Dewa in China to woo renewable energy firms


smart grid in china

NFPA 70b Training - Electrical Maintenance

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today

Dewa-China Renewable Energy Partnership advances solar, clean energy, smart grid, 5G, cloud, and Big Data, linking Dewa with Hanergy and Huawei for R&D, smart meters, demand management, and resilient network infrastructure.

 

Key Points

A Dewa collaboration with Hanergy and Huawei to co-develop solar, smart grid, 5G, cloud, and resilient utility networks.

✅ MoU expands solar PV and distributed generation in Dubai and China

✅ Smart grid R&D: smart meters, demand response, self-healing networks

✅ 5G, cloud, and Big Data enable secure, scalable smart city services

 

A high-level delegation from Dubai Electricity and Water Authority (Dewa) recently visited China in bid to build closer ties with Chinese renewable and clean energy and smart services and smart grid companies, amid broader power grid modernization in Asia trends.

The team led by the managing director and CEO Saeed Mohammed Al Tayer visited the headquarters of Hanergy Holding Group, one of the largest international companies in alternative and renewable energy, in Beijing.

The visit complements the co-operation between Dewa and Hanergy after the signing MoU between the two sides last May, said a statement from Dewa.

The two parties focused on renewable and clean energy and its development, including efforts to integrate solar into the grid through advanced programs, and enhancing opportunities for joint investment.

Al Tayer also visited the Exhibition Hall and Exhibition Centre of the Hanergy Clean Energy Exhibition spread over a 7,000-sq-m area at the Beijing Olympic Park.

He discussed solar power technologies and applications, which included integrated photovoltaic panels and their distribution on the roofs of industrial and residential buildings, residential and mobile power systems, micro-grid installations in remote regions, solar-powered vehicles, and various elements of the exhibition.

Al Tayer and the accompanying delegation later visited the Beijing R&D Centre, which is one of Huaweis largest research institutes, known for Huawei smart grid initiatives across global markets, that employs over 12,000 people. The centre covers the latest pre-5G solutions, Cloud, Big Data, as well as vertical solutions for a smart and safe city.

"The visit is part of a joint venture with Huawei, which includes R&D projects to develop smart network infrastructures and various mechanisms and technologies, aligned with recent U.S. grid improvement funding initiatives, such as smart meters for electricity and water services, energy demand management, and self-recovery mechanisms from errors and disasters," he added.

 

Related News

Related News

Power Outage in Northeast D.C.

Northeast D.C. Power Outage highlights Pepco substation equipment failure, widespread service disruptions, grid reliability concerns, and restoration efforts, with calls for smart grid upgrades, better communication, and resilient infrastructure to protect residents, schools, and businesses.

 

Key Points

A Pepco substation failure caused outages, prompting restoration work and plans for smarter, resilient grid upgrades.

✅ Pepco cites substation equipment failure as root cause

✅ Crews prioritized rapid restoration and customer updates

✅ Calls grow for smart grid, resilience, and transparency

 

A recent power outage affecting Northeast Washington, D.C., has drawn attention to the vulnerabilities within the city’s energy infrastructure. The outage, caused by equipment failure at a Pepco substation, left thousands of residents in the dark and raised concerns about the reliability of electricity services in the area.

The Outage: What Happened?

On a typically busy weekday morning, Pepco, the local electric utility, reported significant power disruptions that affected several neighborhoods in Northeast D.C. Initial reports indicated that around 3,000 customers were without electricity due to issues at a nearby substation. The outages were widespread, impacting homes, schools, and businesses, and reflecting pandemic energy insecurity seen in many communities, creating a ripple effect of inconvenience and frustration.

Residents experienced not only the loss of power but also disruptions in daily activities. Many were unable to work from home, students faced challenges with remote learning, and businesses had to close or operate under limited conditions. The timing of the outage further exacerbated the situation, as it coincided with a period of increased demand for electricity, making efforts to prevent summer outages even more crucial for residents and businesses.

Community Response

In the wake of the outage, local community members and leaders quickly mobilized to assess the situation. Pepco crews were dispatched to restore power as swiftly as possible, but residents were left grappling with the immediate consequences. Local organizations and community leaders stepped in to provide support, especially as extreme heat can exacerbate electricity struggles for vulnerable households, offering resources such as food and shelter for those most affected.

Social media became a vital tool for residents to share information and updates about the situation. Many took to platforms like Twitter and Facebook to report their experiences and seek assistance. This grassroots communication helped keep the community informed and fostered a sense of solidarity during the disruption.

The Utility's Efforts

Pepco’s response involved not only restoring power but also addressing the underlying issues that led to the outage. The utility company communicated its commitment to investigating the cause of the equipment failure and ensuring that similar incidents would be less likely in the future. As part of this commitment, Pepco outlined plans for infrastructure upgrades, despite supply-chain constraints facing utilities nationwide, aimed at enhancing reliability across its service area.

Moreover, Pepco emphasized the importance of communication during outages. The company has been working to improve its notification systems, ensuring that customers receive timely updates about outages and restoration efforts. Enhanced communication can help mitigate the frustration experienced during such events and keep residents informed about when they can expect power to be restored.

Broader Implications for D.C.'s Energy Infrastructure

This recent outage has sparked a larger conversation about the resilience of Washington, D.C.’s energy infrastructure. As the city continues to grow and evolve, the demand for reliable electricity is more critical than ever. Frequent outages can undermine public confidence in utility providers and highlight the need for ongoing investment in infrastructure amid an aging U.S. grid that complicates renewable deployment and EV adoption across the country.

Experts suggest that to ensure a more reliable energy supply, utilities must embrace modernization efforts, including the integration of smart grid technology and renewable energy sources. These innovations can enhance the ability to manage electricity supply and demand, especially during unprecedented demand in the Eastern U.S. when heatwaves strain systems, reduce outages, and improve response times during emergencies.

The Path Forward

In response to the outage, community advocates are calling for greater transparency from Pepco and other utility companies. They emphasize the importance of holding utilities accountable for maintaining reliable service and communicating effectively with customers, while also promoting customer bill-reduction initiatives that help households manage costs. Public forums and discussions about energy policy can empower residents to voice their concerns and contribute to solutions.

As D.C. looks to the future, it is essential to prioritize investments in energy infrastructure that can withstand the demands of a growing population. Collaborations between local government, utility companies, and community organizations can drive initiatives aimed at enhancing resilience and ensuring that all residents have access to reliable electricity.

The recent power outage in Northeast D.C. serves as a reminder of the challenges facing urban energy infrastructure. While Pepco's efforts to restore power and improve communication are commendable, the incident highlights the need for long-term solutions to enhance reliability. By investing in modern technology and fostering community engagement, D.C. can work towards a more resilient energy future, ensuring that residents can count on their electricity service even in times of crisis.

 

Related News

View more

China, Cambodia agree to nuclear energy cooperation

Cambodia-CNNC Nuclear Energy MoU advances peaceful nuclear cooperation, human resources development, and Belt and Road ties, targeting energy security and applications in medicine, agriculture, and industry across ASEAN under IAEA-guided frameworks.

 

Key Points

A pact to expand peaceful nuclear tech and skills, boosting Cambodia's energy, healthcare under ASEAN and Belt and Road.

✅ Human resources development and training pipelines

✅ Peaceful nuclear applications in medicine, agriculture, industry

✅ Aligns with IAEA guidance, ASEAN links, Belt and Road goals

 

Cambodia has signed a memorandum of understanding with China National Nuclear Corporation (CNNC) on cooperation in the peaceful use of nuclear energy. The agreement calls for cooperation on human resources development.

The agreement was signed yesterday by CNNC chief accountant Li Jize and Tekreth Samrach, Cambodia's secretary of state of the Office of the Council of Ministers and vice chairman of the Cambodian Commission on Sustainable Development. It was signed during the 14th China-ASEAN Expo and China-ASEAN Business and Investment Summit, being held in Nanning, the capital of China's Guangxi province.

The signing was witnessed by Cambodia's minister of commerce and other government officials, CNNC said.

"This is another important initiative of China National Nuclear Corporation in implementing the 'One Belt, One Road' strategy as China's nuclear program continues to advance and strengthening cooperation with ASEAN countries in international production capacity, laying a solid foundation for follow-up cooperation between the two countries," CNNC said.

One Belt, One Road is China's project to link trade in about 60 Asian and European countries along a new Silk Road, even as Romania ended talks with a Chinese partner in a separate nuclear project.

CNNC noted that Cambodia's current power supply cannot meet its basic electricity needs, while sectors including medicine, agriculture and industry require a "comprehensive upgrade". It said Cambodia has great market potential for nuclear power and nuclear technology applications.

On 14 August, CNNC vice president Wang Jinfeng met with Tin Ponlok, secretary general of Cambodia's National Council for Sustainable Development, to consult on the draft MOU. Cambodia's Ministry of Environment said these discussions focused on human resources in nuclear power for industrial development and environmental protection.

In late August, CNNC president Qian Zhimin visited Cambodia and met Say Chhum, president of the Senate of Cambodia. Qian noted that CNNC will support Cambodia in applying nuclear technologies in industry, agriculture and medical science, thus developing its economy and improving the welfare of the population. Cambodia can start training workers, promoting new energy exploitation as India's nuclear revival progresses in Asia, and infrastructure construction, and increasing its capabilities in scientific research and industrial manufacturing, he said. This will help the country achieve its long-term goal of the peaceful use of nuclear energy, he added.

In November 2015, Russian state nuclear corporation Rosatom signed a nuclear cooperation agreement with Cambodia, focused on a possible research reactor, but with consideration of nuclear power, while KHNP in Bulgaria illustrates parallel developments in Europe. A further cooperation agreement was signed in March 2016, and in May Rosatom and the National Council for Sustainable Development signed memoranda to establish a nuclear energy information centre in Cambodia and set up a joint working group on the peaceful uses of atomic energy.

In mid-2016, Cambodia's Ministry of Industry, Mines and Energy held discussions with CNNC on building a nuclear power plant and establishing the regulatory and legal infrastructure for that, in collaboration with the International Atomic Energy Agency, mirroring IAEA assistance in Bangladesh on nuclear development.

 

Related News

View more

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

After alert on Russian hacking, a renewed focus on protecting U.S. power grid

U.S. Power Grid Cybersecurity combats DHS-FBI flagged threats to energy infrastructure, with PJM Interconnection using ICS/SCADA segmentation, phishing defenses, incident response, and resilience exercises against Russia-linked attacks and pipeline intrusions.

 

Key Points

Strategies, controls, and training that protect U.S. electric infrastructure from cyber threats and disruptions.

✅ ICS/SCADA network segmentation and zero-trust architecture

✅ Employee phishing drills and incident response playbooks

✅ DOE-led grid exercises and threat intelligence sharing

 

The joint alert from the FBI and Department of Homeland Security last month warning that Russia was hacking into critical U.S. energy infrastructure, as outlined in six essential reads on Russian hacks from recent coverage, came as no surprise to the nation’s largest grid operator, PJM Interconnection.

“You will never stop people from trying to get into your systems. That isn’t even something we try to do.” said PJM Chief Information Officer, Tom O’Brien. “People will always try to get into your systems. The question is, what controls do you have to not allow them to penetrate? And how do you respond in the event they actually do get into your system?”

PJM is the regional transmission organization for 65 million people, covering 13 states, including Pennsylvania, and Washington D.C.

On a rainy day in early April, about 10 people were working inside PJM’s main control center, outside Philadelphia, closely monitoring floor-to-ceiling digital displays showing real-time information from the electric power sector throughout PJM’s territory in the mid-Atlantic and parts of the midwest, amid reports that hackers accessed control rooms at U.S. utilities.

#google#

Donnie Bielak, a reliability engineering manager, was overseeing things from his office, perched one floor up.

“This is a very large, orchestrated effort that goes unnoticed most of the time,” Bielak said. “That’s a good thing.”

But the industry certainly did take notice in late 2015 and early 2016, when hackers successfully disrupted power to the Ukrainian grid. The outages lasted a few hours and affected about 225,000 customers. It was the first publicly-known case of a cyber attack causing major disruptions to a power grid. It was widely blamed on Russia.

One of the many lessons of the Ukraine attacks was a reminder to people who work on critical infrastructure to keep an eye out for odd communications.

“A very large percentage of entry points to attacks are coming through emails,” O’Brien said. “That’s why PJM, as well as many others, have aggressive phishing campaigns. We’re training our employees.”

O’Brien doesn’t want to get into specifics about how PJM deals with cyber threats. But one common way to limit exposure is by having separate systems: For example, industrial controls in a power plant are not connected to corporate business networks, a separation underscored after breaches at U.S. power plants prompted reviews across the sector.

Since 2011, North American grid operators and government agencies have also done large, security exercises every two years. Thousands of people practice how they’d respond to a coordinated physical or cyber event, including rising substation attacks that highlight resilience gaps.

So far, nothing like that has happened in the U.S. It’s possible, but not likely, according to Robert M. Lee, a former military intelligence analyst, who runs the industrial cybersecurity firm Dragos.

“The more complex the system, the harder it is to have a scalable attack,” said Lee, who co-authored a report analyzing the Ukraine attacks. “If you wanted to take out a power generation station– that isn’t the most complex thing. Let’s say you cause an hour of outage. But now you want to cause two months of outages? That’s an exponential increase in effort required.”

For example, he said, it would very difficult for hackers to knock out power to the entire east coast for a long time. But briefly disrupting a major city is easier. That’s the sort of thing that keeps him up at night.

“I worry about an adversary getting into, maybe, Washington D.C.’s portion of the grid, taking down power for 30 minutes,” he said.

The Department of Energy is creating a new office focused on cybersecurity and emergency response, following the U.S. government’s condemnation of power grid hacking by Russia.

Deterrence may be one reason why there has not yet been a major attack on the U.S. grid, said John MacWilliams, a former senior DOE official who’s now a fellow at Columbia University’s Center on Global Energy Policy.

“That’s obviously an act of war,” he said. “We have the capability of responding either through cyber mechanisms or kinetic military.”

In the meantime, small-scale incidents keep happening.

This spring, another cyber attack targeted natural gas pipelines. Four companies shut down their computer systems, just in case, but they say no service was disrupted.

 

Related News

View more

Maine Governor calls for 100% renewable electricity

Maine Climate Council Act targets 80% renewable power by 2030 and 100% by 2050, slashing greenhouse gas emissions via clean electricity, grid procurement, long-term contracts, wind and hydro integration, resilience planning, and carbon sequestration.

 

Key Points

A Maine policy forming a Climate Council to reach 80% renewables in 2030 100% in 2050 and cut greenhouse gas emissions.

✅ 80% renewable electricity by 2030; 100% by 2050.

✅ 45% GHG cut by 2030; 80% by 2050.

✅ Utility procurement authority for clean capacity and energy.

 

The winds of change have shifted and are blowing Northward, as Maine’s Governor, Janet T. Mills, has put forth an act establishing a Climate Council to guide the state’s consumption to 80% renewable electricity in 2030 and 100% by 2050, echoing New York's Green New Deal ambitions underway.

The act, LR 2478 (pdf), also sets a goal of reducing greenhouse gas emissions by 45% in 2030 and 80% by 2050. The document will be submitted to the state Legislature for consideration.

The commission would have the authority to direct investor owned transmission and distribution utilities to run competitive procurement processes, and enter into long-term contracts for capacity resources, energy resources, renewable energy credit contracts, and participate in regional programs, as these all lead toward the clean electricity and emissions-reducing goals that mirror California's 100% mandate debates today.

The Climate Council would convene industry working groups, including Scientific and Technical, Transportation, Coastal and Marine, Energy, and Building & Infrastructure working groups, plus others as needed, where examples like New Zealand's electricity transition could inform discussions.

Membership within the council would include two members of the State Senate, two members of the House, a tribal representative, many department commissioners (Education, Defense, Transportation, etc.), multiple directors, business representatives, environmental non-profit members, and climate science and resilience representatives as well.

The council would update the Maine State Climate Plan every four years, and solicit input from the public and report out progress on its goals every two years, similar to planning underway in Minnesota's carbon-free plan framework. The first Climate Action Plan would be submitted to the legislature by December 1, 2020.

Specifically, the responsibilities of the Scientific and Technical Subcommittee were laid out. The group would be scheduled to meet at least every six months, beginning no later than October 1, 2019. The group would be tasked with reviewing existing scientific literature, including net-zero electricity pathways research, to use it as guidance, recognizing gaps in the state’s knowledge, and guiding outside experts to ascertain this knowledge.  The group would consider ocean acidification, and climate change effects on the state’s species; establish science-based sea-level rise projections for the state’s coastal regions by December 1, 2020; create a climate risk map for flooding and extreme weather events; and consider carbon sequestration via biomass growth.

The state’s largest power plants (above image), generate about 31% from gas, 28% from wood and 41% from hydro+wind. Already, the state has a very clean electricity profile, much like efforts to decarbonize Canada's power sector continue apace. Below, the U.S. Energy Information Administration (EIA) notes that 51% of electricity generation within the state comes from mostly wind+hydro, with a small touch from solar power. The state also gets 24% from wood and other biomass, which would lead some to argue that the state is already at 75% “renewable electricity”. The Governor’s document does reference wind power specifically as a renewable, however, no other specific electricity source. And there is much reference to forestry, agriculture, and logging – specifically noting carbon sequestration – but nothing regarding electricity.

The state’s final 25% of electricity mostly comes from natural gas, even as renewable electricity momentum builds across North America, with this author choosing to put “other” under the fossil percentage noted above.

 

Related News

View more

UK Electricity prices hit 10-year high as cheap wind power wanes

UK Electricity Price Surge driven by wholesale gas costs, low wind output, and higher gas-fired generation, as National Grid boosts base load power to meet demand, lifting weekend prices toward decade highs.

 

Key Points

A sharp rise in UK power prices tied to gas spikes, waning wind, and higher reliance on gas-fired generation.

✅ Wholesale gas prices squeeze power, doubling weekend baseload.

✅ Wind generation falls to 3GW, forcing more gas-fired plants.

✅ Tariff hikes signal bill pressure and supplier strain.

 

The UK’s electricity market has followed the lead of surging wholesale gas prices this week to reach weekend highs, with UK peak power prices not seen in a decade across the market.

The power market has avoided the severe volatility which ripped through the gas market this week because strong winds helped to supply ample electricity to meet demand, reflecting recent record wind generation across the UK.

But as freezing winds begin to wane this weekend National Grid will need to use more gas-fired power plants to fill the gap, meaning the cost of generating electricity will surge.

Jamie Stewart, an energy expert at ICIS, said the price for base load power this weekend has already soared to around £80 per megawatt hour, almost double what one would expect to see for a weekend in March.

National Grid will increase its use of expensive gas-fired power by an extra 7GW to make up for low wind power, which is forecast to drop by two-thirds in the days ahead.

Wind speeds helped to protect the electricity system from huge price hikes on the neighbouring gas market on Thursday, by generating as much as 13GW by some estimates.

However, by the end of Friday this output will fall by almost half to 7GW and slump to lows of 3GW by Saturday, Mr Stewart said.

The power price was already higher than usual at £53/MWh last weekend even before the full force of the storms, including Storm Malik wind generation, hit Britain. That was still well above the more typical "mid-40s” price for this time of year, Mr Stewart added.

The twin price spikes across the UK’s energy markets has raised fears of household bill hikes in the months ahead, even as an emergency energy plan is not going ahead.

Late on Thursday Big Six supplier E.on quietly pushed through a dual-fuel tariff increase of 2.6%, to drive the average bill up to £1,153 from 19 April.

Energy supply minnow Bulb also increased prices by £24 a year for its 300,000 customers, blaming rising wholesale costs.

The UK has suffered two gas price shocks this winter, which is the first since the owner of British Gas shuttered the country’s largest gas storage facility at Rough off the Yorkshire coast.

A string of gas supply outages this week cut supplies to the UK just as freezing conditions drove demand for gas-heating a third higher than normal for this time of year.

It was the first time in almost ten years that National Grid was forced to issue a short supply warning to the market that supplies would fall short of demand unless factories agree to use less.

The twelve-year market price highs followed a pre-Christmas spike when the UK’s most important North Sea pipeline shut down at the same time as a deadly explosion at Europe’s most important gas hub, based in the Austrian town of Baumgarten.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified