Survey shows consumers choose pretty over efficient

By Business Wire


High Voltage Maintenance Training Online

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$599
Coupon Price:
$499
Reserve Your Seat Today
A new national survey released finds Americans once again prefer aesthetic home improvements – a refinished kitchen or bathroom – over money-saving improvements, such as energy-efficient windows or a high-efficiency furnace.

The survey, the fifth annual Energy Pulse survey conducted by Shelton Group, found that consumers are reverting to their old priorities as the recession wanes – perhaps at the expense of the environment.

“Energy efficiency is back to playing second fiddle, competing with more visible and exciting home improvement projects,” said Suzanne Shelton, whose firm conducted the study. “Anyone selling energy-efficient products must either focus heavily on the aesthetic or comfort aspects of their products or play up their environmental benefits in a big way.”

The survey, which polled 504 Americans by telephone in September, asked consumers: “Assuming you were suddenly given $10,000 to make home improvements, which two of the following would you choose?” The top answers were:

• Refinish the kitchen or bathroom (37 percent);

• Replace carpet or add hardwood or tile (33 percent);

• Replace windows (31 percent);

• Replace HVAC/furnace (23 percent).

Last yearÂ’s top answers were:

• Replace windows (35 percent);

• Replace HVAC/furnace (27 percent);

• Remodel kitchen or bathroom (26 percent);

• Replace carpet or add hardwood or tile (25 percent).

Among the surveyÂ’s other findings:

• Consumers are willing to watch their energy bills go up more than 70 percent, on average, before feeling forced to make energy-efficient home improvements. Respondents said their bills would need to go up an average of $129 a month to make them undertake renovations.

“We call this phenomenon the ‘Apathy Gap,’ the price people are willing to pay to do nothing,” Shelton said. “Here consumers are willing to waste more than $1,500 a year, or more than $4 a day, before they’ll take action. For that same amount, a homeowner could install insulation or purchase one or two new ENERGY STAR appliances to start seeing immediate savings.”

• There is a lot of pent-up demand for solar power. The survey asked, "How likely would you be to buy a solar electricity system for your home, knowing that a mid-size system that would provide around 63 percent of the average household's electricity, costs $35,000 to $40,000 that could be offset by a $2,000 federal tax incentive along with additional rebates in many states.”

• 28 percent said they would be likely or very likely to buy such a system.

• Fewer than 1 percent reported they already had such a system.

“This indicates an enormous potential market for solar,” Shelton said. “Consumers have been waiting for solar to become more accessible and more affordable. Now, with prices projected to fall even further, and with new federal tax incentive greater than they've ever been — up to 30 percent of the cost of the system for qualifying taxpayers — solar power will be on the rise."

• Consumers have good intentions – but not very good follow-through. Surveys over the past five years, including this year, show consistently large discrepancies between intentions and actions. Every year, for example, around 20 percent or more consumers say they’re planning to get an energy audit, yet the percentage of U.S. homeowners who've actually gotten one has languished in the 10-15 percent range.

“That’s why we now refer to home energy audits as the ‘colonoscopy’ of energy efficiency,” Shelton said. “Everyone knows they should get one, but too few actually do.”

Related News

Six key trends that shaped Europe's electricity markets in 2020

European Electricity Market Trends 2020 highlight decarbonisation, rising renewables, EV adoption, shifting energy mix, COVID-19 impacts, fuel switching, hydro, wind and solar growth, gas price dynamics, and wholesale electricity price increases.

 

Key Points

EU power in 2020 saw lower emissions, more renewables, EV growth, demand shifts, and higher wholesale prices.

✅ Power sector CO2 down 14% on higher renewables, lower coal

✅ Renewables 39% vs fossil 36%; hydro, wind, solar expanded

✅ EV share hit 17%; wholesale prices rose with gas, ETS costs

 

According to the Market Observatory for Energy DG Energy report, the COVID-19 pandemic and favorable weather conditions are the two key drivers of the trends experienced within the European electricity market in 2020. However, the two drivers were exceptional or seasonal.

The key trends within Europe’s electricity market include:


1. Decrease in power sector’s carbon emissions

As a result of the increase in renewables generation and decrease in fossil-fueled power generation in 2020, the power sector was able to reduce its carbon footprint by 14% in 2020. The decrease in the sector’s carbon footprint in 2020 is similar to trends witnessed in 2019 when fuel switching was the main factor behind the decarbonisation trend.

However, most of the drivers in 2020 were exceptional or seasonal (the pandemic, warm winter, high
hydro generation). However, the opposite is expected in 2021, with the first months of 2021 having relatively cold weather, lower wind speeds and higher gas prices, with stunted hydro and nuclear output also cited, developments which suggest that the carbon emissions and intensity of the power sector could rise.

The European Union is targeting to completely decarbonise its power sector by 2050 through the introduction of supporting policies such as the EU Emissions Trading Scheme, the Renewable Energy Directive and legislation addressing air pollutant emissions from industrial installations, with expectations that low-emissions sources will cover most demand growth in the coming years.

According to the European Environment Agency, Europe halved its power sector’s carbon emissions in 2019 from 1990 levels.


2. Changes in energy consumption

EU consumption of electricity fell by -4% as majority of industries did not operate at full level during the first half of 2020. Although majority of EU residents stayed at home, meaning an increase in residential energy use, rising demand by households could not reverse falls in other sectors of the economy.

However, as countries renewed COVID-19 restrictions, energy consumption during the 4th quarter was closer to the “normal levels” than in the first three quarters of 2020. 

The increase in energy consumption in the fourth quarter of 2020 was also partly due to colder temperatures compared to 2019 and signs of surging electricity demand in global markets.


3. Increase in demand for EVs

As the electrification of the transport system intensifies, the demand for electric vehicles increased in 2020 with almost half a million new registrations in the fourth quarter of 2020. This was the highest figure on record and translated into an unprecedented 17% market share, more than two times higher than in China and six times higher than in the United States.

However, the European Environment Agency (EEA)argues that the EV registrations were lower in 2020 compared to 2019. EEA states that in 2019, electric car registrations were close to 550 000 units, having reached 300 000 units in 2018.


4. Changes in the region’s energy mix and increase in renewable energy generation

The structure of the region’s energy mix changed in 2020, according to the report.

Owing to favorable weather conditions, hydro energy generation was very high and Europe was able to expand its portfolio of renewable energy generation such that renewables (39%) exceeded the share of fossil fuels (36%) for the first time ever in the EU energy mix.

Rising renewable generation was greatly assisted by 29 GW of wind and solar capacity additions in 2020, which is comparable to 2019 levels. Despite disrupting the supply chains of wind and solar resulting in project delays, the pandemic did not significantly slow down renewables’ expansion.

In fact, coal and lignite energy generation fell by 22% (-87 TWh) and nuclear output dropped by 11% (-79 TWh). On the other hand, gas energy generation was not significantly impacted owing to favorable prices which intensified coal-to-gas and lignite-to-gas switching, even as renewables crowd out gas in parts of the market.


5. Retirement of coal energy generation intensify

 As the outlook for emission-intensive technologies worsens and carbon prices rise, more and more early coal retirements have been announced. Utilities in Europe are expected to continue transitioning from coal energy generation under efforts to meet stringent carbon emissions reduction targets and as they try to prepare themselves for future business models that they anticipate to be entirely low-carbon reliant.

6. Increase in wholesale electricity prices

In recent months, more expensive emission allowances, along with rising gas prices, have driven up wholesale electricity prices on many European markets to levels last seen at the beginning of 2019. The effect was most pronounced in countries that are dependent on coal and lignite. The wholesale electricity prices dynamic is expected to filter through to retail prices.

The rapid sales growth in the EVs sector was accompanied by expanding charging infrastructure. The number of high-power charging points per 100 km of highways rose from 12 to 20 in 2020.

 

Related News

View more

State-sponsored actors 'very likely' looking to attack electricity supply, says intelligence agency

Canada Critical Infrastructure Cyber Risks include state-sponsored actors probing the electricity grid and ICS/OT, ransomware on utilities, and espionage targeting smart cities, medical devices, and energy networks, pre-positioning for disruptive operations.

 

Key Points

Nation-state and criminal cyber risks to Canada's power, water, and OT/ICS, aiming to disrupt, steal data, or extort.

✅ State-sponsored probing of power grid and utilities

✅ OT/ICS exposure grows as systems connect to IT networks

✅ Ransomware, espionage, and pre-positioning for disruption

 

State-sponsored actors are "very likely" trying to shore up their cyber capabilities to attack Canada's critical infrastructure — such as the electricity supply, as underscored by the IEA net-zero electricity report indicating rising demand for clean power, to intimidate or to prepare for future online assaults, a new intelligence assessment warns.

"As physical infrastructure and processes continue to be connected to the internet, cyber threat activity has followed, leading to increasing risk to the functioning of machinery and the safety of Canadians," says a new national cyber threat assessment drafted by the Communications Security Establishment.

"We judge that state-sponsored actors are very likely attempting to develop the additional cyber capabilities required to disrupt the supply of electricity in Canada, even as cleaning up Canada's electricity remains critical for climate goals."

Today's report — the second from the agency's Canadian Centre for Cyber Security wing — looks at the major cyber threats to Canadians' physical safety and economic security.

The CSE does say in the report that while it's unlikely cyber threat actors would intentionally disrupt critical infrastructure — such as water and electricity supplies — to cause major damage or loss of life, they would target critical organizations "to collect information, pre-position for future activities, or as a form of intimidation."

The report said Russia-associated actors probed the networks of electricity utilities in the U.S. and Canada last year and Chinese state-sponsored cyber threat actors have targeted U.S. utility employees. Other countries have seen their industrial control systems targeted by Iranian hacking groups and North Korean malware was found in the IT networks of an Indian power plant, it said.

The threat grows as more critical infrastructure goes high-tech.

In the past, the operational technology (OT) used to control dams, boilers, electricity and pipeline operations has been largely immune to cyberattacks — but that's changing as manufacturers incorporate newer information technology in their systems and products and as the race to net-zero drives grid modernization, says the report.

That technology might make things easier and lower costs for utilities already facing debates over electricity prices in Alberta amid affordability concerns, but it comes with risks, said Scott Jones, the head of the cyber centre.

"So that means now it is a target, it is accessible and it's vulnerable. So what you could see is shutting off of transmission lines, you can see them opening circuit breakers, meaning electricity simply won't flow to our homes to our business," he told reporters Wednesday.

While the probability of such attacks remains low, Jones said the goal of Wednesday's briefing is to send out the early warnings.

"We're not trying to scare people. We're certainly not trying to scare people into going off grid by building a cabin in the woods. We're here to say, 'Let's tackle these now while they're still paper, while they're still a threat we're writing down.'"

Steve Waterhouse, a former cybersecurity officer for the Department of National Defence who now teaches at Université de Sherbrooke, said a saving grace for Canada could be the makeup of its electrical systems.

"Since in Canada, they're very centralized, it's easier to defend, and debates about bridging Alberta and B.C. electricity aim to strengthen resilience, while down in the States, they have multiple companies all around the place. So the weakest link is very hard to identify where it is, but the effect is a cascading effect across the country ... And it could impact Canada, just like we saw in the big Northeastern power outage, the blackout of 2003," he said.

"So that goes to say, we have to be prepared. And I believe most energy companies have been taking extra measures to protect and defend against these type of attacks, even as Canada points to nationwide climate success in electricity to meet emissions goals."

In the future, attacks targeting so-called smart cities and internet-connected devices, such as personal medical devices, could also put Canadians at risk, says the report. 

Earlier this year, for example, Health Canada warned the public that medical devices containing a particular Bluetooth chip — including pacemakers, blood glucose monitors and insulin pumps — are vulnerable to cyber attacks that could crash them.

The foreign signals intelligence agency also says that while state-sponsored programs in China, Russia, Iran and North Korea "almost certainly" pose the greatest state-sponsored cyber threats to Canadian individuals and organizations, many other states are rapidly developing their own cyber programs.

Waterhouse said he was glad to see the government agency call out the countries by name, representing a shift in approach in recent years.

"To tackle on and be ready to face a cyber-attack, you have to know your enemy," he said.

"You have to know what's vulnerable inside of your organization. You have to know how ... vulnerable it is against the threats that are out there."


Commercial espionage continues
State-sponsored actors will also continue their commercial espionage campaigns against Canadian businesses, academia and governments — even as calls to make Canada a post-COVID manufacturing hub grow — to steal Canadian intellectual property and proprietary information, says the CSE.

"We assess that these threat actors will almost certainly continue attempting to steal intellectual property related to combating COVID-19 to support their own domestic public health responses or to profit from its illegal reproduction by their own firms," says the "key judgments" section of the report.

"The threat of cyber espionage is almost certainly higher for Canadian organizations that operate abroad or work directly with foreign state-owned enterprises."

The CSE says such commercial espionage is happening already across multiple fields, including aviation, technology and AI, energy and biopharmaceuticals.

While state-sponsored cyber activity tends to offer the most sophisticated threats, CSE said that cybercrime continues to be the threat most likely to directly affect Canadians and Canadian organizations, through vectors like online scams and malware.

"We judge that ransomware directed against Canada will almost certainly continue to target large enterprises and critical infrastructure providers. These entities cannot tolerate sustained disruptions and are willing to pay up to millions of dollars to quickly restore their operations," says the report.


Cybercrime becoming more sophisticated 
According to the Canadian Anti-Fraud Centre, Canadians lost over $43 million to cybercrime last year. The CSE reported earlier this year that online thieves have been using the COVID-19 pandemic to trick Canadians into forking over their money — through scams like a phishing campaign that claimed to offer access to a Canada Emergency Response Benefit payment in exchange for the target's personal financial details.

Online foreign influence activities — a dominant theme in the CSE's last threat assessment briefing — continue and constitute "a new normal" in international affairs as adversaries seek to influence domestic and international political events, says the agency.

"We assess that, relative to some other countries, Canadians are lower-priority targets for online foreign influence activity," it said.

"However, Canada's media ecosystem is closely intertwined with that of the United States and other allies, which means that when their populations are targeted, Canadians become exposed to online influence as a type of collateral damage."

According to the agency's own definition, "almost certainly" means it is nearly 100 per cent certain in its analysis, while "very likely" means it is 80-90 per cent certain of its conclusions. The CSE says its analysis is based off of a mix of confidential and non-confidential intelligence and sources. 

 

Related News

View more

Fish boom prompts energy conglomerate to spend $14.5M to bury subsea cables

Maritime Link Cable Burial safeguards 200-kV subsea cables in the Cabot Strait as Emera and Nova Scotia Power trench lines to mitigate bottom trawling risks from a redfish boom, ensuring Muskrat Falls hydro delivery.

 

Key Points

Trenching Cabot Strait subsea power cables to prevent redfish-driven bottom trawling and ensure Muskrat Falls power.

✅ $14.492M spent trenching 59 km at 400 m depth

✅ Protects 200-kV, 170-km subsea interconnects from trawls

✅ Driven by Gulf redfish boom; DFO and UARB consultations

 

The parent company of Nova Scotia Power disclosed this week to the Utility and Review Board, amid Site C dam watchdog attention to major hydro projects, that it spent almost $14,492,000 this summer to bury its Maritime Links cables lying on the floor of the Cabot Strait between Newfoundland and Cape Breton.

It's a fish story no one saw coming, at least not Halifax-based energy conglomerate Emera.

The parent company of Nova Scotia Power disclosed this week to the Utility and Review Board that it spent almost $14,492,000 this summer to bury its Maritime Link cables lying on the floor of the Cabot Strait between Newfoundland and Cape Breton.

The cables were protected because an unprecedented explosion in the redfish population in the Gulf of St Lawrence is about to trigger a corresponding boom in bottom trawling in the area.

Also known as ocean perch, redfish were not on anyone's radar when the $1.5-billion Maritime Link was designed and built to carry Muskrat Falls hydroelectricity from Newfoundland to Nova Scotia.

The two 200-kilovolt electrical submarine cables spanning the Cabot Strait are the longest in North America, compared with projects like the New England Clean Power Link planned further south. They are each 170 kilometres long and weigh 5,500 tonnes.

Nova Scotia Power customers are paying for the Maritime Link in return for a minimum of 20 per cent of the electricity generated by Muskrat Falls over 35 years.

The electricity is supposed to start sending first electricity through the Maritime Link in mid-2020.

First time cost disclosed
In August, the company buried 59 kilometres of subsea cables one metre below the bottom at depths of 400 metres.

"These cables had not been previously trenched due to the absence of fishing activities at those depths when the cables were originally installed," spokesperson Jeff Myrick wrote in an email to CBC News in October.

Ratepayers will get the bill next year, as utilities also face risks like copper theft that can drive costs in the region. Until now, the company had declined to release costs relating to protecting the Maritime Link.

The bill will be presented to regulators, a process that has affected projects such as a Manitoba Hydro line to Minnesota, when the company applies to recover Maritime Link costs from Nova Scotia Power ratepayers in 2020.

Myrick said the company was acting after consultation with the Department of Fisheries and Oceans.

Unexpected consequences
After years of overfishing in the 1980s and early 1990s, redfish quotas were slashed and a moratorium imposed on some redfish.

Confusingly, there are actually two redfish species in the Gulf of St. Lawrence.

But very strong recent year classes, that have coincided with warming waters in the gulf, as utilities adapt to climate change considerations grow, have produced redfish in massive numbers.

After years of overfishing, the redfish population is now booming in the Gulf of St. Lawrence. (Submitted by Marine Institute)
There is now believed to be three-million tonnes of redfish in the Gulf of St Lawrence.

The Department of Fisheries and Oceans is expected to increase quotas in the coming years and the fishing industry is gearing up in a big way.

Earlier this month, Scotia Harvest announced it will begin construction of a new $14-million fish plant in Digby next spring in part to process increased redfish catches.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Ontario Ministry of Energy proposes growing hydrogen economy through reduced electricity rates

Ontario Hydrogen Strategy accelerates green hydrogen via electrolysis, reduced electricity rates, and IESO pilots, leveraging ICI, interruptible rates, and surplus power to grow clean tech, low-carbon energy, and export markets across Ontario.

 

Key Points

A provincial plan to scale green hydrogen with electricity costs, IESO pilots, and surplus power to boost tech.

✅ Amends ICI to admit hydrogen producers from 50 kW demand

✅ Enables co-located electrolysers to use surplus curtailed power

✅ Offers interruptible rates via IESO pilot for flexible loads

 

The Ontario Ministry of Energy is seeking input on accelerating Ontario’s hydrogen economy. The province has been promoting growth in the clean tech sector, including low-carbon energy production and the Hydrogen Innovation Fund, as an avenue for post-COVID-19 economic recovery. Hydrogen produced through electrolysis (or “green hydrogen”) has been central to these efforts, complimenting both federal and provincial initiatives to create vibrant domestic and export markets for the energy as a principal alternative to conventional fossil fuels.

On April 14, 2022, the Ministry filed a proposal (the Proposal) on the Environmental Registry of Ontario (ERO) to gather input from stakeholders, aligning with the province’s industrial electricity pricing consultation underway. As part of Ontario’s Hydrogen Strategy, the Ministry is considering several options that would provide reduced electricity rates for green hydrogen producers to make production more economically competitive with other energies. To date, the relatively high production cost of green hydrogen has been a challenge facing its adoption, both domestically and internationally.

The Proposal features three options:

  • Amending the rules for the Industrial Conservation Initiative (ICI) applicable to hydrogen producers;
  • Enabling onsite hydrogen production using electricity that would otherwise be curtailed; and
  • Providing an interruptible electricity rate for hydrogen producers.

Option 1: Amending the ICI rules

Option 1 would amend the ICI rules to allow all hydrogen producers with an average monthly peak demand of 50kW to participate. Hydrogen producers’ facilities could qualify for ICI in the first year of operation with a peak demand factor determined based on a deemed consumption profile, using a method yet to be determined by the Ministry. At the end of the first year, their global adjustment (GA) charges would be reconciled based on their actual consumption pattern. As set out in our prior article, GA was introduced by the province in January 2005 to ensure reliable, sustainable and a diverse supply of power at stable and competitive prices, aligning with plans to rely on battery storage to meet rising energy demand. The Ministry’s current proposal would require hydrogen producers to place a security deposit for their facilities’ first year of operation with the Independent Electricity System Operator (IESO) or their Local Distribution Company (LDC) to ensure other consumer would not be adversely affected.

Option 2: Enable onsite hydrogen production using surplus electricity

Option 2 would allow businesses to co-locate hydrogen electrolysers at electricity generation facilities, drawing on recent electrolyzer investment trends, to make use of what would become curtailed generation. Under this option in the Proposal, the developer for the hydrogen production facility would be required to be a separate legal entity from the one that owns or operates the electricity generation facility. Based on this required level of independence, the hydrogen developer would be required to pay the electricity generator for the electricity supply.

At this stage, it is not clear whether, or how the generator would be required to share the revenue with other consumers. The next steps of the Proposal may require regulatory amendments, and/or amendments to electricity generator’s contracts, consistent with efforts enabling storage in Ontario's electricity system to integrate flexible resources.

Option 3: Interruptible electricity rates for hydrogen producers

In 2021, the Ministry posted a proposal on the ERO including an Interruptible Rate Pilot that was to be developed in conjunction with the IESO in order to address stakeholder feedback received during the 2019 Industrial Consultation specific to the challenges of identifying and responding to peak demand events while participating in the ICI. The pilot was targeted towards large electricity consumers, where participants were charged GA at a reduced rate in exchange for agreeing to reduce consumption during system or local reliability events, as identified by IESO.

Option 3 would allow for the introduction for a dedicated stream for hydrogen producers into the interruptible rate pilot, which is currently under development with the IESO. This would take into account the unique circumstances of hydrogen producers, as well as the importance of the hydrogen sector in Ontario’s Low-Carbon Hydrogen Strategy. Under the pilot, participants would be given advance notice by the IESO to reduce demand over a fixed number of hours, several times each year, and emerging vehicle-to-grid models where EV owners can sell electricity back to the grid highlight additional flexibility options. Ultimately, the pilot would support low-carbon hydrogen production by offering large electricity consumers, such as hydrogen producers, reduced electricity rates in exchange for reduces consumption during system or local reliability events.

Following this initial development work, the Ministry intends to consult with stakeholders later this year to determine design details, as well as the timing for the potential roll out of the proposed pilot.

Key takeaways

The design options are not meant to be mutually exclusive, and might be pursued by the Ministry in combination. Ultimately, Ontario is focusing on ways to reduce electricity rates in an attempt to make the province a leader in the adoption of green hydrogen, as made clear in the Ontario Hydrogen Strategy, even as an electricity supply crunch looms, underscoring the urgency. Stakeholders will want to participate in this process given its long-term implications for both the hydrogen and power sectors.

 

Related News

View more

U.S. Residents Averaged Fewer Power Outages in 2022

2022 U.S. Power Outage Statistics show lower SAIDI as fewer major events hit, with SAIFI trends, electric reliability, outage duration and frequency shaped by hurricanes, winter storms, vegetation, and utility practices across states.

 

Key Points

They report SAIDI and SAIFI for 2022, showing outage duration, frequency, and impacts of major weather events.

✅ 2022 SAIDI averaged 5.6 hours; SAIFI averaged 1.4 interruptions.

✅ Fewer major events lowered outage duration versus 2021.

✅ Hurricanes and winter storms drove long outages in several states.

 

In 2022, U.S. electricity consumers on average experienced about 5.5 hours of power disruptions, a decrease from nearly two hours compared to 2021. This information comes from the latest Annual Electric Power Industry Report. The reduction in yearly power interruptions primarily resulted from fewer significant events in 2022 compared to the previous year, and utility disaster planning continues to support grid resilience as severe weather persists.

Since 2013, excluding major events, the annual average duration of power interruptions has consistently hovered around two hours. Factors contributing to major power disruptions include weather-related incidents, vegetation interference near power lines, and specific utility practices, while pandemic-related grid operations influenced workforce planning more than outage frequency. To assess the reliability of U.S. electric utilities, two key indexes are utilized:

  • The System Average Interruption Duration Index (SAIDI) calculates the total length (in hours) an average customer endures non-brief power interruptions over a year.
  • The System Average Interruption Frequency Index (SAIFI) tracks the number of times interruptions occur.

The influence of major events on electrical reliability is gauged by comparing affected states' SAIDI and SAIFI values against the U.S. average, which was 5.6 hours of outages and 1.4 outages per customer in 2022. The year witnessed 18 weather-related disasters in the U.S., each resulting in over $1 billion in damages, and COVID-19 grid assessments indicated the electricity system was largely safe from pandemic impacts. Noteworthy major events include:

  • Hurricane Ian in September 2022, leaving over 2.6 million Floridian customers without electricity, with restoration in some areas taking weeks rather than days.
  • Hurricane Nicole in November 2022, causing over 300,000 Florida customers to lose power.
  • Winter Storm Elliott in December 2022, affecting over 1.5 million customers in multiple states including Texas where utilities struggled after Hurricane Harvey to restore service, and Florida, and bringing up to four feet of snow in parts of New York.

In 2022, states like Florida, West Virginia, Maine, Vermont, and New Hampshire experienced the most prolonged power interruptions, with New Hampshire averaging 10.3 hours and Florida 19.1 hours, and FPL's Irma storm response illustrates how restoration can take days or weeks in severe cases. Conversely, the District of Columbia, Delaware, Rhode Island, Nebraska, and Iowa had the shortest total interruptions, with the District of Columbia averaging just 34 minutes and Iowa 85 minutes.

The frequency of outages, unlike their duration, is more often linked to non-major events. Across the nation, Alaska recorded the highest number of power disruptions per customer (averaging 3.5), followed by several heavily forested states like Tennessee and Maine. Power outages due to falling tree branches are common, particularly during winter storms that burden tree limbs and power lines, as seen in a North Seattle outage affecting 13,000 customers. The District of Columbia stood out with the shortest and fewest outages per customer.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified