China taps Honeywell to develop smart grid

By Electricity Forum


CSA Z462 Arc Flash Training - Electrical Safety Essentials

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$249
Coupon Price:
$199
Reserve Your Seat Today
Honeywell announced it was selected to develop and implement ChinaÂ’s first smart grid pilot project and feasibility study for managing energy use in commercial buildings, also known as demand-side management.

The project is part of a grant agreement signed today between the U.S. Trade and Development Agency USTDA and State Grid Electric Power Research Institute SGEPRI, sponsor of the project and a subsidiary of State Grid Corp. of China.

The pilot will center on HoneywellÂ’s smart grid technology and expertise, including automated demand response, advanced energy management and submetering. The company will help connect State Grid and its customers to manage energy supply and demand, automatically adjusting electricity consumption and reducing strain on ChinaÂ’s utility infrastructure. This is especially important in commercial and industrial facilities, which account for 70 percent of worldwide electricity use.

The demonstration will allow SGEPRI to assess the feasibility of broader deployment of smart grid solutions, and support the development of standards and regulations. The institute will also examine the opportunities and challenges businesses face in linking their energy- and demand-management efforts with an increasingly dynamic electrical grid.

“We’re honored to partner with State Grid to demonstrate the economic benefits of smart grid technologies that help manage the demand for electricity,” said Shane Tedjarati, president and chief executive officer of Honeywell China and India. “Honeywell is one of the only companies with technology that lets utilities broadcast signals to alert customers when energy use spikes and outpaces the ability to generate power. We also have relationships with commercial and industrial enterprises throughout China, and can help them define and automate their responses to those demand signals.”

The grant agreement stems from the China-U.S. Energy Cooperation Program ECP, an initiative started by USTDA and the National Energy Administration of China to spur joint business development in the clean energy sector.

A smarter electrical grid will help China manage the growing demand for energy, and improve the reliability and efficiency of the countryÂ’s utility infrastructure by allowing electrical consumers to better manage how and when they use their energy based on availability and cost. It will also allow broader integration of renewable energy sources, such as wind and solar, and help residents, businesses and industry better control costs and be more energy efficient.

“Residential and industrial electricity customers and grid operators are forming important new relationships across China. Honeywell has a proven track record of working with both utilities and their customers around the globe, giving it a unique perspective on how to quickly realize the benefits of the evolving grid,” commented Mr. Shijie Xiao, president of SGEPRI.

“Implementation of this pilot project will expose us to the latest solutions and help identify the most suitable technologies for China. The demonstration is expected not only to provide the first-hand and real-time data for a feasibility study to deploy demand response in the smart grid in China, but also to support the promulgation of relevant regulations and standards.”

With controls in 150 million homes, 10 million buildings and thousands of industrial sites, and experience managing demand response and efficiency programs for more than 100 utilities, Honeywell has the offerings and experience to empower smart energy users. The companyÂ’s technology and services are at the heart of smart grid projects reducing both day-to-day and peak electricity consumption. For example, Honeywell has helped give utilities combined control of more than 1 gigawatt of peak load, which is equivalent to the generation capacity of approximately 20 gas-fired peaking plants.

Related News

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Power outage update: 252,596 remain without electricity Wednesday

North Carolina Power Outages continue after Hurricane Florence, with Wilmington and Eastern Carolina facing flooding, storm damage, and limited access as Duke Energy crews and mutual aid work on restoration across affected counties.

 

Key Points

Outages after Hurricane Florence, with Wilmington and Eastern Carolina hardest hit as crews restore service amid floods.

✅ Over 250,000 outages statewide as of early Wednesday

✅ Wilmington cut off by flooding, hindering utility access

✅ Duke Energy and EMC crews conduct phased restoration

 

Power is slowly being restored to Eastern Carolina residents after Hurricane Florence made landfall near Wilmington on Friday, September 15, a scenario echoed by storm-related outages in Tennessee in recent days.

On Monday, more than half a million people remained without power across the state, a situation comparable to post-typhoon electricity losses in Hong Kong reported elsewhere.

As of Wednesday morning at 1am, the Dept. of Public Safety reports 252,596 total power outages in North Carolina, and utilities continue warning about copper theft hazards during restoration.

More than half of those customers are in Eastern Carolina.

More than 32,000 customers are without power in Carteret County and roughly 21,000 are without power in Onslow County.

In Craven County, roughly 15,000 people remain without power Wednesday morning.

Many of the state's outages are effecting the Wilmington area, where Florence made landfall and widespread flooding is still cutting off the city from outside resources, similar to how a fire-triggered outage in Los Angeles disrupted service regionally.

Heavy rain, strong winds and now flooded roadways have hindered power crews, challenges that utility climate adaptation aims to address while many of them have out-of-state or out-of-town help working to restore power to so many people.

Here's a breakdown of current outages by utility company:

DUKE ENERGY PROGRESS - 

  • 1,350 in Beaufort Co. 
  • 10,706 in Carteret Co. 
  • 2,716 in Pamlico Co. 
  • 7,422 in Craven Co. 
  • 1,687 in Jones Co. 
  • 13,319 in Onslow Co. 
  • 7,452 in Pender Co. 
  • 48,281 in New Hanover Co. 
  • 5,257 in Duplin Co. 
  • 488 in Lenoir Co. 
  • 1,231 in Pitt Co.

 

JONES-ONSLOW EMC - 10,964 total 

  • 7,699 in Onslow Co. 
  • 2,366 in Pender Co. 
  • 816 in Jones Co.

TIDELAND EMC - 

  • 174 in Beaufort Co.
  • 1,521 in Craven Co.
  • 1,693 in Pamlico Co.

CARTERET-CRAVEN ELECTRIC CO OP- 

  • 21,974 in Carteret Co. 
  • 6,553 in Craven Co.
  • 216 in Jones Co.

 

Related News

View more

Attacks on power substations are growing. Why is the electric grid so hard to protect?

Power Grid Attacks surge across substations and transmission lines, straining critical infrastructure as DHS and FBI cite vandalism, domestic extremists, and cybersecurity risks impacting resilience, outages, and grid reliability nationwide.

 

Key Points

Power Grid Attacks are deliberate strikes on substations and lines to disrupt power and weaken grid reliability.

✅ Physical attacks rose across multiple states and utilities.

✅ DHS and FBI warn of threats to critical infrastructure.

✅ Substation security and grid resilience upgrades urged.

 

Even before Christmas Day attacks on power substations in five states in the Pacific Northwest and Southeast, similar incidents of attacks, vandalism and suspicious activity were on the rise.

Federal energy reports through August – the most recent available – show an increase in physical attacks at electrical facilities across the nation this year, continuing a trend seen since 2017.

At least 108 human-related events were reported during the first eight months of 2022, compared with 99 in all of 2021 and 97 in 2020. More than a dozen cases of vandalism have been reported since September.

The attacks have prompted a flurry of calls to better protect the nation's power grid, with a renewed focus on protecting the U.S. power grid across sectors, but experts have warned for more than three decades that stepped-up protection was needed.

Attacks on power stations on the rise 
Twice this year, the Department of Homeland Security warned "a heightened threat environment" remains for the nation, including its critical infrastructure amid reports of suspected Russian breaches of power plant systems. 

At least 20 actual physical attacks were reported, compared with six in all of 2021. 
Suspicious-activity reports jumped three years ago, nearly doubling in 2020 to 32 events. In the first eight months of this year, 34 suspicious incidents were reported.
Total human-related incidents – including vandalism, suspicious activity and cyber events such as Russian hackers and U.S. utilities in recent years – are on track to be the highest since the reports started showing such activity in 2011.


Attacks reported in at least 5 states
Since September, attacks or potential attacks have been reported on at least 18 additional substations and one power plant in Florida, Oregon, Washington and the Carolinas. Several involved firearms.

  • In Florida: Six "intrusion events" occurred at Duke Energy substations in September, resulting in at least one brief power outage, according to the News Nation television network, which cited a report the utility sent to the Energy Department. Duke Energy spokesperson Ana Gibbs confirmed a related arrest, but the company declined to comment further.
  • In Oregon and Washington state: Substations were attacked at least six times in November and December, with firearms used in some cases, local news outlets reported. On Christmas Day, four additional substations were vandalized in Washington State, cutting power to more than 14,000 customers.
  • In North Carolina: A substation in Maysville was vandalized on Nov. 11. On Dec. 3, shootings that authorities called a "targeted attack" damaged two power substations in Moore County, leaving tens of thousands without power amid freezing temperatures.
  • In South Carolina: Days later, gunfire was reported near a hydropower plant, but police said the shooting was a "random act."

It's not yet clear whether any of the attacks were coordinated. After the North Carolina attacks, a coordinating council between the electric power industry and the federal government ordered a security evaluation.


FBI mum on its investigations
The FBI is looking into some of the attacks, including cyber intrusions where hackers accessed control rooms in past cases, but it hasn't said how many it's investigating or where. 

Shelley Lynch, a spokesperson for the FBI's Charlotte field office, confirmed the bureau was investigating the North Carolina attack. The Kershaw County Sheriff's Office reported the FBI was looking into the South Carolina incident.

Utilities in Oregon and Washington told news outlets they were cooperating with the FBI, but spokespeople for the agency's Seattle and Portland field offices said they couldn't confirm or deny an investigation.

Could domestic extremists be involved?
In January, the Department of Homeland Security said domestic extremists had been developing "credible, specific plans" since at least 2020, including a Neo-Nazi plot against power stations detailed in a federal complaint, and would continue to "encourage physical attacks against electrical infrastructure."

In February, three men who ascribed to white supremacy and Neo-Nazism pleaded guilty to federal crimes related to a scheme to attack the grid with rifles.

In a news release, Timothy Langan, assistant director of the FBI’s Counterterrorism Division, said the defendants "wanted to attack regional power substations and expected the damage would lead to economic distress and civil unrest."

 

Why is the power grid so hard to protect?
Industry experts, federal officials and others have warned in one report after another since at least 1990 that the power grid was at risk, and a recent grid vulnerability report card highlights dangerous weak points, said Granger Morgan, an engineering professor at Carnegie Mellon University who chaired three National Academies of Sciences reports.

The reports urged state and federal agencies to collaborate to make the system more resilient to attacks and natural disasters such as hurricanes and storms. 

"The system is inherently vulnerable, with the U.S. grid experiencing more blackouts than other developed nations in one study. It's spread all across the countryside," which makes the lines and substations easy targets, Morgan said. The grid includes more than 7,300 power plants, 160,000 miles of high-voltage power lines and 55,000 transmission substations.

One challenge is that there's no single entity whose responsibilities span the entire system, Morgan said. And the risks are only increasing as the grid expands to include renewable energy sources such as solar and wind, he said. 

 

Related News

View more

Wasteful air conditioning adds $200 to summer energy bills, reveals BC Hydro

BC Hydro Air Conditioning Efficiency Tips help cut energy bills as HVAC use rises. Avoid inefficient portable AC units, set thermostats near 25 C, use fans and window shading, and turn systems off when unoccupied.

 

Key Points

BC Hydro's guidelines to lower summer power bills by optimizing A/C settings, fans, shading, and usage habits at home.

✅ Set thermostats to 25 C; switch off A/C when away

✅ Prefer fans and window shading; close doors/windows in heat

✅ Avoid multiple portable A/C units; choose efficient HVAC

 

BC Hydro is scolding British Columbians for their ineffective, wasteful and costly use of home air conditioners.

In what the electric utility calls “not-so-savvy” behaviour, it says many people are over-spending on air conditioning units that are poorly installed or used incorrectly.

"The majority of British Columbians will spend more time at home this summer because of the COVID-19 pandemic," BC Hydro says in a news release about an August survey of customers.

"With A/C use on the rise, there is evidence British Columbians are not cooling down efficiently, leading to higher summer electricity bills, as extreme heat boosts U.S. bills too this summer."

BC Hydro estimates some customers are shelling out $200 more on their summer energy bills than they need to during a record-breaking 2021 demand year for electricity.

The pandemic is compounding the demand for cool, comfortable air at home. Roughly two in five British Columbians between the ages of 25 and 50 are working from home five days a week.

However, it’s not just COVID-19 that is putting a strain on energy consumption and monthly bills, with drought affecting generation as well today.

About 90 per cent of people who use an air conditioner set it to a temperature below the recommended 25 Celsius, according to BC Hydro.

In fact, one in three people have set their A/C to the determinedly unseasonable temperature of 19 C.

Another 30 per cent are using more than one portable air conditioning unit, which the utility says is considered the most inefficient model on the market, and questions remain about crypto mining electricity use in B.C. today.

The use of air conditioners is steadily increasing in B.C. and has more than tripled since 2001, according to BC Hydro, with all-time high demand also reported in B.C. during recent heat waves. The demand for climate control is particularly high among condo-dwellers since apartments tend to trap heat and stay warmer.

This may explain why one in 10 residents of the Lower Mainland has three portable air conditioning units, and elsewhere Calgary's frigid February surge according to Enmax.

In addition, 30 per cent of people keep the air conditioning on for the sake of their pets while no one is home.

BC Hydro makes these recommendations to save energy and money on monthly bills while still keeping homes cooled during summer’s hottest days, and it also offers a winter payment plan to help manage costs:

Cool homes to 25 C in summer months when home; air conditioning should be turned off when homes are unoccupied.
In place of air conditioning, running a fan for nine hours a day over the summer costs $7.
Shading windows with drapes and blinds can help insulate a home by keeping out 65 per cent of the heat.
If the temperature outside a home is warmer than inside, keep doors and windows closed to keep cooler air inside.
Use a microwave, crockpot or toaster oven to avoid the extra heat produced by larger appliances, such as an oven, when cooking. Hang clothes to dry instead of using a dryer on hot days.

 

Related News

View more

When paying $1 for a coal power plant is still paying too much

San Juan Generating Station eyed for $1 coal-plant sale, as Farmington and Acme propose CCS retrofit, meeting emissions caps and renewable mandates by selling captured CO2 for enhanced oil recovery via a nearby pipeline.

 

Key Points

A New Mexico coal plant eyed for $1 and a CCS retrofit to cut emissions and sell CO2 for enhanced oil recovery.

✅ $400M-$800M CCS retrofit; 90% CO2 capture target

✅ CO2 sales for enhanced oil recovery; 20-mile pipeline gap

✅ PNM projects shutdown savings; renewable and emissions mandates

 

One dollar. That’s how much an aging New Mexico coal plant is worth. And by some estimates, even that may be too much.

Acme Equities LLC, a New York-based holding company, is in talks to buy the 847-megawatt San Juan Generating Station for $1, after four of its five owners decided to shut it down. The fifth owner, the nearby city of Farmington, says it’s pursuing the bargain-basement deal with Acme to avoid losing about 1,600 direct and indirect jobs in the area amid a broader just transition debate for energy workers.

 

We respectfully disagree with the notion that the plant is not economical

Acme’s interest comes as others are looking to exit a coal industry that’s been plagued by costly anti-pollution regulations. Acme’s plan: Buy the plant "at a very low cost," invest in carbon capture technology that will lower emissions, and then sell the captured CO2 to oil companies, said Larry Heller, a principal at the holding group.

By doing this, Acme “believes we can generate an acceptable rate of return,” Heller said in an email.

Meanwhile, San Juan’s majority owner, PNM Resources Inc., offers a distinctly different view, echoing declining coal returns reported by other utilities. A 2022 shutdown will push ratepayers to other energy alternatives now being planned, saving them about $3 to $4 a month on average, PNM has said.

“We could not identify a solution that would make running San Juan Generating Station economical,” said Tom Fallgren, a PNM vice president, in an email.

The potential sale comes as a new clean-energy bill, supported by Governor Lujan Grisham, is working its way through the state legislature. It would require the state to get half of its power from renewable sources by 2030, and 100 percent by 2045, even as other jurisdictions explore small modular reactor strategies to meet future demand. At the same time, the legislation imposes an emissions cap that’s about 60 percent lower than San Juan’s current levels.

In response, Acme is planning to spend $400 million to $800 million to retrofit the facility with carbon capture and sequestration technology that would collect carbon dioxide before it’s released into the atmosphere, Heller said. That would put the facility into compliance with the pending legislation and, at the same time, help generate revenue for the plant.

The company estimates the system would cut emissions by as much as 90 percent, and the captured gas could be sold to oil companies, which uses it to enhance well recovery. The bottom line, according to Heller: “A winning financial formula.”

It’s a tricky formula at best. Carbon-capture technology has been controversial, even as new coal plant openings remain rare, expensive to install and unproven at scale. Additionally, to make it work at the San Juan plant, the company would need to figure out how to deliver the CO2 to customers since the nearest pipeline is about 20 miles (32 kilometers) away.

 

Reducing costs

Acme is also evaluating ways to reduce costs at San Juan, Heller said, including approaches seen at operators extending the life of coal plants under regulatory scrutiny, such as negotiating a cheaper coal-supply contract and qualifying for subsidies.

Farmington’s stake in the plant is less than 10 percent. But under terms of the partnership, the city — population 45,000 — can assume full control of San Juan should the other partners decide to pull out, mirroring policy debates over saving struggling nuclear plants in other regions. That’s given Farmington the legal authority to pursue the plant’s sale to Acme.

 

At the end of the day, nobody wants the energy

“We respectfully disagree with the notion that the plant is not economical,” Farmington Mayor Nate Duckett said by email. Ducket said he’s in better position than the other owners to assess San Juan’s importance “because we sit at Ground Zero.”

The city’s economy would benefit from keeping open both the plant and a nearby coal mine that feeds it, according to Duckett, with operations that contribute about $170 million annually to the local area.

While the loss of those jobs would be painful to some, Camilla Feibelman, a Sierra Club chapter director, is hard pressed to see a business case for keeping San Juan open, pointing to sector closures such as the Three Mile Island shutdown as evidence of shifting economics. The plant isn’t economical now, and would almost certainly be less so after investing the capital to add carbon-capture systems.

 

Related News

View more

Electricity deal clinches $100M bitcoin mining operation in Medicine Hat

Medicine Hat Bitcoin Mining Deal delivers 42 MW electricity to Hut 8, enabling blockchain data centres, cryptocurrency mining expansion, and economic diversification in Alberta with low-cost power, land lease, and rapid construction near Unit 16.

 

Key Points

A pact to supply 42 MW and lease land, enabling Hut 8's blockchain data centres and crypto mining growth in Alberta.

✅ 42 MW electricity from city; land lease near Unit 16

✅ Hut 8 expands to 60.7 MW; blockchain data centres

✅ 100 temporary jobs; 42 ongoing roles in Alberta

 

The City of Medicine Hat has agreed to supply electricity and lease land to a Toronto-based cryptocurrency mining company, at a time when some provinces are pausing large new crypto loads in a deal that will see $100 million in construction spending in the southern Alberta city.

The city will provide electric energy capacity of about 42 megawatts to Hut 8 Mining Corp., which will construct bitcoin mining facilities near the city's new Unit 16 power plant.

The operation is expected to be running by September and will triple the company's operating power to 60.7 megawatts, Hut 8 said, amid broader investments in new turbines across Canada.

#google#

"The signing of the electricity supply agreement and the land lease represents a key component in achieving our business plan for the roll-out of our BlockBox Data Centres in low-cost energy jurisdictions," said the company's board chairman, Bill Tai, in a release.

"[Medicine Hat] offers stable, cost-competitive utility rates and has been very welcoming and supportive of Hut 8's fast-paced growth plans."

In bitcoin mining operations, rows upon rows of power-consuming computers are used to solve mathematical puzzles in exchange for bitcoins and confirm crytopcurrency transactions. The verified transactions are then added to the public ledger known as the blockchain.

Hut 8's existing 18.7-megawatt mining operation at Drumheller, Alta. — a gated compound filled with rows of shipping containers housing the computers — has so far mined 750 bitcoins. Bitcoin was trading Tuesday morning for about $11,180.

Medicine Hat Mayor Ted Clugston says the deal is part of the city's efforts to diversify its economy.

We've made economic development a huge priority down here because we were hit very, very hard by the oil and gas decline," he said, noting that being the generator and vendor of its own electricity puts the city in a uniquely good position.

"Really we're just turning gas into electricity and they're taking that electricity and turning it into blockchain, or ones and zeroes."

Elsewhere in Canada, using more electricity for heat has been urged by green energy advocates, reflecting broader electrification debates.

Hut 8 says construction of the facility is starting right away and will create about 100 temporary jobs. The project is expected to be finished by the third-quarter of this year.

The Medicine Hat mining operation will generate 42 ongoing jobs for electricians, general labourers, systems technicians and security staff.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified