatives said they're working on or have already completed some of the steps outlined in NERC's alert, though nuclear plant workers have cited a lack of precautions in some cases.

"At this point, many of our members are activating and/or reviewing their business continuity and preparedness plans to ensure that operations and infrastructure are properly supported," said Tobias Sellier, director of media relations for the American Public Power Association, which represents around 1,400 electric utilities.

The power providers are also collaborating with other utilities such as "water, wastewater and gas," Sellier said.

Stephen Bell, senior director of media and public relations at the National Rural Electric Cooperative Association, said his group's members "have already taken a number of steps recommended by NERC" while continuing to maintain operations.

"Co-ops continue working with local, state and federal stakeholders to remain vigilant and prepared. These preparations include more frequent communications to key stakeholders, updating business continuity plans and monitoring new information from public health officials," said Bell.

Last week the Electricity Subsector Coordinating Council (ESCC), a panel of government and industry officials charged with responding to power-sector emergencies, scheduled a conference call discussing how to protect the grid from disruption if the virus infects system operators. Ohio-based utility American Electric Power Co. said it is limiting public visits, has created a high-level response team and is working to ensure operations can continue, while reinforcing downed power line safety, if the virus keeps spreading (Energywire, March 6).

Scott Aaronson, vice president for security and preparedness of the Edison Electric Institute, which represents major investor-owned utilities, said that the electric sector practices "contingency planning" to deal with unusual situations such as the coronavirus. That means that while the type of emergency may be new, dealing with an emergency situation is not, he said. Aaronson added that many of NERC's recommendations are based on what companies are already doing.

"We have heightened awareness given the circumstances, and we have messaging to employees all the way up and down the chain — from CEOs to frontline workers — that: given this time of heightened awareness and potential vulnerability, we have to practice hygiene both of the personal and cyber variety," said Aaronson.

Aaronson said that the ESCC had another call this week with the departments of Energy and Homeland Security and the Centers for Disease Control and Prevention to stay on top of the issue.

Hacking concerns
In a cybersecurity event yesterday, Lisa Monaco, co-chair of the Aspen Cybersecurity Group and former homeland security adviser during the Obama administration, warned that the coronavirus should be considered a national security threat.

"Frankly, [pandemic] is the thing that kept me up at night amongst many, many things that kept me up at night for four years in the White House," Monaco said.

Monaco went on to say the virus will strain organizations' IT infrastructure as more employees work remotely and households face higher electricity bills, and lead to "potentially more vulnerabilities for bad actors when it comes to cybersecurity."

On Friday, the DHS's Cybersecurity and Infrastructure Security Agency released advice on steps that can be taken to lessen the virus's impact on supply chains and cybersecurity, as well as tips for defending against scams exploiting coronavirus fears.

Cybersecurity firms also have been reporting a dramatic increase in spear-phishing attacks, with hackers reportedly using the coronavirus topic as a lure to trick victims into clicking a malicious link. Whether it's hackers aiming at industries susceptible to shipping disruptions, attacking countries like Italy hit particularly hard by the virus or even masquerading as the World Health Organization, cybercriminals are taking full advantage of the crisis, experts say.

Greg Young, vice president of cybersecurity at Trend Micro, said businesses should continue to expect an increase in targeted phishing attacks.

"With a large majority of businesses switching to a work-from-home model and less emphasis on in-person meetings, we also anticipate that malicious actors will start to impersonate digital tools such as 'free' remote conferencing services and other cloud computing software," said Young.

Working from home can be especially risky, as often home networks are less secure than corporate offices, Young said — meaning a hacker aiming to get into an enterprise network could find an "easier attack path" from a home office.

The Department of Energy is asking employees to make sure they can work remotely when needed, even as some agencies set limits with EPA telework policy, including updating security questions and asking those with government-furnished laptops to be sure they have a VPN, or virtual private network, account. In a post added this week to the agency's website, Chief Information Officer Rocky Campione said the department over the next two weeks will be initiating steps to ensure there is adequate network capacity to carry out DOE's work.

"Ensuring the continued operations of the department's many varied missions requires diligence," Campione said.

 

Related News

View more

Ex-SpaceX engineers in race to build first commercial electric speedboat

Arc One Electric Speedboat delivers zero-emission performance, quiet operation, and reduced maintenance, leveraging battery propulsion, aerospace engineering, and venture-backed innovation to cut noise pollution, fuel costs, and water contamination in high-performance marine recreation.

 

Key Points

Arc One Electric Speedboat is a battery-powered, zero-emission craft offering quiet, high-performance marine cruising.

✅ 475 hp, 24 ft hull, about 40 mph top speed

✅ Cuts noise, fumes, and water contamination vs gas boats

✅ Backed by Andreessen Horowitz; ex-SpaceX engineers

 

A team of former SpaceX rocket engineers have joined the race to build the first commercial electric speedboat.

The Arc Boat company announced it had raised $4.25m (£3m) in seed funding to start work on a 24ft 475-horsepower craft that will cost about $300,000.

The LA-based company, which is backed by venture capital firm Andreessen Horowitz (an early backer of Facebook and Airbnb), said the first model of the Arc One boat would be available for sale by the end of the year.

Mitch Lee, Arc’s chief executive, said he wanted to build electric boats because of the impact conventional petrol- or diesel-powered boats have on the environment.

“They not only get just two miles to the gallon, they also pump a lot of those fumes into the water,” Lee said. “In addition, there is the huge noise pollution factor [of conventional boats] and that is awful for the marine life. With gas-powered boats it’s not just carbon emissions into the air, it’s also polluting the water and causing noise pollution. Electric boats, like electric ships clearing the air on the B.C. coast, eliminate all that.”

Lee said electric vessels would also reduce the hassle of boat ownership. “I love being out on the water, being on a boat is so much fun, but owning a boat is so awful,” he said. “I have always believed that electric boats make sense. They will be quicker, quieter and way cheaper and easier to operate and maintain, with access options like an electric boat club in Seattle lowering barriers for newcomers.”

While the first models will be very expensive, Lee said the cost was mostly in developing the technology and cheaper versions would be available in the future, mirroring advances in electric aviation seen across the industry. “It is very much the Tesla approach – we are starting up market and using that income to finance research and development and work our way down market,” he said.

Lee said the technology could be applied to larger craft, and even ferries could run on electricity in the future, as projects for battery-electric high-speed ferries begin to scale.

“We started in February with no team, no money and no warehouse,” he said. “By December we are going to be selling the Arc One, and we are hiring aggressively because we want to accelerate the adoption of electric boats across a whole range of craft, including an electric-ready ferry on Kootenay Lake.”

Lee founded the company with fellow mechanical engineer Ryan Cook. Cook, the company’s chief technology officer, was previously the lead mechanical engineer at Elon Musk’s space exploration company SpaceX where he worked on the Falcon 9 rocket, the world’s first orbital class reusable rocket. In parallel, Harbour Air's electric aircraft highlights cross-sector electrification. Apart from Lee, all of Arc’s employees have some experience working at SpaceX.

The Arc boat, which would have a top speed of 40 mph, joins a number of startups rushing to make the first large-scale production of electric-powered speedboats, while a Vancouver seaplane airline demonstrates complementary progress with a prototype electric aircraft. The Monaco Yacht Club this month held a competition for electric boat prototypes to “instigate a new vision and promote all positive approaches to bring yachting into line” with global carbon dioxide emission reduction targets. Sweden’s Candela C-7 hydrofoil boat was crowned the fastest electric vessel.

 

Related News

View more

Greening Ontario's electricity grid would cost $400 billion: report

Ontario Electricity Grid Decarbonization outlines the IESO's net-zero pathway: $400B investment, nuclear expansion, renewables, hydrogen, storage, and demand management to double capacity by 2050 while initiating a 2027 natural gas moratorium.

 

Key Points

A 2050 plan to double capacity, retire gas, and invest $400B in nuclear, renewables, and storage for a net-zero grid.

✅ $400B over 25 years to meet net-zero electricity by 2050

✅ Capacity doubles to 88,000 MW; demand grows ~2% annually

✅ 2027 gas moratorium; build nuclear, renewables, storage

 

Ontario will need to spend $400 billion over the next 25 years in order to decarbonize the electricity grid and embrace clean power according to a new report by the province’s electricity system manager that’s now being considered by the Ford government.

The Independent System Electricity Operator (IESO) was tasked with laying out a path to reducing Ontario’s reliance on natural gas for electricity generation and what it would take to decarbonize the entire electricity grid by 2050.

Meeting the goal, the IESO concluded, will require an “aggressive” approach of doubling the electricity capacity in Ontario over the next two-and-a-half decades — from 42,000 MW to 88,000 MW — by investing in nuclear, hydrogen and wind and solar power while implementing conservation policies and managing demand.

“The process of fully eliminating emissions from the grid itself will be a significant and complex undertaking,” IESO president Lesley Gallinger said in a news release.

The road to decarbonization, the IESO said, begins with a moratorium on natural gas power generation starting in 2027 as long as the province has “sufficient, non-emitting supply” to meet the growing demands on the grid.

The approach, however, comes with significant risks.

The IESO said hydroelectric and nuclear facilities can take 10 to 15 years to build and if costs aren’t controlled the plan could drive up the price of clean electricity, turning homeowners and businesses away from electrification.

“Rapidly rising electricity costs could discourage electrification, stifle economic growth or hurt consumers with low incomes,” the report states.

The IESO said the province will need to take several “no regret” actions, including selecting sites and planning to construct new large-scale nuclear plants as well as hydroelectric and energy storage projects and expanding energy-efficiency programs beyond 2024.

READ MORE: Ontario faces calls to dramatically increase energy efficiency rebate programs

Ontario’s minister of energy didn’t immediately commit to implementing the recommendations, citing the need to consult with stakeholders first.

“I look forward to launching a consultation in the new year on next steps from today’s report, including the potential development of major nuclear, hydroelectric and transmissions projects,” Todd Smith said in a statement.

Currently, electricity demand is increasing by roughly two per cent per year, raising concerns Ontario could be short of electricity in the coming years as the manufacturing and transportation sectors electrify and as more sectors consider decarbonization.

At the same time, the province’s energy supply is facing “downward pressure” with the Pickering nuclear power plant slated to wind down operations and the Darlington nuclear generating station under active refurbishment.

To meet the energy need, the Ford government said it intended to extend the life of the Pickering plant until 2026.

READ MORE: Ontario planning to keep Pickering nuclear power station open until 2026

But to prepare for the increase, the Ontario government was told the province would also need to build new natural gas facilities to bridge Ontario’s electricity supply gap in the near term — a recommendation the Ford government agreed to.

The IESO said a request for proposals has been opened and the province is looking for host communities, with the expectation that existing facilities would be upgraded before projects on undeveloped land would be considered.

The IESO said the contract for any new facilities would expire in 2040, and all natural gas facilities would be retired in the 2040s.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.