Prairie Power, Inc. Selects OSI for a Centralized Member Cooperative Distribution SCADA System


Protective Relay Training - Basic

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today

Centralized Cooperative SCADA System delivers hosted, secure distribution control with real-time data sharing, alarm management, trending, and redundancy across member cooperatives, connecting main and backup control centers via a private network.

 

Key Points

A hosted platform centralizing SCADA for member co-ops, enabling real-time data, redundancy, and reduced maintenance.

✅ Secure private network links main and backup control centers

✅ Advanced alarm management, trending, and load management

✅ Reduces distributed maintenance via hosted multi-tenant design

 

Open Systems International, Inc. (OSI) has been selected by Prairie Power, Inc. (PPI) to implement a new centralized member cooperative distribution SCADA system capable of collecting data and sharing it between their main and backup control centers, as well as between member distribution cooperatives, with deployments at Tacoma Public Utilities illustrating broader industry adoption. PPI has been a user of OSI SCADA technology since 2012.

This new SCADA system is based on OSI's monarch™ platform and is delivered from private servers hosted by PPI. Its features include the advanced functionality presented by OSI's SCADA and Alarm Management System. It will feature a flexible Graphical User Interface, Advanced Calculation Subsystem, Real-time and Historical Trending, Data Engineering and Maintenance Subsystem, Advanced Alarm Management System, advanced situational awareness capabilities, Dynamic Tabular Display Subsystem, Advanced Tabular Builder, Communications Front-End Processor, Inter-Control Center Communications Protocol, Open Database Connectivity Interface, and Load Management.

Unlike traditional SCADA system deployments, PPI's system will utilize PPI's secure, private network architecture to deliver a high-performance hosted application suite to Member Cooperatives from a centralized system. This design significantly reduces overall maintenance for both PPI and its members by providing the functionality in a central hosted environment and, consistent with smart grid reliability gains observed in Illinois, eliminating the additional administrative overhead of multiple traditional systems.

"Our members are looking forward to having access to this state-of-the-art OSI system without the burden of having to individually maintain their own systems," said Robert Reynolds, PPI's vice president of member cooperative services. "Our members have worked closely with us on the design and implementation of this new OSI system and associated communications equipment. We all look forward to this centralized system being in service in mid-November."

"We are excited about this new project with PPI. The trend for serving cooperative members via a centralized SCADA system instead of individual systems is definitely growing in the cooperative market as utilities plan for continuity during COVID-19 staff lockdowns and similar events. We look forward to a speedy and successful project implementation," said Ron Ingram, OSI's VP of strategic development.

Prairie Power (www.ppi.coop) is a member-owned, not-for-profit electric generation and transmission cooperative. PPI produces and supplies wholesale electricity to 10 electric distribution cooperatives in central Illinois. PPI’s distribution cooperatives provide retail electric service to approximately 78,000 members within their local service territories. PPI is one of more than 60 generation and transmission cooperatives that supply wholesale electricity to distribution cooperatives in the United States.

Open Systems International (www.osii.com) provides open, state-of-the-art and high-performance automation solutions to utilities worldwide, where stability indicators such as Ontario Power Generation's credit rating support ongoing investment. These solutions include Supervisory Control and Data Acquisition (SCADA) systems, Network Management Systems (NMS), Energy Management Systems (EMS), Distribution Management Systems (DMS), Outage Management Systems (OMS), Generation Management Systems (GMS), Substation Automation Systems (SA), Data Warehousing (Historian) Analytics, Situational Awareness Systems, as well as individual software and hardware products and Smart Grid solutions for utility operations. OSI is headquartered in Minneapolis, Minnesota, USA.

For additional information regarding this news release, please contact news@osii.com.

 

Related News

Related News

After rising for 100 years, electricity demand is flat. Utilities are freaking out.

US Electricity Demand Stagnation reflects decoupling from GDP as TVA's IRP revises outlook, with energy efficiency, distributed generation, renewables, and cheap natural gas undercutting coal, reshaping utility business models and accelerating grid modernization.

 

Key Points

US electricity demand stagnation is flat load growth driven by efficiency, DG, and decoupling from GDP.

✅ Flat sales pressure IOU profits and legacy baseload investments.

✅ Efficiency and rooftop solar reduce load growth and capacity needs.

✅ Utilities must pivot to services, DER orchestration, and grid software.

 

The US electricity sector is in a period of unprecedented change and turmoil, with emerging utility trends reshaping strategies across the industry today. Renewable energy prices are falling like crazy. Natural gas production continues its extraordinary surge. Coal, the golden child of the current administration, is headed down the tubes.

In all that bedlam, it’s easy to lose sight of an equally important (if less sexy) trend: Demand for electricity is stagnant.

Thanks to a combination of greater energy efficiency, outsourcing of heavy industry, and customers generating their own power on site, demand for utility power has been flat for 10 years, with COVID-19 electricity demand underscoring recent variability and long-run stagnation, and most forecasts expect it to stay that way. The die was cast around 1998, when GDP growth and electricity demand growth became “decoupled”:


 

This historic shift has wreaked havoc in the utility industry in ways large and small, visible and obscure. Some of that havoc is high-profile and headline-making, as in the recent requests from utilities (and attempts by the Trump administration) to bail out large coal and nuclear plants amid coal and nuclear industry disruptions affecting power markets and reliability.

Some of it, however, is unfolding in more obscure quarters. A great example recently popped up in Tennessee, where one utility is finding its 20-year forecasts rendered archaic almost as soon as they are released.

 

Falling demand has TVA moving up its planning process

Every five years, the Tennessee Valley Authority (TVA) — the federally owned regional planning agency that, among other things, supplies electricity to Tennessee and parts of surrounding states — develops an Integrated Resource Plan (IRP) meant to assess what it requires to meet customer needs for the next 20 years.

The last IRP, completed in 2015, anticipated that there would be no need for major new investment in baseload (coal, nuclear, and hydro) power plants; it foresaw that energy efficiency and distributed (customer-owned) energy generation would hold down demand.

Even so, TVA underestimated. Just three years later, the Times Free Press reports, “TVA now expects to sell 13 percent less power in 2027 than it did two decades earlier — the first sustained reversal in the growth of electricity usage in the 85-year history of TVA.”

TVA will sell less electricity in 10 years than it did 10 years ago. That is bonkers.

This startling shift in prospects has prompted the company to accelerate its schedule. It will now develop its next IRP a year early, in 2019.

Think for a moment about why a big utility like TVA (serving 9 million customers in seven states, with more than $11 billion in revenue) sets out to plan 20 years ahead. It is investing in extremely large and capital-intensive infrastructure like power plants and transmission lines, which cost billions of dollars and last for decades. These are not decisions to make lightly; the utility wants to be sure that they will still be needed, and will still pay off, for many years to come.

Now think for a moment about what it means for the electricity sector to be changing so fast that TVA’s projections are out of date three years after its last IRP, so much so that it needs to plunge back into the multimillion-dollar, year-long process of developing a new plan.

TVA wanted a plan for 20 years; the plan lasted three.

 

The utility business model is headed for a reckoning

TVA, as a government-owned, fully regulated utility, has only the goals of “low cost, informed risk, environmental responsibility, reliability, diversity of power and flexibility to meet changing market conditions,” as its planning manager told the Times Free Press. (Yes, that’s already a lot of goals!)

But investor-owned utilities (IOUs), which administer electricity for well over half of Americans, face another imperative: to make money for investors. They can’t make money selling electricity; monopoly regulations forbid it, raising questions about utility revenue models as marginal energy costs fall. Instead, they make money by earning a rate of return on investments in electrical power plants and infrastructure.

The problem is, with demand stagnant, there’s not much need for new hardware. And a drop in investment means a drop in profit. Unable to continue the steady growth that their investors have always counted on, IOUs are treading water, watching as revenues dry up

Utilities have been frantically adjusting to this new normal. The generation utilities that sell into wholesale electricity markets (also under pressure from falling power prices; thanks to natural gas and renewables, wholesale power prices are down 70 percent from 2007) have reacted by cutting costs and merging. The regulated utilities that administer local distribution grids have responded by increasing investments in those grids, including efforts to improve electricity reliability and resilience at lower cost.

But these are temporary, limited responses, not enough to stay in business in the face of long-term decline in demand. Ultimately, deeper reforms will be necessary.

As I have explained at length, the US utility sector was built around the presumption of perpetual growth. Utilities were envisioned as entities that would build the electricity infrastructure to safely and affordably meet ever-rising demand, which was seen as a fixed, external factor, outside utility control.

But demand is no longer rising. What the US needs now are utilities that can manage and accelerate that decline in demand, increasing efficiency as they shift to cleaner generation. The new electricity paradigm is to match flexible, diverse, low-carbon supply with (increasingly controllable) demand, through sophisticated real-time sensing and software.

That’s simply a different model than current utilities are designed for. To adapt, the utility business model must change. Utilities need newly defined responsibilities and new ways to make money, through services rather than new hardware. That kind of reform will require regulators, politicians, and risky experiments. Very few states — New York, California, Massachusetts, a few others — have consciously set off down that path.

 

Flat or declining demand is going to force the issue

Even if natural gas and renewables weren’t roiling the sector, the end of demand growth would eventually force utility reform.

To be clear: For both economic and environmental reasons, it is good that US power demand has decoupled from GDP growth. As long as we’re getting the energy services we need, we want overall demand to decline. It saves money, reduces pollution, and avoids the need for expensive infrastructure.

But the way we’ve set up utilities, they must fight that trend. Every time they are forced to invest in energy efficiency or make some allowance for distributed generation (and they must always be forced), demand for their product declines, and with it their justification to make new investments.

Only when the utility model fundamentally changes — when utilities begin to see themselves primarily as architects and managers of high-efficiency, low-emissions, multidirectional electricity systems rather than just investors in infrastructure growth — can utilities turn in earnest to the kind planning they need to be doing.

In a climate-aligned world, utilities would view the decoupling of power demand from GDP growth as cause for celebration, a sign of success. They would throw themselves into accelerating the trend.

Instead, utilities find themselves constantly surprised, caught flat-footed again and again by a trend they desperately want to believe is temporary. Unless we can collectively reorient utilities to pursue rather than fear current trends in electricity, they are headed for a grim reckoning.

 

Related News

View more

Russia to Ban Bitcoin Mining Amid Electricity Deficit

Russia Bitcoin Mining Ban highlights electricity deficits, grid stability concerns, and sustainability challenges, prompting stricter cryptocurrency regulation as mining operations in Siberia face shutdowns, relocations, and renewed focus on energy efficiency and resource allocation.

 

Key Points

Policy halting Bitcoin mining in key regions to ease electricity deficits, stabilize the grid, and prioritize energy.

✅ Targets high-load regions like Siberia facing electricity deficits

✅ Protects residential and industrial energy security, limits outages

✅ Prompts miner relocations, regulation, and potential renewables

 

In a significant shift in its stance on cryptocurrency, Russia has announced plans to ban Bitcoin mining in several key regions, primarily due to rising electricity deficits. This move highlights the ongoing tensions between energy management and the growing demand for cryptocurrency mining, which has sparked a robust debate about sustainability and resource allocation in the country.

Background on Bitcoin Mining in Russia

Russia has long been a major player in the global cryptocurrency landscape, particularly in Bitcoin mining. The country’s vast and diverse geography offers ample opportunities for mining, with several regions boasting low electricity costs and cooler climates that are conducive to operating the high-powered computers used for mining, similar to Iceland's mining boom in cold regions.

However, the boom in mining activities has put a strain on local electricity grids, as seen with BC Hydro suspensions in Canada, particularly as demand for energy continues to rise. This situation has become increasingly untenable, leading government officials to reconsider the viability of allowing large-scale mining operations.

Reasons for the Ban

The decision to ban Bitcoin mining in certain regions stems from a growing electricity deficit that has been exacerbated by both rising temperatures and increased energy consumption. Reports indicate that some regions are struggling to meet domestic energy needs, and jurisdictions like Manitoba's pause on crypto connections reflect similar grid concerns, particularly during peak consumption periods. Officials have expressed concern that continuing to support cryptocurrency mining could lead to blackouts and further strain on the electrical infrastructure.

Additionally, this ban is seen as a measure to redirect energy resources toward more critical sectors, including residential heating and industrial needs. By curbing Bitcoin mining, the government aims to prioritize the energy security of its citizens and maintain stability within its energy markets and the wider global electricity market dynamics.

Regional Impact

The regions targeted by the ban include areas that have seen a significant influx of mining operations, often attracted by the low costs of electricity. For instance, Siberia, known for its abundant natural resources and inexpensive power, has become a major center for miners. The ban is likely to have profound implications for local economies that have come to rely on the influx of investments from cryptocurrency companies.

Many miners are expected to be affected financially as they may have to halt operations or relocate to regions with more favorable regulations. This could lead to job losses and a decline in local business activities that have sprung up around the mining industry, such as hardware suppliers and tech services.

Broader Implications for Cryptocurrency in Russia

This ban reflects a broader trend within Russia’s approach to cryptocurrencies. While the government has been cautious about outright banning digital currencies, it has simultaneously sought to regulate the industry more stringently. Recent legislation has aimed to establish a legal framework for cryptocurrencies, focusing on taxation and oversight while navigating the balance between innovation and regulation.

As other countries around the world grapple with the implications of cryptocurrency mining, Russia’s decision adds to the narrative of the challenges associated with energy consumption in this sector. The international community is increasingly aware of the environmental impact of Bitcoin mining, which has come under fire for its significant energy use and carbon footprint.

Future of Mining in Russia

Looking ahead, the future of Bitcoin mining in Russia remains uncertain. While some regions may implement strict bans, others could potentially embrace a more regulated approach to mining, provided it aligns with energy availability and environmental considerations. The country’s vast landscape offers opportunities for innovative solutions, such as utilizing renewable energy sources, even as India's solar growth slows amid rising coal generation, to power mining operations.

As global attitudes toward cryptocurrency evolve, Russia will likely continue to adapt its policies in response to both domestic energy needs and international pressures, including Europe's shift away from Russian energy that influence policy choices. The balance between fostering a competitive cryptocurrency market and ensuring energy sustainability will be a key challenge for Russian policymakers moving forward.

Russia’s decision to ban Bitcoin mining in key regions marks a pivotal moment in the intersection of cryptocurrency and energy management. As the nation navigates its energy deficits, the implications for the mining industry and the broader cryptocurrency landscape will be significant. This move not only underscores the need for responsible energy consumption in the digital age but also reflects the complexities of integrating emerging technologies within existing frameworks of governance and infrastructure. As the situation unfolds, all eyes will be on how Russia balances innovation with sustainability in its approach to cryptocurrency.

 

Related News

View more

'Electricity out of essentially nothing': Invention creates power from falling snow

Snow-powered nanogenerator harvests static electricity from falling snow using a silicone triboelectric design, enabling energy harvesting, solar panel support during snowfall, and dual-use sensing for weather monitoring and wearable winter sports analytics.

 

Key Points

A silicone triboelectric device that harvests snowDcharge to generate power and enable sensing.

✅ Triboelectric silicone layer captures charge from falling snow.

✅ Integrates with solar arrays to maintain power during snowfall.

✅ Functions as weather and motion sensor for winter sports.

 

Scientists from University of California, Los Angeles and McMaster University have invented a nanogenerator that creates electricity from falling snow.

Most Canadians have already seen a mini-version of this, McMaster Prof. Ravi Selvaganapathy told CTV’s Your Morning. “We find that we often get shocked in the winter when it’s dry when we come in into contact with a conductive surface like a doorknob.”

The thin device works by harnessing static electricity: positively-charged, falling snow collides with the negatively-charged silicone device, which produces a charge that’s captured by an electrode.

“You separate the charges and create electricity out of essentially nothing,” Richard Kaner, who holds UCLA’s Dr. Myung Ki Hong Endowed Chair in Materials Innovation and whose lab has explored turning waste into graphene, said in a press release.

“The device can work in remote areas because it provides its own power and does not need batteries or reliance on home storage systems such as the Tesla Powerwall, which store energy for later use,” he said, explaining that the device was 3D printed, flexible and inexpensive to make because of the low cost of silicone.

“It’s also going to be useful in places like Canada, where we get a lot of snow and are pursuing a net-zero grid by 2050 to cut emissions. We can extract energy from the environment,” Selvaganapathy added.

The team, which also included scientists from the University of Toronto, published their findings in Nano Energy journal last year, but a few weeks ago, they revealed the device’s more practical uses.

About 30 per cent of the Earth’s surface is covered by snow each winter, which can significantly limit the energy generated by solar panels, including rooftop solar grids in cold climates.

So the team thought: why not simply harness electricity from the snow whenever the solar panels were covered?

Integrating their device into solar panel arrays could produce a continuous power supply whenever it snows, potentially as part of emerging virtual power plants that aggregate distributed resources, study co-author and UCLA assistant researcher Maher El-Kady explained.

The device also serves as a weather-monitoring station by recording how much snow is falling and from where; as well as the direction and speed of the wind.

The team said they also want to incorporate their device into weather sensors to help them better acquire and transmit electronic signals, supporting initiatives to use AI for energy savings across local grids. They said several Toronto-based companies -- which they couldn’t name -- have expressed interest in partnering with them.

Selvaganapathy said the device would hop on the trend of “sensors being incorporated into what we wear, into our homes and even to detect electricity theft in some markets in order to monitor a lot of the things that are important to us”

But the device’s arguably larger potential use is being integrated into technology to monitor athletes and their performances during winter sports, such as hiking, skiing and cross-country skiing.

Up to now, the movement patterns used during cross-country skiing couldn’t be detected by a smart watch, but this device may be able to.

Scientists such as Kaner believe the technology could usher in a new era of self-monitoring devices to assess an athlete’s performance while they’re running, walking or jumping.

The device is simply a proof of concept and the next step would be figuring out how to generate more electricity and integrate it into all of these potential devices, Selvaganapathy said.

 

Related News

View more

Russian hackers had 'hundreds of victims' as they infiltrated U.S. power grid

Russian cyberattacks on U.S. power grid exposed DHS warnings: Dragonfly/Energetic Bear breached control rooms, ICS networks, and could trigger blackouts via switch manipulation, phishing, and malware, threatening critical infrastructure and utility operations nationwide.

 

Key Points

State-backed breaches of utility ICS and control rooms enabled potential switch manipulation and blackouts.

✅ DHS: Dragonfly/Energetic Bear breached utility networks

✅ Access reached control rooms and ICS for switch control

✅ Ongoing campaign via phishing, malware, lateral movement

 

Russian hackers for a state-sponsored organization invaded hundreds of control rooms of U.S. electric utilities that could have led to blackouts, a new report says.

The group, known as Dragonfly or Energetic Bear, infiltrated networks of U.S. utilities as part of an effort that is likely ongoing, Department of Homeland Security officials told the Wall Street Journal.

Jonathan Home, chief of industrial-control-system analysis for DHS, said the hackers “got to the point where they could have thrown switches” and upset power flows.

Although the agency did not disclose which companies were impacted, the officials at a briefing Monday said that there were “hundreds of victims” including breaches at power plants across the U.S., and that some companies may not be aware that hackers infiltrated their networks yet.

According to experts, Russia has been preparing for such attacks for some time now, prompting a renewed focus on protecting the grid among utilities and policymakers.

“They’ve been intruding into our networks and are positioning themselves for a limited or widespread attack,” said former Deputy Assistant Defense Secretary Michael Carpenter, now senior director at the Penn Biden Center at the University of Pennsylvania, per the Wall Street Journal. “They are waging a covert war on the West.”

Earlier this year, the Trump administration claimed Russia had staged a power grid hacking campaign against the U.S. energy grid and other U.S. infrastructure.

The report comes after President Trump told reporters last week during a joint press conference in Helsinki alongside Russian President Vladimir Putin that he had no reason not to believe the Russian leader's assurances to him that the Kremlin was not to blame for interference in the election.

Trump later admitted that he misspoke when he said he didn’t “see any reason why” Russia would have meddled in the 2016 election, and said he believes the U.S. intelligence community assessment that found that the Russian government did interfere in the electoral process.

 

Related News

View more

Russia-Ukraine Agreement on Power Plant Attacks Possible

Russia-Ukraine Energy Ceasefire explores halting strikes on power plants, safeguarding energy infrastructure and grids, easing humanitarian crises, stabilizing European markets, and advancing diplomatic talks on security, resilience, and critical infrastructure protection.

 

Key Points

A proposed pact to halt strikes on power plants, protect energy infrastructure, and stabilize grids and security.

✅ Shields power plants and grid infrastructure from attacks

✅ Eases humanitarian strain and improves winter resilience

✅ Supports European energy security and market stability

 

In a significant diplomatic development amid ongoing conflict, Russia and Ukraine are reportedly exploring the possibility of reaching an agreement to halt attacks on each other’s power plants. This potential cessation of hostilities could have far-reaching implications for the energy security and stability of both nations, as well as for the broader European energy landscape.

The Context of Energy Warfare

The conflict between Russia and Ukraine has escalated into what many analysts term "energy warfare," where both sides have targeted each other’s energy infrastructure. Such actions not only aim to undermine the adversary’s military capabilities but also have profound effects on civilian populations, leading to widespread power outages and humanitarian crises. Energy infrastructure has become a focal point in the conflict, with power plants and grids frequently damaged or destroyed.

The ongoing hostilities have raised concerns about energy security in Europe, with some warning of an energy nightmare if disruptions escalate, especially as many countries in the region rely on energy supplies from Russia. The attacks on power facilities exacerbate vulnerabilities in the energy supply chain, prompting calls for a ceasefire that encompasses energy infrastructure.

The Humanitarian Implications

The humanitarian impact of the conflict has been staggering, with millions of civilians affected by power outages, heating shortages, and disrupted access to essential services. The winter months, in particular, pose a grave challenge, as Ukraine prepares for winter amid ongoing energy constraints for vulnerable populations. A potential agreement to cease attacks on power plants could provide much-needed relief and stability for civilians caught in the crossfire.

International organizations, including the United Nations and various humanitarian NGOs, have been vocal in urging both parties to prioritize civilian safety and to protect critical infrastructure. Any agreement reached could facilitate aid efforts and enhance the overall humanitarian situation in affected areas.

Diplomatic Efforts and Negotiations

Reports indicate that diplomatic channels are being utilized to explore this potential agreement. While the specifics of the negotiations remain unclear, the idea of protecting energy infrastructure has been gaining traction among international diplomats. Key players, including European nations and the United States, with debates over U.S. energy security shaping positions, may play a pivotal role in mediating discussions.

Negotiating a ceasefire concerning energy infrastructure could serve as a preliminary step toward broader peace talks. By demonstrating goodwill through a tangible agreement, both parties might foster an environment conducive to further negotiations on other contentious issues in the conflict.

The Broader European Energy Landscape

The ramifications of an agreement between Russia and Ukraine extend beyond their borders. The stability of energy supplies in Europe is inextricably linked to the dynamics of the conflict, and the posture of certain EU states, such as Hungary's energy alliance with Russia, also shapes outcomes across the region. Many European nations have been grappling with rising energy prices and supply uncertainties, particularly in light of reduced gas supplies from Russia.

A halt to attacks on power plants could alleviate some of the strain on energy markets, which have experienced price hikes and instability in recent months, helping to stabilize prices and improve energy security for neighboring countries. Furthermore, it could pave the way for increased cooperation on energy issues, such as joint projects for renewable energy development or grid interconnections.

Future Considerations

While the prospect of an agreement is encouraging, skepticism remains about the willingness of both parties to adhere to such terms. The historical context of mistrust and previous violations of ceasefires, as both sides have accused each other of violations in recent months, raises questions about the durability of any potential pact. Continued dialogue and monitoring by international entities will be essential to ensure compliance and to build confidence between the parties.

Moreover, as discussions progress, it will be crucial to consider the long-term implications for energy policy in both Russia and Ukraine. The conflict has already prompted Ukraine to seek alternative energy sources and reduce its dependence on Russian gas, turning to electricity imports to keep the lights on, while Russia is exploring new markets for its energy exports.

The potential agreement between Russia and Ukraine to stop targeting each other’s power plants represents a glimmer of hope in a protracted conflict characterized by violence and humanitarian suffering. As both nations explore this diplomatic avenue, the implications for energy security, civilian safety, and the broader European energy landscape could be profound. Continued international support and monitoring will be vital to ensure that any agreement reached translates into real-world benefits for affected populations and contributes to a more stable energy future for the region.

 

Related News

View more

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified