Battery maker seeks to raise $225 million in IPO

By MarketWatch


NFPA 70e Training

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$199
Coupon Price:
$149
Reserve Your Seat Today
A123 Systems, an eight-year-old battery builder launched by engineers from the Massachusetts Institute of Technology, could attain a market capitalization of nearly $1 billion when it goes public later this month.

That's not bad considering the company has yet to turn a profit.

Watertown, Mass.-based A123 Systems plans to offer 25.7 million shares at an estimated price range of $8 to $9.50 a share, in a bid to raise about $225 million with underwriters Morgan Stanley and Goldman Sachs.

A123 Systems is banking on a surge in business tied to a rise in electric vehicles, along with successes including adding Chrysler to its customer list and a $249 million grant under the federal stimulus package. Among its investors are General Electric Co. (GE), Qualcomm Inc., Motorola Inc. and North Bridge Venture Partners.

With a total of 100.4 million shares outstanding after the IPO, A123 would carry a market cap of about $880 million if the deal prices at $8.75 a share, the midpoint of its estimated price range.

It's expected to price its deal next week for trading on the Nasdaq under the symbol "AONE."

John Fitzgibbon of IPOscoop.com said he expects A123 to gain about $1 a share in its opening day, based on interviews with IPO bankers. "People think they're riding the green tech wave," he commented.

A123 Systems - which designs and develops batteries and battery systems for BMW, Chrysler, GM and other manufacturers and suppliers for multiple-passenger vehicle models - marks the second U.S.-based green technology company to emerge in the IPO market this year after the debut of wind-turbine maker Broadwind Energy Inc. on April 8.

Based on data from IHS Global Insight, the number of hybrid electric, plug-in hybrid and electric cars will grow from 19 models in 2009 at an annual production rate of at least 20,000 vehicles to more than 150 models in 2014 and more than 200 models in 2019, A123 said in its IPO filing.

A.T. Kearney projects the market will grow to approximately $21.8 billion by 2015 and $74.1 billion by 2020, stoked by governmental regulation, emerging powertrain technology and rising consumer demand.

Founded in 2001, A123 Systems' proprietary "Nanophosphate" technology was initially developed at MIT. Two of the company's three founders listed on its Web site hail from the school, including Yet-Ming Chiang, who also co-founded American Superconductor Corp. in 1987.

The company reported a loss of $40.7 million on revenue of $42.9 million in the six months ended June 30. In the year-ago period, it lost $33 million on revenue of $21.9 million. A123 lost $81 million in 2008 and $31 million in 2007. It also reported 1,672 employees as of August 31, up from 227 at the start of 2007.

Black & Decker Corp. and marquee auto brand Mercedes have been major customers. For the six months ended June 30, business from BAE Systems PLC represented 37% of A123's revenue.

In April, the firm raised $69 million in venture financing with participation from General Electric. GE executive Mark M. Little now sits on the company's board.

On August 6, A123 won $249 million in federal stimulus funds, which the company plans to use to build factories for making batteries.

Related News

The Power Sector’s Most Crucial COVID-19 Mitigation Strategies

ESCC COVID-19 Resource Guide outlines control center continuity, sequestration, social distancing, remote operations, testing priorities, mutual assistance, supply chain risk, and PPE protocols to sustain grid reliability and plant operations during the COVID-19 pandemic.

 

Key Points

An industry guide to COVID-19 mitigation for the power sector covering control centers, testing, PPE, and mutual aid.

✅ Control center continuity: segregation, remote ops, reserve shifts

✅ Sequestration triggers, testing priorities, and PPE protocols

✅ Mutual assistance, supply chain risk, and workforce planning

 

The latest version of the Electricity Subsector Coordinating Council’s (ESCC’s) resource guide to assess and mitigate COVID-19 suggests the U.S. power sector continues to grapple with key concerns involving control center continuity, power plant continuity, access to restricted and quarantined areas, mutual assistance, and supply chain challenges, alongside urban demand shifts seen in Ottawa’s electricity demand during closures.

In its fifth and sixth versions of the “ESCC Resource Guide—Assessing and Mitigating the Novel Coronavirus (COVID-19),” released on April 16 and April 20, respectively, the ESCC expanded its guidance as it relates to social distancing and sequestration within tight power sector environments like control centers, crucial mitigation strategies that are designed to avoid attrition of essential workers.

The CEO-led power sector group that serves as a liaison with the federal government during emergencies introduced the guide on March 23, and it provides periodic updates  sourced from “tiger teams,” which are made up of representatives from investor-owned electric companies, public power utilities, electric cooperatives, independent power producers (IPPs), and other stakeholders. Collating regulatory updates and emerging resources, it serves as a general shareable blueprint for generators,  transmission and distribution (T&D) facilities, reliability coordinators, and balancing authorities across the nation on issues the sector is facing as the COVID-19 pandemic endures.

Controlling Spread at Control Centers
While control centers are typically well-isolated, physically secure, and may be conducive to on-site sequestration, the guide is emphatic that staff at these facilities are typically limited and they need long lead times to be trained to properly use the information technology (IT) and operational technology (OT) tools to keep control centers functioning and maintain grid visibility. Control room operators generally include: reliability engineers, dispatchers, area controllers, and their shift supervisors. Staff that directly support these function, also considered critical, consist of employees who maintain and secure the functionality of the IT and OT tools used by the control room operators.

In its latest update, the ESCC notes that many entities took “proactive steps to isolate their control center facilities from external visitors and non-essential employees early in the pandemic, leveraging the presence of back-up control centers, self-quarantining of employees, and multiple shifts to maximize social distancing.” To ensure all levels of logistical and operational challenges posed by the pandemic are addressed, it envisions several scenarios ranging from mild contagion—where a single operator is affected at one of two control center sites to the compromise of both sites.

Previous versions of the guide have set out universal mitigation strategies—such as clear symptom reporting, cleaning, and travel guidance. To ensure continuity even in the most dire of circumstances, for example, it recommends segregating shifts, and even sequestering a “complete healthy shift” as a “reserve” for times when minimum staffing levels cannot be met. It also encourages companies to develop a backup staff of retirees, supervisors, managers, and engineers that could backfill staffing needs.

Meanwhile, though social distancing has always been a universal mitigation strategy, the ESCC last week detailed what social distancing at a control room could look like. It says, for example, that entities should consider if personnel can do their jobs in spaces adjacent to the existing control room; moving workstations to allow at least six feet of space between employees; or designating workstations for individual operators. The guide also suggests remote operations outside of a single control room as an option, and some markets are exploring virtual power plant models in the UK to support flexibility, though it underscores that not all control center operations can be performed remotely, and remote operations increase the potential for security vulnerabilities. “The NERC [North American Electric Reliability Corp.] Reliability Standards address requirements for BES [bulk electric system] control centers and security controls for remote access of systems, applications, or data,” the resource guide notes.

Sequestration—Highly Effective but Difficult
Significantly, the new update also clarifies circumstances that could “trigger” sequestration—or keeping mission-essential workers at facilities. Sequestration, it notes, “is likely to be the most effective means of reducing risk to critical control center employees during a pandemic, but it is also the most resource- and cost-intensive option to implement.”

It is unclear exactly how many power sector workers are currently being sequestered at facilities. According to the  American Public Power Association (APPA), as of last week, the New York Power Authority was sequestering 82 power plant control room and transmission control operator, amid New York City’s shifting electric rhythms during COVID-19; the Sacramento Municipal Utility District (SMUD) in California had begun sequestering critical employees; and the Electric & Gas Utility at the City of Tallahassee had 44 workers being rotated in and out of sequestration. Another 37 workers from the New York ISO were already being sequestered or housed onsite as of April 9. PJM began sequestering a team of operators on April 11, and National Grid was sequestering 200 employees as of April 12. 

Decisions to trigger sequestration at T&D and other grid monitoring facilities are typically driven by entities’ risk assessment, ESCC noted. Considerations may involve: 

The number of people showing symptoms or testing positive as a percentage of the population in a county or municipality where the control center is sited. One organization, for example, is considering a lower threshold of 10% community infection as a trigger of “officer-level decision” to determine whether to sequester. A higher threshold of 20% “mandates a move to sequestration,” ESCC said.
The number of essential workers showing symptoms or having tested positive. “Acceptable risk should be based on the minimum staffing requirements of the control center and should include the availability of a reserve shift for critical position backfills. For example, shift supervisors are commonly certified in all positions in the control center, and the unavailability of more than one-third of a single organization’s shift supervisors could compromise operations,” it said.
The rate of infection spread across a geographic region. In the April 20 version, the guide removes specific mention that cases are doubling “every 3–5 days or more frequently in some areas.” It now says:  “Considering the rapid spread of COVID-19, special care should be taken to identify the point at which control center personnel are more likely than not to come into contact with an infected individual during their off-shift hours.”
Generator Sequestration Measures Vary
Generators, meanwhile, have taken different approaches to sequester generation operators. Some have reacted to statewide outbreaks, others to low reserves, and others still, as with one IPP, to control exposure to smaller staffs, which cannot afford attrition. The IPP, for example, decided sequestration was necessary because it “did not want to wait for confirmed cases in the workforce.” That company sequestered all its control room operators, outside operators, and instrumentation and control technicians.

The ESCC resource guide says workers are being sequestered in several ways. On-site, these could range from housing workers in two separate areas, for example, or in trailers brought in. Off-site, workers may be housed in hotel rooms, which the guide notes, “are plentiful.”

Location makes a difference, it said: “Onsite requires more logistical co-ordination for accommodations, food, room sanitization, linens, and entertainment.”  To accommodate sequestered workers, generators have to consider off-site food and laundry services (left at gates for pick-up)—and even extending Wi-Fi for personal use. Generators are learning from each other about all aspects of sequestration—including how to pay sequestered workers. It suggests sequestered workers should receive pay for all hours inside the plant, including straight time for regularly scheduled hours and time-and-a-half for all other hours. To maintain non-sequestered employees, who are following stay-at-home protocols, pay should remain regularly scheduled, it says.

Testing Remains a Formidable Hurdle
Though decisions to sequester differ among different power entities, they appear commonly complicated by one prominent issue: a dearth of testing.

At the center of a scuffle between the federal and state governments of late, the number of tests has not kept pace with the severity of the pandemic, and while President Trump has for some weeks claimed that “Testing is a local thing,” state officials, business leaders—including from the power sector—and public health experts say that it is far short of the several hundred thousands or perhaps even millions of daily tests it might take to safely restart the economy, even as calls to keep electricity options open grow among policymakers, a three-phase approach for which the Trump administration rolled out this week. While the White House said the approach is “based on the advice of public health experts, the suggestions do not indicate a specific timeframe. Some hard-hit states have committed to keeping current restrictions in place. New York on April 16 said it would maintain a shutdown order through May 15, while California published its own guidelines and states in the Northeast, Midwest, and West Coast entered regional pacts that may involve interstate coordination on COVID-19–related policy going forward.

On Sunday, responding to a call by governors across the political spectrum that insisted the federal government should step up efforts to help states obtain vital supplies for tests, Trump said the federal government will be “using” and “preparing to use” the Defense Production Act to increase swab production.

For the power entities that are part of the ESCC, widespread testing underlies many mitigation strategies. The group’s generation owners and operating companies, which include members from the full power spectrum, have said testing is central to “successful mitigation of risk to control center continuity.”

In the updated guide, the entities recommend requesting that governmental authorities—it is unclear whether the focus should be on the federal or state governments—“direct medical facilities to prioritize testing for asymptomatic generation control room operators, operator technicians, instrument and control technicians, and the operations supervisor (treat comparable to first responders) in advance of sequestered, extended-duration shifts; and obtain state regulatory approval for corporate health services organizations to administer testing for coronavirus to essential employees, if applicable.”

The second priority, as crucial, involves asking the government to direct medical facilities to prioritize testing for control room operators before they are sequestered or go into extended-duration shifts.

Generators also want local, regional, state, and federal governments to ensure operators of generating facilities are allowed to move freely if “populace-wide quarantine/curfew or other travel restrictions” are enacted. Meanwhile,  they have also asked federal agencies and state permitting agencies to allow for non-compliance operations of generating facilities in case enough workers are not available.

Lower on its list, but still “medium priority,” is that the government should obtain authority for priority supply of sanitizing supplies and personal protective equipment (PPE) for generating facilities. They are also asking states to allow power plant employees (as opposed to crucially redirected medical personnel) to administer health questionnaires and temperature checks without Americans with Disabilities Act or other legal constraints. Newly highlighted in the update, meanwhile, is an emphasis on enough fire retardant (FR) vests and hoods and PPE, including masks and face coverings, so technicians don’t have to share them.

The worst-case scenario envisioned for generators involves a 40% workforce attrition, a nine-month pandemic, and no mutual assistance. As the update suggests, along with universal mitigation strategies, some power companies are eliminating non-essential work that would require close contact, altering assignments so work tasks are done by paired teams that do not rotate, and ensuring workers wear masks. The resource guide includes case studies and lessons learned so far, and all suggest pandemic planning was crucial to response. 

Gearing Up for Mutual Assistance—Even for Generation—During COVID-19
Meanwhile, though the guide recognizes that protecting employees is a key priority for many entities, it also lauds the crucial role mutual assistance plays in the sector’s collective response to the pandemic, even as coal and nuclear plant closures test just transition planning across regions. Mutual assistance is a long-standing power sector practice in the U.S. Last week, for example, as severe weather impacted the southern and eastern portions of the U.S., causing power outages for 1.3 million customers at the peak, the sector demonstrated the “versatility of mutual assistance processes,” bringing in additional workers and equipment from nearby utilities and contractors to assist with assessment and repair. “Crews utilized PPE and social distancing per the CDC [Centers for Disease Control and Prevention] and OSHA [Occupational Safety and Health Administration] guidelines to perform their restoration duties,” the Energy Department told POWER.

But as the ESCC’s guide points out, mutual assistance has traditionally been deployed to help restore electric service to customers, typically focused on T&D infrastructure. The COVID-19 pandemic, uniquely, “has motivated generation entities to consider the use of mutual assistance for generation plant operation” it notes. As with the model it proposes to ensure continuity of control centers, mutual aid poses key challenges, such as for task variance, knowledge of operational practice, system customization, and legal indemnification.

Among guidelines ESCC proposes for generators are to use existing employee work stoppage plans as a resource in planning for the use of personnel not currently assigned to plant operation. It urges, for example, that generators keep a list of workers with skills who can be called from corporate/tech support (such as former operators or plant engineers/managers), or retirees and other individuals who could be called upon to help operate the control room first. ESCC also recommends considering the use of third-party contractor operations to supplement plant operations.

Key to these efforts is to “Create a thorough list of experience and qualifications needed to operate a particular unit. Important details include fuel type, OEM [original equipment manufacturer] technology, DCS [distributed control system] type, environmental controls, certifications, etc,” it says. “Consider proactively sharing this information internally within your company first and then with neighboring companies”—and that includes sufficient detail from manufacturers (such as Emerson Ovation, GE Mark VI, ABB, Honeywell)—“without exposing proprietary information.” One way to control this information is to develop a mutual assistance agreement with “strategic” companies within the region or system, it says.

Of specific interest is that the ESCC also recommends that generators consider “leaving units in extended or planned maintenance outage in that state as long as possible.” That’s because, “Operators at these offline sites could be considered available for a site responding to pandemic challenges,” it says.

However, these guidelines differ by resource. Nuclear generators, for example, already have robust emergency plans that include minimum staffing requirements, and owing to regulations, mutual aid is managed by each license holder, it says. However, to provide possible relief for attrition at operating nuclear plants, the Nuclear Regulatory Commission (NRC) on March 28 outlined a streamlined process that could allow nuclear operators to obtain exemptions from work hour rules, while organizations also point to IAEA low-carbon electricity lessons for future planning.

Uncertainty of Supply Chain Endurance
As the guide stresses, operational continuity during the pandemic will require that all power entities maintain supply of inputs and physical equipment. To help entities plan ahead—by determining volumes needed and geographic location of suppliers—it lists the most important materials needed for power delivery and bulk chemicals. “Clearly, the extent and duration of this emergency will influence the importance of one supply chain component compared to another,” it says.

As Massachusetts Institute of Technology supply chain expert David Simchi-Levi noted on April 13, global supply chains have been heavily taxed by the pandemic, and manufacturing activities in the European Union and North America are still going offline. China is showing signs of slow recovery. Even in the best-case scenario, however—even if North America and Europe manage to control and reduce the pandemic—the supply chain will likely experience significant logistical capacity shortages, from transportation to warehousing. Owing to variability in timing, he suggested that companies plan to reconfigure supply chains and reposition inventory in case suppliers go out of business or face quarantine, while some industry groups urge investing in hydropower as part of resilient recovery strategies.

Also in short supply, according to ESCC, is industry-critical PPE. “While our sector recognizes that the priority is to ensure that PPE is available for workers in the healthcare sector and first responders, a reliable energy supply is required for healthcare and other sectors to deliver their critical services,” its resource guide notes. “The sector is not looking for PPE for the entire workforce. Rather, we are working to prioritize supplies for mission-essential workers – a subset of highly skilled energy workers who are unable to work remotely and who are mission-essential during this extraordinary time.”

Among critical industry PPE needs are nitrile gloves, shoe covers, Tyvek suits, goggles/glasses, hand sanitizer, dust masks, N95 respirators, antibacterial soap, and trashbags. While it provides a list of non-governmental PPE vendors and suppliers, the guide also provides several “creative” solutions. These include, for example, formulations for effective hand sanitizer; 3D printer face shield files; methods for decontaminating face piece respirators and other PPE; and instructions for homemade masks with pockets for high-efficiency particulate air (HEPA) filter inserts.

 

Related News

View more

Russian hackers accessed US electric utilities' control rooms

Russian Utility Grid Cyberattacks reveal DHS findings on Dragonfly/Energetic Bear breaching control rooms and ICS/SCADA via vendor supply-chain spear-phishing, threatening blackouts and critical infrastructure across U.S. power utilities through stolen credentials and reconnaissance.

 

Key Points

State-backed ops breaching utilities via vendors to reach ICS/SCADA, risking grid disruption and control-room access.

✅ Spear-phishing and watering-hole attacks on vendor networks

✅ Stolen credentials used to reach isolated ICS/SCADA

✅ Potential to trigger localized blackouts and service disruptions

 

Hackers working for Russia were able to gain access to the control rooms of US electric utilities last year, allowing them to cause blackouts, federal officials tell the Wall Street Journal.

The hackers -- working for a state-sponsored group previously identified as Dragonfly or Energetic Bear -- broke into utilities' isolated networks by hacking networks belonging to third-party vendors that had relationships with the power companies, the Department of Homeland Security said in a press briefing on Monday.

Officials said the campaign had claimed hundreds of victims and is likely continuing, the Journal reported.

"They got to the point where they could have thrown switches" to disrupt the flow power, Jonathan Homer, chief of industrial-control-system analysis for DHS, told the Journal.

"While hundreds of energy and non-energy companies were targeted, the incident where they gained access to the industrial control system was a very small generation asset that would not have had any impact on the larger grid if taken offline," the DHS said in a statement Tuesday. "Over the course of the past year as we continued to investigate the activity, we learned additional information which would be helpful to industry in defending against this threat."

Organizations running the nation's energy, nuclear and other critical infrastructure have become frequent targets for cyberattacks in recent years due to their ability to cause immediate chaos, whether it's starting a blackout or blocking traffic signals. These systems are often vulnerable because of antiquated software and the high costs of upgrading infrastructure.

The report comes amid heightened tension between Russia and the US over cybersecurity, alongside US condemnation of power grid hacking in recent months. Earlier this month, US special counsel Robert Mueller filed charges against 12 Russian hackers tied to cyberattacks on the Democratic National Committee.

Hackers compromised US power utility companies' corporate networks with conventional approaches, such as spear-phishing emails and watering-hole attacks as seen in breaches at power plants across the US that target a specific group of users by infecting websites they're known to visit, the newspaper reported. After gaining access to vendor networks, hackers turned their attention to stealing credentials for access to the utility networks and familiarizing themselves with facility operations, officials said, according to the Journal.

Homeland Security didn't identify the victims, the newspaper reports, adding that some companies may not know they had been compromised because the attacks used legitimate credentials to gain access to the networks.

Cyberattacks on electrical systems aren't an academic matter. In 2016, Ukraine's grid was disrupted by cyberattacks attributed to Russia, which is engaged in territorial disputes with the country over eastern Ukraine and the Crimean peninsula. Russia has denied any involvement in targeting critical infrastructure.

President Donald Trump signed an executive order in May designed to bolster the United States' cybersecurity by protecting federal networks, critical infrastructure and the public online. One section of the order focuses on protecting the grid like electricity and water, as well as financial, health care and telecommunications systems.

The Department of Homeland Security didn't respond to a request for comment.

 

Related News

View more

Franklin Energy and Consumers Energy Support Small Businesses During COVID-19 with Virtual Energy Coaching

Consumers Energy Virtual Energy Coaching connects Michigan small businesses with remote efficiency experts to cut utility costs, optimize energy usage, and access rebates and incentives, delivering safe COVID-19-era support and long-term savings through tailored assessments.

 

Key Points

A remote coaching service helping small businesses improve energy efficiency, access rebates, and cut utility costs.

✅ Three-call virtual coaching with usage review and savings plan

✅ Connects to rebates, incentives, and financing options

✅ Eligibility: <=1,200,000 kWh, <=15,000 MCF annually

 

Franklin Energy, a leading provider in energy efficiency and grid optimization solutions, announced today that they will implement Consumers Energy's Small Business Virtual Energy Coaching Service in response to the COVID-19 pandemic and broader industry coordination with federal partners across the power sector.

This Michigan-wide offering to natural gas, electric and combination small business customers provides a complimentary virtual energy-coaching service to help small businesses find ways to reduce electricity bills and benefit from lower utility costs, both now during COVID-19 and into the future, informed by similar Ontario electricity bill support efforts in other regions. To be eligible for the program, small businesses must have electric usage at or below 1,200,000 kWh annually and gas usage at or below 15,000 MCF annually.

"By developing lasting customer relationships and delivering consistent solutions through conversation, the Energy Coaching Program offers the next level of support for small business customers," said Hollie Whitmire, Franklin Energy program manager. "Energy coaching is suitable for all small businesses, but it's ideal for businesses that are new to energy efficiency or for those that have had low engagement with energy efficiency offerings and emerging new utility rate designs in years past."

Through a series of three calls, eligible small businesses can speak with an energy coach to help them connect to the right program offering available through Consumers Energy's energy efficiency programs for businesses, including demand response models like the Ontario Peak Perks program that support load management. From answering questions to reviewing energy usage, conducting assessments, identifying savings opportunities, and more, the energy coach is available to help small businesses put money back into their pocket now, when it matters most.

"Consumers Energy is committed to helping Michigan's small business community prosper, now more than ever, with examples such as Entergy's COVID-19 relief fund underscoring industry support," said Lauren Youngdahl Snyder, Consumers Energy's vice president of customer experience. "We are excited to work with Franklin Energy to develop an innovative solution for our small business customers. The Virtual Energy Coaching Service lets us engage our customers in a safe and effective manner, as seen with utilities waiving fees in Texas during the crisis, and has the potential to last even past the COVID-19 pandemic."

 

Related News

View more

State-owned electricity generation firm could save Britons nearly 21bn a year?

Great British Energy could cut UK electricity costs via public ownership, investing in clean energy like wind, solar, tidal, and nuclear, curbing windfall profits, stabilizing bills, and reinvesting returns through a state-backed generator.

 

Key Points

A proposed state-backed UK generator investing in clean power to cut costs and return gains to taxpayers.

✅ Publicly owned investment in wind, solar, tidal, and nuclear

✅ Cuts electricity bills by reducing generators' windfall profits

✅ Funded via bonds or asset buyouts; non-profit operations

 

A publicly owned electricity generation firm could save Britons nearly £21bn a year, according to new analysis that bolsters Labour’s case to launch a national energy company if the party gains power.

Thinktank Common Wealth has calculated that the cost of generating electricity to power homes and businesses could be reduced by £20.8bn or £252 per household a year under state ownership, according to a report seen by the Guardian.

The Labour leader, Keir Starmer, has committed to creating “a publicly owned national champion in clean energy” named Great British Energy.

Starmer is yet to lay out the exact structure of the mooted company, although he has said it would not involve nationalising existing assets, or become involved in the transmission grid or retail supply of energy.

Starmer instead hopes to create a state-backed entity that would invest in clean energy – wind, solar, tidal, nuclear, large-scale storage and other emerging technologies – creating jobs and ensuring windfalls from the growth in low carbon power feed back to the government.

The Common Wealth report, which analysed scenarios for reforming the electricity market, said that a huge saving on electricity costs could be made by buying out assets such as wind, solar and biomass generators on older contracts and running them on a non-profit basis. Funding the measure could require a government bond issuance, or some form of compulsory purchase process.

Last year the government attempted to get companies operating low carbon generators, including nuclear power plants, on older contracts to switch to contracts for difference (CfD), allowing any outsized profits to flow back to taxpayers. However, the government later decided to tax eligible firms through the electricity generator levy instead.

The Common Wealth study concluded that a publicly owned low carbon energy generator would best deliver on Britain’s climate and economic goals, would eliminate windfall profits made by generators and would cut household bills significantly.

MPs and campaigners have argued that Britain’s energy companies should be nationalised since the energy crisis, even as coal-free records have multiplied and renewables still need more support, which has resulted in North Sea oil and gas producers and electricity generators making windfall profits, and a string of retail suppliers collapsing, costing taxpayers billions. Detractors of nationalisation in energy argue it can stifle innovation and expose taxpayers to huge financial risks.

Common Wealth pointed out that more than 40% of the UK’s offshore wind generation capacity was publicly owned by overseas national entities, meaning the benefits of high electricity prices linked to the war in Ukraine had flowed back to other governments.

The study found the publicly owned generator model would create more savings than other options, including a drive for voluntary CfDs; splitting the generation market between low carbon and fossil fuel sources at a time when wind and solar have outproduced nuclear, and a “single buyer model” with nationalised retail suppliers.

 

Related News

View more

Hydro One announces pandemic relief fund for Hydro One customers

Hydro One Pandemic Relief Fund offers COVID-19 financial assistance, payment flexibility, and Winter Relief to Ontario electricity customers facing hardship, with disconnection protection and customer support to help manage bills during the health crisis.

 

Key Points

COVID-19 aid offering bill credits, payment flexibility, and disconnection protection for electricity customers.

✅ Financial assistance and bill credits for hardship cases

✅ Flexible payment plans and extended Winter Relief

✅ No-disconnect policy and dedicated customer support hours

 

We are pleased to announce a Pandemic Relief Fund to assist customers affected by the novel coronavirus (COVID-19). As part of our commitment to customers, we will offer financial assistance as well as increased payment flexibility to customers experiencing hardship. The fund is designed to support customers impacted by these events and those that may experience further impacts.

In addition to this, we've also extended our Winter Relief program, aligning with our ban on disconnections policy so no customer experiencing any hardship has to worry about potential disconnection.

We recognize that this is a difficult time for everyone and we want our customers to know that we’re here to support them. We hope this fund and the added measures, such as extended off-peak rates that help provide our customers peace of mind so they can concentrate on what matters most — keeping their loved ones safe.

If you are concerned about paying your bill, are experiencing hardship or have been impacted by the pandemic, including electricity relief announced by the province, we want to help you. Call us to discuss the fund and see what options are available for you.


CUSTOMER CONTACT CENTRE HOURS
Call us at 1-888-664-9376

Monday to Friday from 7:30 a.m. to 8:00 p.m.

Saturdays from 9:00 a.m. to 3:00 p.m.


KEEPING ONTARIANS AND OUR ELECTRICITY SYSTEM SAFE
We recognize the critical role we play in powering communities across the province and our support for the Province of Ontario during COVID-19. This is a responsibility to employees, customers, businesses and the people of Ontario that we take very seriously.

Since the novel coronavirus (COVID-19) outbreak began, Hydro One’s Pandemic Team along with our leadership, have been actively monitoring the issues to ensure we can continue to deliver the service Ontarians depend on while keeping our employees, customers and the public safe, even as there has been no cut in peak hydro rates yet for self-isolating customers across Ontario. While the risk in Ontario remains low, we believe we can best protect our people and our operations by taking proactive measures.

As information continues to evolve, our leadership team along with the Pandemic Planning Team and our Emergency Operations Centre are committed to maintaining business continuity while minimizing risk to employees and communities.

Over the days and weeks to come, we will work with the sector and government, which is preparing to extend disconnect moratoriums across the province, to enhance safety protocols and champion the needs of electricity customers in Ontario.
 

 

Related News

View more

Purdue: As Ransomware Attacks Increase, New Algorithm May Help Prevent Power Blackouts

Infrastructure Security Algorithm prioritizes cyber defense for power grids and critical infrastructure, mitigating ransomware, blackout risks, and cascading failures by guiding utilities, regulators, and cyber insurers on optimal security investment allocation.

 

Key Points

An algorithm that optimizes security spending to cut ransomware and blackout risks across critical infrastructure.

✅ Guides utilities on optimal security allocation

✅ Uses incentives to correct human risk biases

✅ Prioritizes assets to prevent cascading outages

 

Millions of people could suddenly lose electricity if a ransomware attack just slightly tweaked energy flow onto the U.S. power grid, as past US utility intrusions have shown.

No single power utility company has enough resources to protect the entire grid, but maybe all 3,000 of the grid's utilities could fill in the most crucial security gaps if there were a map showing where to prioritize their security investments.

Purdue University researchers have developed an algorithm to create that map. Using this tool, regulatory authorities or cyber insurance companies could establish a framework for protecting the U.S. power grid that guides the security investments of power utility companies to parts of the grid at greatest risk of causing a blackout if hacked.

Power grids are a type of critical infrastructure, which is any network - whether physical like water systems or virtual like health care record keeping - considered essential to a country's function and safety. The biggest ransomware attacks in history have happened in the past year, affecting most sectors of critical infrastructure in the U.S. such as grain distribution systems in the food and agriculture sector and the Colonial Pipeline, which carries fuel throughout the East Coast, prompting increased military preparation for grid hacks in the U.S.

With this trend in mind, Purdue researchers evaluated the algorithm in the context of various types of critical infrastructure in addition to the power sector, including electricity-sector IoT devices that interface with grid operations. The goal is that the algorithm would help secure any large and complex infrastructure system against cyberattacks.

"Multiple companies own different parts of infrastructure. When ransomware hits, it affects lots of different pieces of technology owned by different providers, so that's what makes ransomware a problem at the state, national and even global level," said Saurabh Bagchi, a professor in the Elmore Family School of Electrical and Computer Engineering and Center for Education and Research in Information Assurance and Security at Purdue. "When you are investing security money on large-scale infrastructures, bad investment decisions can mean your power grid goes out, or your telecommunications network goes out for a few days."

Protecting infrastructure from hacks by improving security investment decisions

The researchers tested the algorithm in simulations of previously reported hacks to four infrastructure systems: a smart grid, industrial control system, e-commerce platform and web-based telecommunications network. They found that use of this algorithm results in the most optimal allocation of security investments for reducing the impact of a cyberattack.

The team's findings appear in a paper presented at this year's IEEE Symposium on Security and Privacy, the premier conference in the area of computer security. The team comprises Purdue professors Shreyas Sundaram and Timothy Cason and former PhD students Mustafa Abdallah and Daniel Woods.

"No one has an infinite security budget. You must decide how much to invest in each of your assets so that you gain a bump in the security of the overall system," Bagchi said.

The power grid, for example, is so interconnected that the security decisions of one power utility company can greatly impact the operations of other electrical plants. If the computers controlling one area's generators don't have adequate security protection, as seen when Russian hackers accessed control rooms at U.S. utilities, then a hack to those computers would disrupt energy flow to another area's generators, forcing them to shut down.

Since not all of the grid's utilities have the same security budget, it can be hard to ensure that critical points of entry to the grid's controls get the most investment in security protection.

The algorithm that Purdue researchers developed would incentivize each security decision maker to allocate security investments in a way that limits the cumulative damage a ransomware attack could cause. An attack on a single generator, for instance, would have less impact than an attack on the controls for a network of generators, which sophisticated grid-disruption malware can target at scale, rather than for the protection of a single generator.

Building an algorithm that considers the effects of human behavior

Bagchi's research shows how to increase cybersecurity in ways that address the interconnected nature of critical infrastructure but don't require an overhaul of the entire infrastructure system to be implemented.

As director of Purdue's Center for Resilient Infrastructures, Systems, and Processes, Bagchi has worked with the U.S. Department of Defense, Northrop Grumman Corp., Intel Corp., Adobe Inc., Google LLC and IBM Corp. on adopting solutions from his research. Bagchi's work has revealed the advantages of establishing an automatic response to attacks, and analyses like Symantec's Dragonfly report highlight energy-sector risks, leading to key innovations against ransomware threats, such as more effective ways to make decisions about backing up data.

There's a compelling reason why incentivizing good security decisions would work, Bagchi said. He and his team designed the algorithm based on findings from the field of behavioral economics, which studies how people make decisions with money.

"Before our work, not much computer security research had been done on how behaviors and biases affect the best defense mechanisms in a system. That's partly because humans are terrible at evaluating risk and an algorithm doesn't have any human biases," Bagchi said. "But for any system of reasonable complexity, decisions about security investments are almost always made with humans in the loop. For our algorithm, we explicitly consider the fact that different participants in an infrastructure system have different biases."

To develop the algorithm, Bagchi's team started by playing a game. They ran a series of experiments analyzing how groups of students chose to protect fake assets with fake investments. As in past studies in behavioral economics, they found that most study participants guessed poorly which assets were the most valuable and should be protected from security attacks. Most study participants also tended to spread out their investments instead of allocating them to one asset even when they were told which asset is the most vulnerable to an attack.

Using these findings, the researchers designed an algorithm that could work two ways: Either security decision makers pay a tax or fine when they make decisions that are less than optimal for the overall security of the system, or security decision makers receive a payment for investing in the most optimal manner.

"Right now, fines are levied as a reactive measure if there is a security incident. Fines or taxes don't have any relationship to the security investments or data of the different operators in critical infrastructure," Bagchi said.

In the researchers' simulations of real-world infrastructure systems, the algorithm successfully minimized the likelihood of losing assets to an attack that would decrease the overall security of the infrastructure system.

Bagchi's research group is working to make the algorithm more scalable and able to adapt to an attacker who may make multiple attempts to hack into a system. The researchers' work on the algorithm is funded by the National Science Foundation, the Wabash Heartland Innovation Network and the Army Research Lab.

Cybersecurity is an area of focus through Purdue's Next Moves, a set of initiatives that works to address some of the greatest technology challenges facing the U.S. Purdue's cybersecurity experts offer insights and assistance to improve the protection of power plants, electrical grids and other critical infrastructure.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified