One million lose power in California storm

By Associated Press


Electrical Testing & Commissioning of Power Systems

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$599
Coupon Price:
$499
Reserve Your Seat Today
Howling winds, pelting rain and heavy snow pummeled California January 4, toppling trees, flipping big rigs, cutting power to more than a million people and forcing evacuations in mudslide-prone areas.

Flights were grounded and highways closed in Northern California as gusts reached 80 mph during the second wave of an arctic storm that sent trees crashing onto houses, cars and roads. Forecasters expected the storm to dump as much as 10 feet of snow in the Sierra Nevada.

Highways from Sacramento to San Francisco were closed because of debris or toppled big rigs blocking lanes, and local roads were flooded. Interstate 80 was closed in the Sierra, the main link between Northern California and Nevada.

"A huge tree, over 100 years old, just fell across the house. It just wrecked the whole thing," said Faye Reed, whose daughter Teenia owns the damaged home north of Sacramento. "They won't be able to live in it. The whole ceiling fell in, and now it's raining inside."

More than a million people from the Bay Area to the Central Valley were in the dark. Crews worked to restore power, but it could be days before all the lights are on, said Pacific Gas & Electric spokeswoman Darlene Chiu.

In Southern California, authorities in Orange County ordered an estimated 3,000 residents to evacuate homes in four canyons scarred by wildfires and therefore prone to mudslides.

"It's too late once the rain starts. These areas are extremely vulnerable. You're risking your life and your family's life fundamentally" by ignoring orders, said Steve Sellers of the governor's Office of Emergency Services.

Flash flood warnings were issued in canyon burn areas in Malibu and in Santa Barbara and Ventura counties. Riverside and San Bernardino counties, east of Los Angeles, deployed swift-water rescue teams as a precaution.

The state opened its emergency operations center to coordinate storm response, and Gov. Arnold Schwarzenegger said he had spoken with Homeland Security Secretary Michael Chertoff by phone.

"Preparation is really the heart of this whole thing," Schwarzenegger said after touring the state emergency operation center at the Los Alamitos Joint Training Base.

Homeowners in Southern California stacked sandbags and hay bales around their homes while residents in the low-lying areas of the Central Valley piled sandbags to barricade their homes from streams that forecasters warned might swell.

After looking for a missing Clovis family all afternoon, search teams found 64-year-old John Hopper and his 15-year-old twins, Matt and Sarah, safe in a popular hiking destination in the Sierra National Forest.

Crews found the family with three other people who had apparently gotten trapped in the woods after the storm hit, said Madera County Sheriff's spokeswoman Erica Stuart. All six hikers were in good condition. Travelers' flight plans were put on hold throughout Northern California when airlines delayed or canceled flights. The state Legislature in Sacramento closed offices and sent employees home early.

A wind gust of 125 mph was recorded in the Sierra on Friday afternoon, the National Weather Service said.

The huge storm also toppled trees and cut power to thousands of residents in Washington and Oregon.

Meanwhile, a freeze in the East subsided. Florida's citrus growers weathered the cold largely unscathed, but strawberry and tomato growers watched as some of their crops shriveled.

A serious freeze would have devastated Florida's citrus trees, already struggling from years of diseases and hurricanes.

At Bill Baggs Cape Florida State Park in Key Biscayne, iguanas fell out of trees. The cold-blooded reptiles go into a sort of hibernation when temperatures get too low, even if they are perched in branches. Most woke up when the weather warmed later in the day.

Related News

Siemens Energy to unlock a new era of offshore green hydrogen production

Offshore Wind-to-Hydrogen Integration enables green hydrogen by embedding an electrolyzer in offshore turbines. Siemens Gamesa and Siemens Energy align under H2Mare to decarbonize industry, advance the Paris Agreement, and unlock scalable, off-grid renewable production.

 

Key Points

A method integrating electrolyzers into offshore wind turbines to generate green hydrogen and reduce carbon emissions.

✅ Integrated electrolyzer at turbine base for off-grid operation

✅ Enables scalable, cost-efficient green hydrogen production

✅ Supports decarbonization targets under Paris Agreement

 

To reach the Paris Agreement goals, the world will need vast amounts of green hydrogen and, with offshore wind growth accelerating, wind will provide a large portion of the power needed for its production.

Siemens Gamesa and Siemens Energy announced today that they are joining forces combining their ongoing wind-to-hydrogen developments to address one of the major challenges of our decade - decarbonizing the economy to solve the climate crisis.

The companies are contributing with their developments to an innovative solution that fully integrates an electrolyzer into an offshore wind turbine as a single synchronized system to directly produce green hydrogen. The companies intend to provide a full-scale offshore demonstration of the solution by 2025/2026. The German Federal Ministry of Education and Research, reflecting Germany's clean energy progress, announced today that the developments can be implemented as part of the ideas competition 'Hydrogen Republic of Germany'.

'Our more than 30 years of experience and leadership in the offshore wind industry, coupled with Siemens Energy's expertise in electrolyzers, brings together brilliant minds and cutting-edge technologies to address the climate crisis. Our wind turbines play a huge role in the decarbonization of the global energy system, and the potential of wind to hydrogen means that we can do this for hard-to-abate industries too. It makes me very proud that our people are a part of shaping a greener future,' said Andreas Nauen, Siemens Gamesa CEO.

Christian Bruch, CEO of Siemens Energy, explains: 'Together with Siemens Gamesa, we are in a unique position to develop this game changing solution. We are the company that can leverage its highly flexible electrolyzer technology and create and redefine the future of sustainable offshore energy production. With these developments, the potential of regions with abundant offshore wind, such as the UK offshore wind sector, will become accessible for the hydrogen economy. It is a prime example of enabling us to store and transport wind energy, thus reducing the carbon footprint of economy.'

Over a time frame of five years, Siemens Gamesa plans to invest EUR 80 million and Siemens Energy is targeting to invest EUR 40 million in the developments. Siemens Gamesa will adapt its development of the world's most powerful turbine, the SG 14-222 DD offshore wind turbine to integrate an electrolysis system seamlessly into the turbine's operations. By leveraging Siemens Gamesa's intricate knowledge and decades of experience with offshore wind, electric losses are reduced to a minimum, while a modular approach ensures a reliable and efficient operational set-up for a scalable offshore wind-to-hydrogen solution. Siemens Energy will develop a new electrolysis product to not only meet the needs of the harsh maritime offshore environment and be in perfect sync with the wind turbine, but also to create a new competitive benchmark for green hydrogen.

The ultimate fully integrated offshore wind-to-hydrogen solution will produce green hydrogen using an electrolyzer array located at the base of the offshore wind turbine tower, blazing a trail towards offshore hydrogen production. The solution will lower the cost of hydrogen by being able to run off grid, much like solar-powered hydrogen in Dubai showcases for desert environments, opening up more and better wind sites. The companies' developments will serve as a test bed for making large-scale, cost-efficient hydrogen production a reality and will prove the feasibility of reliable, effective implementation of wind turbines in systems for producing hydrogen from renewable energy.

The developments are part of the H2Mare initiative which is a lighthouse project likely to be supported by the German Federal Ministry of Education and Research ideas competition 'Hydrogen Republic of Germany'. The H2mare initiative under the consortium lead of Siemens Energy is a modular project consisting of multiple sub-projects to which more than 30 partners from industry, institutes and academia are contributing. Siemens Energy and Siemens Gamesa will contribute to the H2Mare initiative with their own developments in separate modular building blocks.

About hydrogen and its role in the green energy transition

Currently 80 million tons of hydrogen are produced each year and production is expected to increase by about 20 million tons by 2030. Just 1% of that hydrogen is currently generated from green energy sources. The bulk is obtained from natural gas and coal, emitting 830 million tons of CO2 per year, more than the entire nation of Germany or the global shipping industry. Replacing this current polluting consumption would require 820 GW of wind generating capacity, 26% more than the current global installed wind capacity. Looking further ahead, many studies suggest that by 2050 production will have grown to about 500 million tons, with a significant shift to green hydrogen already signaled by projects like Brazil's green hydrogen plant now underway. The expected growth will require between 1,000 GW and 4,000 GW of renewable capacity by 2050 to meet demand, and in the U.S. initiatives like DOE hydrogen hubs aim to catalyze this build-out, which highlights the vast potential for growth in wind power.

 

Related News

View more

California electricity pricing changes pose an existential threat to residential rooftop solar

California Rooftop Solar Rate Reforms propose shifting net metering to fixed access fees, peak-demand charges, and time-of-use pricing, aligning grid costs, distributed generation incentives, and retail rates for efficient, least-cost electricity and fair cost recovery.

 

Key Points

Policies replacing net metering with fixed fees, demand charges, and time-of-use rates to align costs and incentives.

✅ Large fixed access charge funds grid infrastructure

✅ Peak-demand pricing reflects capacity costs at system peak

✅ Time-varying rates align marginal costs and emissions

 

The California Public Service Commission has proposed revamping electricity rates for residential customers who produce electricity through their rooftop solar panels. In a recent New York Times op‐​ed, former Governor Arnold Schwarzenegger argued the changes pose an existential threat to residential rooftop solar. Interest groups favoring rooftop solar portray the current pricing system, often called net metering, in populist terms: “Net metering is the one opportunity for the little guy to get relief, and they want to put the kibosh on it.” And conventional news coverage suggests that because rooftop solar is an obvious good development and nefarious interests, incumbent utilities and their unionized employees, support the reform, well‐​meaning people should oppose it. A more thoughtful analysis would inquire about the characteristics and prices of a system that supplies electricity at least cost.

Currently, under net metering customers are billed for their net electricity use plus a minimum fixed charge each month. When their consumption exceeds their home production, they are billed for their net use from the electricity distribution system (the grid) at retail rates. When their production exceeds their consumption and the excess is supplied to the grid, residential consumers also are reimbursed at retail rates. During a billing period, if a consumer’s production equaled their consumption their electric bill would only be the monthly fixed charge.

Net metering would be fine if all the fixed costs of the electric distribution and transmission systems were included in the fixed monthly charge, but they are not. Between 66 and 77 percent of the expenses of California private utilities do not change when a customer increases or decreases consumption, but those expenses are recovered largely through charges per kWh of use rather than a large monthly fixed charge. Said differently, for every kWh that a PG&E solar household exported into the grid in 2019, it saved more than 26 cents, on average, while the utility’s costs only declined by about 8 cents or less including an estimate of the pollution costs of the system’s fossil fuel generators. The 18‐​cent difference pays for costs that don’t change with variation in a household’s consumptions, like much of the transmission and distribution system, energy efficiency programs, subsidies for low‐​income customers, and other fixed costs. Rooftop solar is so popular in California because its installation under a net metering system avoids the 18 cents, creating a solar cost shift onto non-solar customers. Rooftop solar is not the answer to all our environmental needs. It is simply a form of arbitrage around paying for the grid’s fixed costs.

What should electricity tariffs look like? This article in Regulation argues that efficient charges for electricity would consist of three components: a large fixed charge for the distribution and transmission lines, meter reading, vegetation trimming, etc.; a peak‐​demand charge related to your demand when the system’s peak demand occurs to pay for fixed capacity costs associated with peak use; and a charge for electricity use that reflects the time‐ and location‐​varying cost of additional electricity supply.

Actual utility tariffs do not reflect this ideal because of political concerns about the effects of large fixed monthly charges on low‐​income customers and the optics of explaining to customers that they must pay 50 or 60 dollars a month for access even if their use is zero. Instead, the current pricing system “taxes” electricity use to pay for fixed costs. And solar net metering is simply a way to avoid the tax. The proposed California rate reforms would explicitly impose a fixed monthly charge on rooftop solar systems that are also connected to the grid, a change that could bring major changes to your electric bill statewide, and would thus end the fixed‐​cost avoidance. Any distributional concerns that arise because of the effect of much larger fixed charges on lower‐​income customers could be managed through explicit tax deductions that are proportional to income.

The current rooftop solar subsidies in California also should end because they have perverse incentive effects on fossil fuel generators, even as the state exports its energy policies to neighbors. Solar output has increased so much in California that when it ends with every sunset, natural gas generated electricity has to increase very rapidly. But the natural gas generators whose output can be increased rapidly have more pollution and higher marginal costs than those natural gas plants (so called combined cycle plants) whose output is steadier. The rapid increase in California solar capacity has had the perverse effect of changing the composition of natural gas generators toward more costly and polluting units.

The reforms would not end the role of solar power. They would just shift production from high‐​cost rooftop to lower‐​cost centralized solar production, a transition cited in analyses of why electricity prices are soaring in California, whose average costs are comparable with electricity production in natural gas generators. And they would end the excessive subsidies to solar that have negatively altered the composition of natural gas generators.

Getting prices right does not generate citizen interest as much as the misguided notion that rooftop solar will save the world, and recent efforts to overturn income-based utility charges show how politicized the debate remains. But getting prices right would allow the decentralized choices of consumers and investors to achieve their goals at least cost.

 

Related News

View more

Former B.C. Hydro CEO earns half a million without working a single day

B.C. Hydro Salary Continuance Payout spotlights executive compensation, severance, and governance at a Crown corporation after a firing, citing financial disclosure reports, Site C dam ties, and a leadership change under a new government.

 

Key Points

Severance-style pay for B.C. Hydro's fired CEO, via salary continuance and disclosed in public filings.

✅ $541,615 total compensation without working days

✅ Salary continuance after NDP firing; financial disclosures

✅ Later named Canada Post interim CEO amid strike

 

Former B.C. Hydro president and chief executive officer Jessica McDonald received a total of $541,615 in compensation during the 2017-2018 fiscal year, a figure that sits amid wider debates over executive pay at utilities such as Hydro One CEO pay at the provincial utility, without having worked a single day for the Crown corporation.

She earned this money under a compensation package after the in-coming New Democratic government of John Horgan fired her, a move comparable to Ontario's decision when the Hydro One CEO and board exit amid share declines. The previous B.C. Liberal government named her president and CEO of B.C. Hydro in 2014, and McDonald was a strong supporter of the controversial Site C dam project now going ahead following a review.

The current New Democratic government placed her on what financial disclosure documents call “salary continuance” effective July 21, 2017 — the day the government announced her departure — at a utility scrutinized in a misled regulator report that raised oversight concerns.

According to financial disclosure statements, McDonald remained on “salary continuance” until Sept. 21 of this year, and the utility has also been assessed in a deferred operating costs report released by the auditor general. During this period, she earned $272,659, a figure that includes benefits, pension and other compensation.

McDonald — who used to be the deputy minister to former premier Gordon Campbell — is now working for Canada Post, which appointed her as interim president and chief executive officer in March, while developments at Manitoba Hydro highlight broader political pressures on Crown utilities.

She started in her new role on April 2, 2018, and now finds herself in the middle of managing a postal carrier strike.

 

Related News

View more

Finland Investigates Russian Ship After Electricity Cable Damage

Finland Shadow Fleet Cable Investigation details suspected Russia-linked sabotage of Baltic Sea undersea cables, AIS dark activity, and false-flag tactics threatening critical infrastructure, prompting NATO and EU vigilance against hybrid warfare across Northern Europe.

 

Key Points

Finland probes suspected sabotage of undersea cables by a Russia-linked vessel using flag of convenience and AIS off.

✅ Undersea cable damage in Baltic Sea sparks security alerts

✅ Suspected shadow fleet ship ran AIS dark under false flag

✅ NATO and EU boost maritime surveillance, critical infrastructure

 

In December 2024, Finland launched an investigation into a ship allegedly linked to Russia’s “shadow fleet” following a series of incidents involving damage to undersea cables. The investigation has raised significant concerns in Finland and across Europe, as it suggests possible sabotage or other intentional acts related to the disruption of vital communication and energy infrastructure in the Baltic Sea region. This article explores the key details of the investigation, the role of Russia’s shadow fleet, and the broader geopolitical implications of this event.

The "Shadow Fleet" and Its Role

The term “shadow fleet” refers to a collection of ships, often disguised or operating under false flags, that are believed to be part of Russia's covert maritime operations. These vessels are typically used for activities such as smuggling, surveillance, and potentially military operations, mirroring the covert hacker infrastructure documented by researchers in related domains. In recent years, the "shadow fleet" has been under increasing scrutiny due to its involvement in various clandestine actions, especially in regions close to NATO member countries and areas with sensitive infrastructure.

Russia’s "shadow fleet" operates in the shadows of regular international shipping, often difficult to track due to the use of deceptive practices like turning off automatic identification systems (AIS). This makes it difficult for authorities to monitor their movements and assess their true purpose, raising alarm bells when one of these ships is suspected of being involved in damaging vital infrastructure like undersea cables.

The Cable Damage Incident

The investigation was sparked after damage was discovered to an undersea cable in the Baltic Sea, a vital link for communication, data transmission, and energy supply between Finland and other parts of Europe. These undersea cables are crucial for everything from internet connections to energy grid stability, with recent Nordic grid constraints underscoring their importance, and any disruption to them can have serious consequences.

Finnish authorities reported that the damage appeared to be deliberate, raising suspicions of potential sabotage. The timing of the damage coincides with a period of heightened tensions between Russia and the West, particularly following the escalation of the war in Ukraine, with recent strikes on Ukraine's power grid highlighting the stakes, and ongoing geopolitical instability. This has led many to speculate that the damage to the cables could be part of a broader strategy to undermine European security and disrupt critical infrastructure.

Upon further investigation, a vessel that had been in the vicinity at the time of the damage was identified as potentially being part of Russia’s "shadow fleet." The ship had been operating under a false flag and had disabled its AIS system, making it challenging for authorities to track its movements. The vessel’s activities raised red flags, and Finnish authorities are now working closely with international partners to ascertain its involvement in the incident.

Geopolitical Implications

The damage to undersea cables and the suspected involvement of Russia’s "shadow fleet" have broader geopolitical implications, particularly in the context of Europe’s security landscape. Undersea cables are considered critical infrastructure, akin to electric utilities where intrusions into US control rooms have been documented, and any deliberate attack on them could be seen as an act of war or an attempt to destabilize regional security.

In the wake of the investigation, there has been increased concern about the vulnerability of Europe’s energy and communication networks, which are increasingly reliant on these undersea connections, and as the Baltics pursue grid synchronization with the EU to reduce dependencies, policymakers are reassessing resilience measures. The European Union, alongside NATO, has expressed growing alarm over potential threats to this infrastructure, especially as tensions with Russia continue to escalate.

The incident also highlights the growing risks associated with hybrid warfare tactics, which combine conventional military actions with cyberattacks, including the U.S. condemnation of power grid hacking as a cautionary example, sabotage, and disinformation campaigns. The targeting of undersea cables could be part of a broader strategy by Russia to disrupt Europe’s ability to coordinate and respond effectively, particularly in the context of ongoing sanctions and diplomatic pressure.

Furthermore, the suspected involvement of a "shadow fleet" ship raises questions about the transparency and accountability of maritime activities in the region. The use of vessels operating under false flags or without identification systems complicates efforts to monitor and regulate shipping in international waters. This has led to calls for stronger maritime security measures and greater cooperation between European countries to ensure the safety and integrity of critical infrastructure.

Finland’s Response and Ongoing Investigation

In response to the cable damage incident, Finnish authorities have mobilized a comprehensive investigation, seeking to determine the extent of the damage and whether the actions were deliberate or accidental. The Finnish government has called for increased vigilance and cooperation with international partners to identify and address potential threats to undersea infrastructure, drawing on Symantec's Dragonfly research for insights into hostile capabilities.

Finland, which shares a border with Russia and has been increasingly concerned about its security in the wake of Russia's invasion of Ukraine, has ramped up its defense posture. The damage to undersea cables serves as a stark reminder of the vulnerabilities that come with an interconnected global infrastructure, and Finland’s security services are likely to scrutinize the incident as part of their broader defense strategy.

Additionally, the incident is being closely monitored by NATO and the European Union, both of which have emphasized the importance of safeguarding critical infrastructure. As an EU member and NATO partner, Finland’s response to this situation could influence how Europe addresses similar challenges in the future.

The investigation into the damage to undersea cables in the Baltic Sea, allegedly linked to Russia’s "shadow fleet," has significant implications for European security. The use of covert operations, including the deployment of ships under false flags, underscores the growing threats to vital infrastructure in the region. With tensions between Russia and the West continuing to rise, the potential for future incidents targeting critical communication and energy networks is a pressing concern.

As Finland continues its investigation, the incident highlights the need for greater international cooperation and vigilance in safeguarding undersea cables and other critical infrastructure. In a world where hybrid warfare tactics are becoming increasingly common, ensuring the security of these vital connections will be crucial for maintaining stability in Europe. The outcome of this investigation may serve as a crucial case study in the ongoing efforts to protect infrastructure from emerging and unconventional threats.

 

Related News

View more

ACORE tells FERC that DOE Proposal to Subsidize Coal, Nuclear Power Plants is unsupported by Record

FERC Grid Resiliency Pricing Opposition underscores industry groups, RTOs, and ISOs rejecting DOE's NOPR, warning against out-of-market subsidies for coal and nuclear, favoring competitive markets, reliability, and true grid resilience.

 

Key Points

Coalition urging FERC to reject DOE's NOPR subsidies, protecting reliability and competitive power markets.

✅ Industry groups, RTOs, ISOs oppose DOE NOPR

✅ PJM reports sufficient reliability and resilience

✅ Reject out-of-market aid to coal, nuclear

 

A diverse group of a dozen energy industry associations representing oil, natural gas, wind, solar, efficiency, and other energy technologies today submitted reply comments to the Federal Energy Regulatory Commission (FERC) continuing their opposition to the Department of Energy's (DOE) proposed rulemaking on grid resiliency pricing and electricity pricing changes within competitive markets, in the next step in this FERC proceeding.

Action by FERC, as lawmakers urge movement on aggregated DERs to modernize markets, is expected by December 11.

In these comments, this broad group of energy industry associations notes that most of the comments submitted initially by an unprecedented volume of filers, including grid operators whose markets would be impacted by the proposed rule, urged FERC not to adopt DOE'sproposed rule to provide out-of-market financial support to uneconomic coal and nuclear power plants in the wholesale electricity markets overseen by FERC.

Just a small set of interests - those that would benefit financially from discriminatory pricing that favors coal and nuclear plants - argued in favor of the rule put forward by DOE in its Notice of Proposed Rulemaking, or NOPR, as did coal and business interests in related regulatory debates. But even those interests - termed 'NOPR Beneficiaries' by the energy associations - failed to provide adequate justification for FERC to approve the rule, and their specific alternative proposals for implementing the bailout of these plants were just as flawed as the DOE plan, according to the energy industry associations.

'The joint comments filed today with partners across the energy spectrum reflect the overwhelming majority view that this proposed rulemaking by FERC is unprecedented and unwarranted, said Todd Foley, Senior Vice President, Policy & Government Affairs, American Council on Renewable Energy.

We're hopeful that FERC will rule against an anti-competitive distortion of the electricity marketplace and avoid new unnecessary initiatives that increase power prices for American consumers and businesses.'

In the new reply comments submitted in response to the initial comments filed by hundreds of stakeholders on or before October 23 - the energy industry associations made the following points: Despite hundreds of comments filed, no new information was brought forth to validate the assertion - by DOE or the NOPR Beneficiaries - that an emergency exists that requires accelerated action to prop up certain power plants that are failing in competitive electricity markets: 'The record in this proceeding, including the initial comments, does not support the discriminatory payments proposed' by DOE, state the industry groups.

Nearly all of the initial comments filed in the matter take issue with the DOE NOPR and its claim of imminent threats to the reliability and resilience of the electric power system, despite reports of coal and nuclear disruptions cited by some advocates: 'Of the hundreds of comments filed in response to the DOE NOPR, only a handful purported to provide substantive evidence in support of the proposal. In contrast, an overwhelming majority of initial comments agree that the DOE NOPR fails to substantiate its assertions of an immediate reliability or resiliency need related to the retirement of merchant coal-fired and nuclear generation.'

Grid operators filed comments refuting claims that the potential retirement of coal and nuclear plants which could not compete for economically present immediate or near-term challenges to grid management, even as a coal CEO criticism targeted federal decisions: 'Even the RTOs and ISOs themselves filed comments opposing the DOE NOPR, noting that the proposed cost-of-service payments to preferred generation would disrupt the competitive markets and are neither warranted nor justified.... Most notably, this includes PJM Interconnection, ... the RTO in which most of the units potentially eligible for payments under the DOE NOPR are located. PJM states that its region 'unquestionably is reliable, and its competitive markets have for years secured commitments from capacity resources that well exceed the target reserve margin established to meet [North American Electric Reliability Corp.] requirements.' And PJM analysis has confirmed that the region's generation portfolio is not only reliable, but also resilient.'

The need for NOPR Beneficiaries to offer alternative proposals reflects the weakness of DOE'srule as drafted, but their options for propping up uneconomic power plants are no better, practically or legally: 'Plans put forward by supporters of the power plant bailout 'acknowledge, at least implicitly, that the preferential payment structure proposed in the DOE NOPR is unclear, unworkable, or both. However, the alternatives offered by the NOPR Beneficiaries, are equally flawed both substantively and procedurally, extending well beyond the scope of the DOE NOPR.'

Citing one example, the energy groups note that the detailed plan put forward by utility FirstEnergy Service Co. would provide preferential payments far more costly than those now provided to individual power plants needed for immediate reasons (and given a 'reliability must run' contract, or RMR): 'Compensation provided under [FirstEnergy's proposal] would be significantly expanded beyond RMR precedent, going so far as to include bailing [a qualifying] unit out of debt based on an unsupported assertion that revenues are needed to ensure long-term operation.'

Calling the action FERC would be required to take in adopting the DOE proposal 'unprecedented,' the energy industry associations reiterate their opposition: 'While the undersigned support the goals of a reliable and resilient grid, adoption of ill-considered discriminatory payments contemplated in the DOE NOPR is not supportable - or even appropriate - from a legal or policy perspective.

 

About ACORE

The American Council on Renewable Energy (ACORE) is a national non-profit organization leading the transition to a renewable energy economy. With hundreds of member companies from across the spectrum of renewable energy technologies, consumers and investors, ACORE is uniquely positioned to promote the policies and financial structures essential to growth in the renewable energy sector. Our annual forums in Washington, D.C., New York and San Franciscoset the industry standard in providing important venues for key leaders to meet, discuss recent developments, and hear the latest from senior government officials and seasoned experts.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified