Symantec Proves Russian


Electrical Testing & Commissioning of Power Systems

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$599
Coupon Price:
$499
Reserve Your Seat Today

Dragonfly energy sector cyberattacks target ICS and SCADA across critical infrastructure, including the power grid and nuclear facilities, using spearphishing, watering-hole sites, supply-chain compromises, malware, and VPN exploits to gain operational access.

 

Key Points

Dragonfly APT campaigns target energy firms and ICS to gain grid access, risking manipulation and service disruption.

✅ Breaches leveraged spearphishing, watering-hole sites, and supply chains.

✅ Targeted ICS, SCADA, VPNs to pivot into operational networks.

✅ Aimed to enable power grid manipulation and potential outages.

 

An October, 2017 report by researchers at Symantec Corp., cited by the U.S. government, has linked recent US power grid cyber attacks to a group of hackers it had code-named "Dragonfly", and said it found evidence critical infrastructure facilities in Turkey and Switzerland also had been breached.

The Symantec researchers said an earlier wave of attacks by the same group starting in 2011 was used to gather intelligence on companies and their operational systems. The hackers then used that information for a more advanced wave of attacks targeting industrial control systems that, if disabled, leave millions without power or water.

U.S. intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attacks, condemned by the U.S. government, striking almost simultaneously at multiple locations, are testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

#google#

While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers.

“Since at least March 2016, Russian government cyber actors… targeted government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors,” according to Thursday’s FBI and Department of Homeland Security report. The report did not say how successful the attacks were or specify the targets, but said that the Russian hackers “targeted small commercial facilities’ networks where they staged malware, conducted spearphishing, and gained remote access into energy sector networks.” At least one target of a string of infrastructure attacks last year was a nuclear power facility in Kansas.

Symantec doesn’t typically point fingers at particular nations in its research on cyberattacks, said Eric Chien, technical director of Symantec’s Security Technology and Response division, though he said his team doesn’t see anything it would disagree with in the new federal report. The government report appears to corroborate Symantec’s research, showing that the hackers had penetrated computers and accessed utility control rooms that would let them directly manipulate power systems, he says.

“There were really no more technical hurdles for them to do something like flip off the power,” he said.

And as for the group behind the attacks, Chien said it appears to be relatively dormant for now, but it has gone quiet in the past only to return with new hacks.

“We expect they’re sort of retooling now, and they likely will be back,”

 


 

In some cases, Dragonfly successfully broke into the core systems that control US and European energy companies, Symantec revealed.

“The energy sector has become an area of increased interest to cyber-attackers over the past two years,” Symantec said in its report.

“Most notably, disruptions to Ukraine’s power system in 2015 and 2016 were attributed to a cyberattack and led to power outages affecting hundreds of thousands of people. In recent months, there have also been media reports of attempted attacks on the electricity grids in some European countries, as well as reports of companies that manage nuclear facilities in the US being compromised by hackers.

“The Dragonfly group appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so. Symantec customers are protected against the activities of the Dragonfly group.”

In recent weeks, senior US intelligence officials said that the Kremlin believes it can launch hacking operations against the West with impunity, including a cyber weapon that can disrupt power grids, according to assessments.

The DHS and FBI report further elaborated: “This campaign comprises two distinct categories of victims: staging and intended targets. The initial victims are peripheral organisations such as trusted third-party suppliers with less-secure networks, referred to as ‘staging targets’ throughout this alert.

“The threat actors used the staging targets’ networks as pivot points and malware repositories when targeting their final intended victims. National Cybersecurity and Communications Integration Center and FBI judge the ultimate objective of the actors is to compromise organisational networks, also referred to as the ‘intended target’.”

According to the US alert, hackers used a variety of attack methods, including spear-phishing emails, watering-hole domains, credential gathering, open source and network reconnaissance, host-based exploitation, and deliberate targeting of ICS infrastructure.

The attackers also targeted VPN software and used password cracking tools.

Once inside, the attackers downloaded tools from a remote server and then carried out a number of actions, including modifying key systems to store plaintext credentials in memory, and built web shells to gain command and control of targeted systems.

“This actors’ campaign has affected multiple organisations in the energy, nuclear, water, aviation, construction and critical manufacturing sectors, with hundreds of victims across the U.S. power grid confirmed,” the DHS said, before outlining a number of steps that IT managers in infrastructure organisations can take to cleanse their systems and defend against Russian hackers. he said.
 

 

Related News

Related News

PG&E Supports Local Communities as It Pays More Than $230 Million in Property Taxes to 50 California Counties

PG&E property tax payments bolster counties, education, public safety, and infrastructure across Northern and Central California, reflecting semi-annual levies tied to utility assets, capital investments, and economic development that serve 16 million customers.

 

Key Points

PG&E property tax payments are semi-annual county taxes funding public services and linked to utility infrastructure.

✅ $230M paid for Jul-Dec 2017 across 50 California counties

✅ Estimated $461M for FY 2017-2018, up 12% year over year

✅ Investments: $5.9B in grid, Gas Safety Academy, control center

 

Pacific Gas and Electric Company (PG&E) paid property taxes of more than $230 million this fall to the 50 counties where the energy company owns property and operates gas and electric infrastructure that serves 16 million Californians. The tax payments help support essential public services like education and public health and safety actions across the region.

The semi-annual property tax payments made today cover the period from July 1 to December 31, 2017.

Total payments for the full tax year of July 1, 2017 to June 30, 2018 are estimated to total more than $461 million—an increase of $50 million, or 12 percent, compared with the prior fiscal year, even as customer rates are expected to stabilize in the years ahead.

“Property tax payments provide crucial resources to the many communities where we live and work, supporting everything from education to public safety. By continuing to make local investments in gas and electric infrastructure, we are not only creating one of the safest and most reliable energy systems in the country, including wildfire risk reduction programs and related efforts, we’re investing in the local economy and helping our communities thrive,” said Jason Wells, senior vice president and chief financial officer for PG&E.

PG&E invested more than $5.7 billion last year and expects to invest $5.9 billion this year to enhance and upgrade its gas and electrical infrastructure amid power line fire risks across Northern and Central California.

Some recent investments include the construction of PG&E’s $75 millionGas Safety Academy in Winters in Yolo County, which opened in September. Last year, PG&E opened a $36 million, state-of-the-art electric distribution control center in Rocklin.

PG&E supports the communities it serves in a variety of ways. In 2016, PG&E provided more than $28 million in charitable contributions to enrich local educational opportunities, preserve the environment, and support economic vitality and emergency preparedness and safety, including its Wildfire Assistance Program for impacted residents. PG&E employees provide thousands of hours of volunteer service in their local communities. The company also offers a broad spectrum of economic development services to help local businesses grow.

 

Related News

View more

Russian hackers had 'hundreds of victims' as they infiltrated U.S. power grid

Russian cyberattacks on U.S. power grid exposed DHS warnings: Dragonfly/Energetic Bear breached control rooms, ICS networks, and could trigger blackouts via switch manipulation, phishing, and malware, threatening critical infrastructure and utility operations nationwide.

 

Key Points

State-backed breaches of utility ICS and control rooms enabled potential switch manipulation and blackouts.

✅ DHS: Dragonfly/Energetic Bear breached utility networks

✅ Access reached control rooms and ICS for switch control

✅ Ongoing campaign via phishing, malware, lateral movement

 

Russian hackers for a state-sponsored organization invaded hundreds of control rooms of U.S. electric utilities that could have led to blackouts, a new report says.

The group, known as Dragonfly or Energetic Bear, infiltrated networks of U.S. utilities as part of an effort that is likely ongoing, Department of Homeland Security officials told the Wall Street Journal.

Jonathan Home, chief of industrial-control-system analysis for DHS, said the hackers “got to the point where they could have thrown switches” and upset power flows.

Although the agency did not disclose which companies were impacted, the officials at a briefing Monday said that there were “hundreds of victims” including breaches at power plants across the U.S., and that some companies may not be aware that hackers infiltrated their networks yet.

According to experts, Russia has been preparing for such attacks for some time now, prompting a renewed focus on protecting the grid among utilities and policymakers.

“They’ve been intruding into our networks and are positioning themselves for a limited or widespread attack,” said former Deputy Assistant Defense Secretary Michael Carpenter, now senior director at the Penn Biden Center at the University of Pennsylvania, per the Wall Street Journal. “They are waging a covert war on the West.”

Earlier this year, the Trump administration claimed Russia had staged a power grid hacking campaign against the U.S. energy grid and other U.S. infrastructure.

The report comes after President Trump told reporters last week during a joint press conference in Helsinki alongside Russian President Vladimir Putin that he had no reason not to believe the Russian leader's assurances to him that the Kremlin was not to blame for interference in the election.

Trump later admitted that he misspoke when he said he didn’t “see any reason why” Russia would have meddled in the 2016 election, and said he believes the U.S. intelligence community assessment that found that the Russian government did interfere in the electoral process.

 

Related News

View more

Americans Keep Using Less and Less Electricity

U.S. Electricity Demand Decoupling signals GDP growth without higher load, driven by energy efficiency, LED adoption, services-led output, and rising renewables integration with the grid, plus EV charging and battery storage supporting decarbonization.

 

Key Points

GDP grows as electricity use stays flat, driven by efficiency, renewables, and a shift toward services and output.

✅ LEDs and codes cut residential and commercial load intensity.

✅ Wind, solar, and gas gain share as coal and nuclear struggle.

✅ EVs and storage can grow load and enable grid decarbonization.

 

By Justin Fox

Economic growth picked up a little in the U.S. in 2017. But electricity use fell, with electricity sales projections continuing to decline, according to data released recently by the Energy Information Administration. It's now been basically flat for more than a decade:


 

Measured on a per-capita basis, electricity use is in clear decline, and is already back to the levels of the mid-1990s.

 


 

Sources: U.S. Energy Information Administration, U.S. Bureau of Economic Analysis

*Includes small-scale solar generation from 2014 onward

 

I constructed these charts to go all the way back to 1949 in part because I can (that's how far back the EIA data series goes) but also because it makes clear what a momentous change this is. Electricity use rose and rose and rose and then ... it didn't anymore.

Slower economic growth since 2007 has been part of the reason, but the 2017 numbers make clear that higher gross domestic product no longer necessarily requires more electricity, although the Iron Law of Climate is often cited to suggest rising energy use with economic growth. I wrote a column last year about this big shift, and there's not a whole lot new to say about what's causing it: mainly increased energy efficiency (driven to a remarkable extent by the rise of LED light bulbs), and the continuing migration of economic activity away from making tangible things and toward providing services and virtual products such as games and binge-watchable TV series (that are themselves consumed on ever-more-energy-efficient electronic devices).

What's worth going over, though, is what this means for those in the business of generating electricity. The Donald Trump administration has made saving coal-fired electric plants a big priority; the struggles of nuclear power plants have sparked concern from multiple quarters. Meanwhile, U.S. natural gas production has grown by more than 40 percent since 2007, thanks to hydraulic fracturing and other new drilling techniques, while wind and solar generation keep making big gains in cost and market share. And this is all happening within the context of a no-growth electricity market.

In China, a mystery in China's electricity data has complicated global comparisons.

 

Here are the five main sources of electric power in the U.S.:


 

The big story over the past decade has been coal and natural gas trading places as the top fuel for electricity generation. Over the past year and a half coal regained some of that lost ground as natural gas prices rose from the lows of early 2016. But with overall electricity use flat and production from wind and solar on the rise, that hasn't translated into big increases in coal generation overall.

Oh, and about solar. It's only a major factor in a few states (California especially), so it doesn't make the top five. But it's definitely on the rise.

 

 

What happens next? For power generators, the best bet for breaking out of the current no-growth pattern is to electrify more of the U.S. economy, especially transportation. A big part of the attraction of electric cars and trucks for policy-makers and others is their potential to be emissions-free. But they're only really emissions-free if the electricity used to charge them is generated in an emissions-free manner -- creating a pretty strong business case for continuing "decarbonization" of the electric industry. It's conceivable that electric car batteries could even assist in that decarbonization by storing the intermittent power generated by wind and solar and delivering it back onto the grid when needed.

I don't know exactly how all this will play out. Nobody does. But the business of generating electricity isn't going back to its pre-2008 normal. 

 

Related News

View more

After alert on Russian hacking, a renewed focus on protecting U.S. power grid

U.S. Power Grid Cybersecurity combats DHS-FBI flagged threats to energy infrastructure, with PJM Interconnection using ICS/SCADA segmentation, phishing defenses, incident response, and resilience exercises against Russia-linked attacks and pipeline intrusions.

 

Key Points

Strategies, controls, and training that protect U.S. electric infrastructure from cyber threats and disruptions.

✅ ICS/SCADA network segmentation and zero-trust architecture

✅ Employee phishing drills and incident response playbooks

✅ DOE-led grid exercises and threat intelligence sharing

 

The joint alert from the FBI and Department of Homeland Security last month warning that Russia was hacking into critical U.S. energy infrastructure, as outlined in six essential reads on Russian hacks from recent coverage, came as no surprise to the nation’s largest grid operator, PJM Interconnection.

“You will never stop people from trying to get into your systems. That isn’t even something we try to do.” said PJM Chief Information Officer, Tom O’Brien. “People will always try to get into your systems. The question is, what controls do you have to not allow them to penetrate? And how do you respond in the event they actually do get into your system?”

PJM is the regional transmission organization for 65 million people, covering 13 states, including Pennsylvania, and Washington D.C.

On a rainy day in early April, about 10 people were working inside PJM’s main control center, outside Philadelphia, closely monitoring floor-to-ceiling digital displays showing real-time information from the electric power sector throughout PJM’s territory in the mid-Atlantic and parts of the midwest, amid reports that hackers accessed control rooms at U.S. utilities.

#google#

Donnie Bielak, a reliability engineering manager, was overseeing things from his office, perched one floor up.

“This is a very large, orchestrated effort that goes unnoticed most of the time,” Bielak said. “That’s a good thing.”

But the industry certainly did take notice in late 2015 and early 2016, when hackers successfully disrupted power to the Ukrainian grid. The outages lasted a few hours and affected about 225,000 customers. It was the first publicly-known case of a cyber attack causing major disruptions to a power grid. It was widely blamed on Russia.

One of the many lessons of the Ukraine attacks was a reminder to people who work on critical infrastructure to keep an eye out for odd communications.

“A very large percentage of entry points to attacks are coming through emails,” O’Brien said. “That’s why PJM, as well as many others, have aggressive phishing campaigns. We’re training our employees.”

O’Brien doesn’t want to get into specifics about how PJM deals with cyber threats. But one common way to limit exposure is by having separate systems: For example, industrial controls in a power plant are not connected to corporate business networks, a separation underscored after breaches at U.S. power plants prompted reviews across the sector.

Since 2011, North American grid operators and government agencies have also done large, security exercises every two years. Thousands of people practice how they’d respond to a coordinated physical or cyber event, including rising substation attacks that highlight resilience gaps.

So far, nothing like that has happened in the U.S. It’s possible, but not likely, according to Robert M. Lee, a former military intelligence analyst, who runs the industrial cybersecurity firm Dragos.

“The more complex the system, the harder it is to have a scalable attack,” said Lee, who co-authored a report analyzing the Ukraine attacks. “If you wanted to take out a power generation station– that isn’t the most complex thing. Let’s say you cause an hour of outage. But now you want to cause two months of outages? That’s an exponential increase in effort required.”

For example, he said, it would very difficult for hackers to knock out power to the entire east coast for a long time. But briefly disrupting a major city is easier. That’s the sort of thing that keeps him up at night.

“I worry about an adversary getting into, maybe, Washington D.C.’s portion of the grid, taking down power for 30 minutes,” he said.

The Department of Energy is creating a new office focused on cybersecurity and emergency response, following the U.S. government’s condemnation of power grid hacking by Russia.

Deterrence may be one reason why there has not yet been a major attack on the U.S. grid, said John MacWilliams, a former senior DOE official who’s now a fellow at Columbia University’s Center on Global Energy Policy.

“That’s obviously an act of war,” he said. “We have the capability of responding either through cyber mechanisms or kinetic military.”

In the meantime, small-scale incidents keep happening.

This spring, another cyber attack targeted natural gas pipelines. Four companies shut down their computer systems, just in case, but they say no service was disrupted.

 

Related News

View more

Electric Utilities Plot Bullish Course for EV Charging Infrastructure

EV Charging Infrastructure Incentives are expanding as utilities fund public chargers, Level 2 networks, DC fast charging, grid-managed off-peak programs, and equitable access across Ohio, New Jersey, and Florida to accelerate clean transportation.

 

Key Points

Utility-backed programs funding Level 2 and DC fast chargers, managing grid demand, and expanding EV equity.

✅ Incentives for Level 2 and DC fast public charging stations.

✅ Grid-friendly off-peak charging to balance demand.

✅ Equity targets place chargers in low-income communities.

 

Electric providers in Florida, Ohio and New Jersey recently announced plans to expand electric vehicle charging networks and infrastructure through various incentive programs that could add thousands of new public chargers in the next several years.

Elsewhere, utilities are advancing similar efforts, with Michigan EV programs proposing more than $20 million for charging infrastructure to accelerate adoption.

American Electric Power in Ohio will offer nearly $10 million in incentives toward the build out of 375 EV charging stations throughout the company's service territory, which largely includes Columbus.

Meanwhile, the Public Service Electric and Gas Company (PSE&G), an electric utility provider in New Jersey, has proposed a six-year plan to support the development of nearly 40,000 electric vehicle chargers across a wide range of customers and sectors, said Francis Sullivan, a spokesperson for PSE&G.

And Duke Energy in Florida is installing up to 530 EV charging stations across its service area, as part of its Park and Plug pilot program, which will be making the charging ports available in multifamily housing complexes, workplaces and other high traffic areas.

"We are bringing cleaner energy to Florida through 700 megawatts of new universal solar, and we are helping our customers to bring clean transportation to the state as well," Catherine Stempien, Duke Energy Florida president, said in a statement. "We are committed to providing smarter, cleaner energy alternatives for all our customers."

The project in Ohio is making incentive funding available to government organizations, multifamily housing developments and workplaces, covering from 50 percent to all of the costs. The plan, to be rolled out in the next four years, aims to incentivize the development of 300 level-two chargers and 75 "fast chargers" capable of charging a car's battery in minutes rather than hours.

"I think what's interesting about what we're seeing now in the industry is that electric vehicles and electric vehicle charging are expanding beyond California, and like other Pacific Coast states," said Scott Fisher, vice president of marketing at Greenlots, maker of car chargers and software. Greenlots has been selected as one of the companies to provide the chargers for the AEP project.

California has occupied the lion's share of the electric vehicle market, making up about 5 percent of the cars on the state's highways. The U.S. market sits at about 1.5 percent. However, indications show the EV boom may be set to take off as more models are being rolled out, and prices are making the electric cars more competitive with their gas-powered counterparts. The group Securing America's Future Energy (SAFE) announced the one-millionth electric vehicle is on course to be sold in the United States this month.

In a statement, Ben Prochazka, vice president of the Electrification Coalition, an EV advocacy group, called this "a major milestone and brings us one step closer to reducing our transportation system's dependence on oil. This is a direct result of the tireless efforts by communities and advocates throughout the 'EV ecosystem.'"

In New Jersey, PSE&G's efforts -- which are part of the company's proposed Clean Energy Future program -- will not only focus on building out the charging infrastructure, but structure car recharging to control charging and encourage residents to charge their cars during off-peak times.

"For now, with a modest number of charging stations in the market, it's not a huge problem. But over time, as you're putting in many thousands of these stations, what you want to make sure is that those stations are operating in sync with state power grids, where you don't have people all charging at the same time at like 5 p.m. on a hot summer day," said Fisher.

PSE&G also plans to offer incentives to encourage the development of level-two chargers and DC fast-chargers, as well as "provide grants and incentives for 100 electric school buses and EV charging infrastructure at school districts in PSE&G's service territory," said Sullivan.

"PSE&G will also help fund electrification projects at customer locations such as ports, airports and transit facilities," Sullivan added, via email.

Utilities and transportation planners are also keeping the concept of equity in mind -- to ensure EVs are adopted by more than just the Tesla owner -- and will also focus on placing infrastructure in low-income areas.

"Ten percent of the stations will be in low income areas, defined by census blocks," said Scott Blake, a communications consultant at AEP in Columbus.

Duke Energy also announced 10 percent of the chargers it is installing in Florida will be in "income-qualified communities," according to a company press release.

 

Related News

View more

Russians hacked into US electric utilities: 6 essential reads

U.S. power grid cyberattacks expose critical infrastructure to Russian hackers, DHS warns, targeting SCADA, smart grid sensors, and utilities; NERC CIP defenses, microgrids, and resilience planning aim to mitigate outages and supply chain disruptions.

 

Key Points

U.S. power grid cyberattacks target utility control systems, risking outages, disruption, requiring stronger defenses.

✅ Russian access to utilities and SCADA raises outage risk

✅ NERC CIP, DHS, and utilities expand cyber defenses

✅ Microgrids and renewables enhance resilience, islanding capability

 

The U.S. Department of Homeland Security has revealed that Russian government hackers accessed control rooms at hundreds of U.S. electrical utility companies, gaining far more access to the operations of many more companies than previously disclosed by federal officials.

Securing the electrical grid, upon which is built almost the entirety of modern society, is a monumental challenge. Several experts have explained aspects of the task, potential solutions and the risks of failure for The Conversation:

 

1. What’s at stake?

The scale of disruption would depend, in part, on how much damage the attackers wanted to do. But a major cyberattack on the electricity grid could send surges through the grid, much as solar storms have done.

Those events, explains Rochester Institute of Technology space weather scholar Roger Dube, cause power surges, damaging transmission equipment. One solar storm in March 1989, he writes, left “6 million people without power for nine hours … [and] destroyed a large transformer at a New Jersey nuclear plant. Even though a spare transformer was nearby, it still took six months to remove and replace the melted unit.”

More serious attacks, like larger solar storms, could knock out manufacturing plants that build replacement electrical equipment, gas pumps to fuel trucks to deliver the material and even “the machinery that extracts oil from the ground and refines it into usable fuel. … Even systems that seem non-technological, like public water supplies, would shut down: Their pumps and purification systems need electricity.”

In the most severe cases, with fuel-starved transportation stalled and other basic infrastructure not working, “[p]eople in developed countries would find themselves with no running water, no sewage systems, no refrigerated food, and no way to get any food or other necessities transported from far away. People in places with more basic economies would also be without needed supplies from afar.”

 

2. It wouldn’t be the first time

Russia has penetrated other countries’ electricity grids in the past, and used its access to do real damage. In the middle of winter 2015, for instance, a Russian cyberattack shut off the power to Ukraine’s capital in the middle of winter 2015.

Power grid scholar Michael McElfresh at Santa Clara University discusses what happened to cause hundreds of thousands of Ukrainians to lose power for several hours, and notes that U.S. utilities use software similar to their Ukrainian counterparts – and therefore share the same vulnerabilities.

 

3. Security work is ongoing

These threats aren’t new, write grid security experts Manimaran Govindarasu from Iowa State and Adam Hahn from Washington State University. There are a lot of people planning defenses, including the U.S. government, as substation attacks are growing across the country. And the “North American Electric Reliability Corporation, which oversees the grid in the U.S. and Canada, has rules … for how electric companies must protect the power grid both physically and electronically.” The group holds training exercises in which utility companies practice responding to attacks.

 

4. There are more vulnerabilities now

Grid researcher McElfresh also explains that the grid is increasingly complex, with with thousands of companies responsible for different aspects of generating, transmission, and delivery to customers. In addition, new technologies have led companies to incorporate more sensors and other “smart grid” technologies. He describes how that, as a recent power grid report card underscores, “has created many more access points for penetrating into the grid computer systems.”

 

5. It’s time to ramp up efforts

The depth of access and potential control over electrical systems means there has never been a better time than right now to step up grid security amid a renewed focus on protecting the grid among policymakers and utilities, writes public-utility researcher Theodore Kury at the University of Florida. He notes that many of those efforts may also help protect the grid from storm damage and other disasters.

 

6. A possible solution could be smaller grids

One protective effort was identified by electrical engineer Joshua Pearce at Michigan Technological University, who has studied ways to protect electricity supplies to U.S. military bases both within the country and abroad. He found that the Pentagon has already begun testing systems, as the military ramps up preparation for major grid hacks, that combine solar-panel arrays with large-capacity batteries. “The equipment is connected together – and to buildings it serves – in what is called a ‘microgrid,’ which is normally connected to the regular commercial power grid but can be disconnected and become self-sustaining when disaster strikes.”

He found that microgrid systems could make military bases more resilient in the face of cyberattacks, criminals or terrorists and natural disasters – and even help the military “generate all of its electricity from distributed renewable sources by 2025 … which would provide energy reliability and decrease costs, [and] largely eliminate a major group of very real threats to national security.”

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.