Prairie Power, Inc. Selects OSI for a Centralized Member Cooperative Distribution SCADA System


Protective Relay Training - Basic

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today

Centralized Cooperative SCADA System delivers hosted, secure distribution control with real-time data sharing, alarm management, trending, and redundancy across member cooperatives, connecting main and backup control centers via a private network.

 

Key Points

A hosted platform centralizing SCADA for member co-ops, enabling real-time data, redundancy, and reduced maintenance.

✅ Secure private network links main and backup control centers

✅ Advanced alarm management, trending, and load management

✅ Reduces distributed maintenance via hosted multi-tenant design

 

Open Systems International, Inc. (OSI) has been selected by Prairie Power, Inc. (PPI) to implement a new centralized member cooperative distribution SCADA system capable of collecting data and sharing it between their main and backup control centers, as well as between member distribution cooperatives, with deployments at Tacoma Public Utilities illustrating broader industry adoption. PPI has been a user of OSI SCADA technology since 2012.

This new SCADA system is based on OSI's monarch™ platform and is delivered from private servers hosted by PPI. Its features include the advanced functionality presented by OSI's SCADA and Alarm Management System. It will feature a flexible Graphical User Interface, Advanced Calculation Subsystem, Real-time and Historical Trending, Data Engineering and Maintenance Subsystem, Advanced Alarm Management System, advanced situational awareness capabilities, Dynamic Tabular Display Subsystem, Advanced Tabular Builder, Communications Front-End Processor, Inter-Control Center Communications Protocol, Open Database Connectivity Interface, and Load Management.

Unlike traditional SCADA system deployments, PPI's system will utilize PPI's secure, private network architecture to deliver a high-performance hosted application suite to Member Cooperatives from a centralized system. This design significantly reduces overall maintenance for both PPI and its members by providing the functionality in a central hosted environment and, consistent with smart grid reliability gains observed in Illinois, eliminating the additional administrative overhead of multiple traditional systems.

"Our members are looking forward to having access to this state-of-the-art OSI system without the burden of having to individually maintain their own systems," said Robert Reynolds, PPI's vice president of member cooperative services. "Our members have worked closely with us on the design and implementation of this new OSI system and associated communications equipment. We all look forward to this centralized system being in service in mid-November."

"We are excited about this new project with PPI. The trend for serving cooperative members via a centralized SCADA system instead of individual systems is definitely growing in the cooperative market as utilities plan for continuity during COVID-19 staff lockdowns and similar events. We look forward to a speedy and successful project implementation," said Ron Ingram, OSI's VP of strategic development.

Prairie Power (www.ppi.coop) is a member-owned, not-for-profit electric generation and transmission cooperative. PPI produces and supplies wholesale electricity to 10 electric distribution cooperatives in central Illinois. PPI’s distribution cooperatives provide retail electric service to approximately 78,000 members within their local service territories. PPI is one of more than 60 generation and transmission cooperatives that supply wholesale electricity to distribution cooperatives in the United States.

Open Systems International (www.osii.com) provides open, state-of-the-art and high-performance automation solutions to utilities worldwide, where stability indicators such as Ontario Power Generation's credit rating support ongoing investment. These solutions include Supervisory Control and Data Acquisition (SCADA) systems, Network Management Systems (NMS), Energy Management Systems (EMS), Distribution Management Systems (DMS), Outage Management Systems (OMS), Generation Management Systems (GMS), Substation Automation Systems (SA), Data Warehousing (Historian) Analytics, Situational Awareness Systems, as well as individual software and hardware products and Smart Grid solutions for utility operations. OSI is headquartered in Minneapolis, Minnesota, USA.

For additional information regarding this news release, please contact news@osii.com.

 

Related News

Related News

Dutch produce more green electricity but target still a long way off

Netherlands renewable energy progress highlights rising wind energy and solar power output, delivering 17 billion kWh of green electricity from sustainable sources, yet trailing EU targets, with wind providing 60% and solar 34%.

 

Key Points

It is the country's growth in green electricity, led by wind and solar, yet short of EU targets at 13.8% of generation.

✅ 17 billion kWh green output; 13.8% of total generation

✅ Wind energy up 16% to 9.6 billion kWh; 60% of green power

✅ Solar power up about 13%; 34% of renewable production

 

The Netherlands is generating more electricity from sustainable sources as US renewable record 28% in April underscores broader momentum but is still far from reaching its targets, the national statistics office CBS said on Friday.

In total, the Netherlands produced 17 billion kilowatts of green energy last year, a rise of 10% on 2016. Sustainable sources now account for 13.8 per cent of energy generation, even as solar reshapes prices in Northern Europe across the region.

The biggest growth was in wind energy – up 16 per cent to 9.6 billion kWh – or the equivalent of energy for three million households. Wind energy now accounts for 60 per cent of green Dutch power. The amount of solar power, which accounts for 34% of green energy production, rose almost 13 per cent, and Dutch solar outpaces Canada according to recent reports.

In January, European statistics agency Eurostat said the Netherlands is near the bottom of a new table on renewable energy use in Europe. The EU has a target of a fifth of all energy use from green sources by 2020 and – while some countries have reached their own targets, including Germany's 50% clean power milestones – the Dutch, French and Irish need to increase their rates by at least 6%, Eurostat said, and Ireland has set green electricity goals for the next four years to close the gap.

 

Related News

View more

New York Achieves Solar Energy Goals Ahead of Schedule

New York Solar Milestone accelerates renewable energy adoption, meeting targets early with 8,000 MW capacity powering 1.1 million homes, boosting green jobs, community solar, battery storage, and grid reliability under the CLCPA clean energy framework.

 

Key Points

It is New York achieving its solar goal early, powering 1.1M homes and advancing CLCPA renewable targets.

✅ 8,000 MW installed, enough to power about 1.1M homes

✅ CLCPA targets: 70 percent renewables by 2030

✅ Community solar, storage, and green jobs scaling statewide

 

In a remarkable display of commitment to renewable energy, New York has achieved its solar energy targets a year ahead of schedule, marking a significant milestone in the state's clean energy journey, and aligning with a national trend where renewables reached a record 28% in April nationwide. With the addition of solar power capacity capable of powering over a million homes, New York is not just setting the pace for solar adoption but is also establishing itself as a leader in the fight against climate change.

A Commitment to Renewable Energy

New York’s ambitious clean energy agenda is part of a broader effort to reduce greenhouse gas emissions and transition to sustainable energy sources. The state's goal, established under the Climate Leadership and Community Protection Act (CLCPA), aims for 70% of its electricity to come from renewable sources by 2030. With the recent advancements in solar energy, including contracts for 23 renewable projects totaling 2.3 GW, New York is well on its way to achieving that goal, demonstrating that aggressive policy frameworks can lead to tangible results.

The Numbers Speak for Themselves

As of now, New York has successfully installed more than 8,000 megawatts (MW) of solar energy capacity, supported by large-scale energy projects underway across New York that are expanding the grid. This achievement translates to enough electricity to power approximately 1.1 million homes, showcasing the state's investment in harnessing the sun’s power. The rapid expansion of solar installations reflects both increasing consumer interest and supportive policies that facilitate growth in the renewable energy sector.

Economic Benefits and Job Creation

The surge in solar energy capacity has not only environmental implications but also significant economic benefits. The solar industry in New York has become a substantial job creator, employing tens of thousands of individuals across various sectors. From manufacturing solar panels to installation and maintenance, the job opportunities associated with this growth are diverse and vital for local economies.

Moreover, as solar installations increase, the state benefits from reduced electricity costs over time. By investing in renewable energy, New York is paving the way for a more resilient and sustainable energy future, while simultaneously providing economic opportunities for its residents.

Community Engagement and Accessibility

New York's solar success is also tied to its efforts to engage communities and increase access to renewable energy. Initiatives such as community solar programs allow residents who may not have the means or space to install solar panels on their homes to benefit from solar energy. These programs provide an inclusive approach, ensuring that low-income households and underserved communities have access to clean energy solutions.

The state has also implemented various incentives to encourage solar adoption, including tax credits, rebates, and financing options. These efforts not only promote environmental sustainability but also aim to make solar energy more accessible to all New Yorkers, furthering the commitment to equity in the energy transition.

Innovations and Future Prospects

New York's solar achievements are complemented by ongoing innovations in technology and energy storage solutions. The integration of battery storage systems is becoming increasingly important, reflecting growth in solar and storage in the coming years, and allowing for the capture and storage of solar energy for use during non-sunny periods. This technology enhances grid reliability and supports the state’s goal of transitioning to a fully sustainable energy system.

Looking ahead, New York aims to continue this momentum. The state is exploring additional strategies to increase renewable energy capacity, including plans to investigate sites for offshore wind across its coastline, and other clean energy technologies. By diversifying its renewable energy portfolio, New York is positioning itself to meet and even exceed future energy demands while reducing its carbon footprint.

A Model for Other States

New York’s success story serves as a model for other states aiming to enhance their renewable energy capabilities, with its approval of the biggest offshore wind farm underscoring that leadership. The combination of strong policy frameworks, community engagement, and technological innovation can inspire similar initiatives nationwide. As more states look to address climate change, New York’s proactive approach can provide valuable insights into effective strategies for solar energy deployment.

New York’s achievement of its solar energy goals a year ahead of schedule is a testament to the state's unwavering commitment to sustainability and renewable energy. With the capacity to power over a million homes, this milestone not only signifies progress in clean energy adoption but also highlights the potential for economic growth and community engagement. As New York continues on its path toward a greener future, and stays on the road to 100% renewables by mid-century, it sets a powerful example for others to follow, proving that ambitious renewable energy goals can indeed become a reality.

 

Related News

View more

Symantec Proves Russian

Dragonfly energy sector cyberattacks target ICS and SCADA across critical infrastructure, including the power grid and nuclear facilities, using spearphishing, watering-hole sites, supply-chain compromises, malware, and VPN exploits to gain operational access.

 

Key Points

Dragonfly APT campaigns target energy firms and ICS to gain grid access, risking manipulation and service disruption.

✅ Breaches leveraged spearphishing, watering-hole sites, and supply chains.

✅ Targeted ICS, SCADA, VPNs to pivot into operational networks.

✅ Aimed to enable power grid manipulation and potential outages.

 

An October, 2017 report by researchers at Symantec Corp., cited by the U.S. government, has linked recent US power grid cyber attacks to a group of hackers it had code-named "Dragonfly", and said it found evidence critical infrastructure facilities in Turkey and Switzerland also had been breached.

The Symantec researchers said an earlier wave of attacks by the same group starting in 2011 was used to gather intelligence on companies and their operational systems. The hackers then used that information for a more advanced wave of attacks targeting industrial control systems that, if disabled, leave millions without power or water.

U.S. intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attacks, condemned by the U.S. government, striking almost simultaneously at multiple locations, are testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

#google#

While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers.

“Since at least March 2016, Russian government cyber actors… targeted government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors,” according to Thursday’s FBI and Department of Homeland Security report. The report did not say how successful the attacks were or specify the targets, but said that the Russian hackers “targeted small commercial facilities’ networks where they staged malware, conducted spearphishing, and gained remote access into energy sector networks.” At least one target of a string of infrastructure attacks last year was a nuclear power facility in Kansas.

Symantec doesn’t typically point fingers at particular nations in its research on cyberattacks, said Eric Chien, technical director of Symantec’s Security Technology and Response division, though he said his team doesn’t see anything it would disagree with in the new federal report. The government report appears to corroborate Symantec’s research, showing that the hackers had penetrated computers and accessed utility control rooms that would let them directly manipulate power systems, he says.

“There were really no more technical hurdles for them to do something like flip off the power,” he said.

And as for the group behind the attacks, Chien said it appears to be relatively dormant for now, but it has gone quiet in the past only to return with new hacks.

“We expect they’re sort of retooling now, and they likely will be back,”

 


 

In some cases, Dragonfly successfully broke into the core systems that control US and European energy companies, Symantec revealed.

“The energy sector has become an area of increased interest to cyber-attackers over the past two years,” Symantec said in its report.

“Most notably, disruptions to Ukraine’s power system in 2015 and 2016 were attributed to a cyberattack and led to power outages affecting hundreds of thousands of people. In recent months, there have also been media reports of attempted attacks on the electricity grids in some European countries, as well as reports of companies that manage nuclear facilities in the US being compromised by hackers.

“The Dragonfly group appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so. Symantec customers are protected against the activities of the Dragonfly group.”

In recent weeks, senior US intelligence officials said that the Kremlin believes it can launch hacking operations against the West with impunity, including a cyber weapon that can disrupt power grids, according to assessments.

The DHS and FBI report further elaborated: “This campaign comprises two distinct categories of victims: staging and intended targets. The initial victims are peripheral organisations such as trusted third-party suppliers with less-secure networks, referred to as ‘staging targets’ throughout this alert.

“The threat actors used the staging targets’ networks as pivot points and malware repositories when targeting their final intended victims. National Cybersecurity and Communications Integration Center and FBI judge the ultimate objective of the actors is to compromise organisational networks, also referred to as the ‘intended target’.”

According to the US alert, hackers used a variety of attack methods, including spear-phishing emails, watering-hole domains, credential gathering, open source and network reconnaissance, host-based exploitation, and deliberate targeting of ICS infrastructure.

The attackers also targeted VPN software and used password cracking tools.

Once inside, the attackers downloaded tools from a remote server and then carried out a number of actions, including modifying key systems to store plaintext credentials in memory, and built web shells to gain command and control of targeted systems.

“This actors’ campaign has affected multiple organisations in the energy, nuclear, water, aviation, construction and critical manufacturing sectors, with hundreds of victims across the U.S. power grid confirmed,” the DHS said, before outlining a number of steps that IT managers in infrastructure organisations can take to cleanse their systems and defend against Russian hackers. he said.
 

 

Related News

View more

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

Ontario looks to build on electricity deal with Quebec

Ontario-Quebec Electricity Deal explores hydro imports, terawatt hours, electricity costs, greenhouse gas cuts, and baseload impacts, amid debates on Pickering nuclear operations and competitive procurement in Ontario's long-term energy planning.

 

Key Points

A proposed hydro import deal from Quebec, balancing costs, emissions, and reliability for Ontario electricity customers.

✅ Draft 20-year, 8 TWh offer reported by La Presse disputed

✅ Ontario seeks lower costs and GHG cuts versus alternatives

✅ Not a baseload replacement; Pickering closure not planned

 

Ontario is negotiating a possible energy swap agreement to buy electricity from Quebec, but the government is disputing a published report that it is preparing to sign a deal for enough electricity to power a city the size of Ottawa.

La Presse reported Tuesday that it obtained a copy of a draft, 20-year deal that says Ontario would buy eight terawatt hours a year from Quebec – about 6 per cent of Ontario’s consumption – whether the electricity is consumed or not.

Ontario Energy Minister Glenn Thibeault’s office said the province is in discussions to build on an agreement signed last year for Ontario to import up to two terawatt hours of electricity a year from Quebec.

 

But his office released a letter dated late last month to his Quebec counterpart, in which Mr. Thibeault said the offer extended in June was unacceptable because it would increase the average residential electricity bill by $30 a year.

“I am hopeful that your continued support and efforts will help to further discussions between our jurisdictions that could lead to an agreement that is in the best interest of both Ontario and Quebec,” Mr. Thibeault wrote July 27 to Pierre Arcand.

Ontario would prepare a “term sheet” for the next stage of discussions ahead of the two ministers meeting at the Energy and Mines Ministers Conference later this month in New Brunswick, Mr. Thibeault wrote.

Any future agreements with Quebec will have to provide a reduction in Ontario electricity rates compared with other alternatives and demonstrate measurable reductions in greenhouse gas emissions, he wrote.

Progressive Conservative Leader Patrick Brown said Ontario doesn’t need eight terawatt hours of additional power and suggested it means the Liberal government is considering closing power facilities such as the Pickering nuclear plant early.

A senior Energy Ministry official said that is not on the table. The government has said it intends to keep operating two units at Pickering until 2022, and the other four units until 2024.

Even if the Quebec offer had been accepted, the energy official said, that power wouldn’t have replaced any of Ontario’s baseload power because it couldn’t have been counted on 24 hours a day, 365 days a year.

The Society of Energy Professionals said Mr. Thibeault was right to reject the deal, but called on him to release the Long-Term Energy Plan – which was supposed to be out this spring – before continuing negotiations.

Some commentators have argued for broader reforms to address Ontario's hydro system challenges, urging policymakers to review all options as negotiations proceed.

The Ontario Energy Association said the reported deal would run counter to the government’s stated energy objectives amid concerns over electricity prices in the province.

“Ontarians will not get the benefit of competition to ensure it is the best of all possible options for the province, and companies who have invested in Ontario and have employees here will not get the opportunity to provide alternatives,” president and chief executive Vince Brescia said in a statement. “Competitive processes should be used for any new significant system capacity in Ontario.”

The Association of Power Producers of Ontario said it is concerned the government is even considering deals that would “threaten to undercut a competitive marketplace and long-term planning.”

“Ontario already has a surplus of energy, so it’s very difficult to see how this deal or any other sole-source deal with Quebec could benefit the province and its ratepayers,” association president and CEO David Butters said in a statement.

The Ontario Waterpower Association also said such a deal with Quebec would “present a significant challenge to continued investment in waterpower in Ontario.”

 

Related News

View more

Russian hackers had 'hundreds of victims' as they infiltrated U.S. power grid

Russian cyberattacks on U.S. power grid exposed DHS warnings: Dragonfly/Energetic Bear breached control rooms, ICS networks, and could trigger blackouts via switch manipulation, phishing, and malware, threatening critical infrastructure and utility operations nationwide.

 

Key Points

State-backed breaches of utility ICS and control rooms enabled potential switch manipulation and blackouts.

✅ DHS: Dragonfly/Energetic Bear breached utility networks

✅ Access reached control rooms and ICS for switch control

✅ Ongoing campaign via phishing, malware, lateral movement

 

Russian hackers for a state-sponsored organization invaded hundreds of control rooms of U.S. electric utilities that could have led to blackouts, a new report says.

The group, known as Dragonfly or Energetic Bear, infiltrated networks of U.S. utilities as part of an effort that is likely ongoing, Department of Homeland Security officials told the Wall Street Journal.

Jonathan Home, chief of industrial-control-system analysis for DHS, said the hackers “got to the point where they could have thrown switches” and upset power flows.

Although the agency did not disclose which companies were impacted, the officials at a briefing Monday said that there were “hundreds of victims” including breaches at power plants across the U.S., and that some companies may not be aware that hackers infiltrated their networks yet.

According to experts, Russia has been preparing for such attacks for some time now, prompting a renewed focus on protecting the grid among utilities and policymakers.

“They’ve been intruding into our networks and are positioning themselves for a limited or widespread attack,” said former Deputy Assistant Defense Secretary Michael Carpenter, now senior director at the Penn Biden Center at the University of Pennsylvania, per the Wall Street Journal. “They are waging a covert war on the West.”

Earlier this year, the Trump administration claimed Russia had staged a power grid hacking campaign against the U.S. energy grid and other U.S. infrastructure.

The report comes after President Trump told reporters last week during a joint press conference in Helsinki alongside Russian President Vladimir Putin that he had no reason not to believe the Russian leader's assurances to him that the Kremlin was not to blame for interference in the election.

Trump later admitted that he misspoke when he said he didn’t “see any reason why” Russia would have meddled in the 2016 election, and said he believes the U.S. intelligence community assessment that found that the Russian government did interfere in the electoral process.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.