Hydro One wants to spend another $6-million to redesign bills


hydro one logo

CSA Z462 Arc Flash Training - Electrical Safety Essentials

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$249
Coupon Price:
$199
Reserve Your Seat Today

Hydro One Bill Redesign Spending sparks debate over Ontario Energy Board regulation, rate applications, privatization, and digital billing upgrades, as surveys cite confusing invoices under the Fair Hydro Plan for residential, commercial, and industrial customers.

 

Key Points

$15M project to simplify Hydro One bills, upgrade systems, and improve digital billing for commercial customers.

✅ $9M spent; $6M proposed for C&I and large-account changes.

✅ OEB to rule amid rate application and privatization scrutiny.

✅ Survey: 40% of customers struggled to understand bills.

 

Ontario's largest and recently privatized electricity utility has spent $9-million to redesign bills and is proposing to spend an additional $6-million on the project.

Hydro One has come under fire for spending since the Liberal government sold more than half of the company, notably for its CEO's $4.5-million pay.

Now, the NDP is raising concerns with the $15-million bill redesign expense contained in a rate application from the formerly public utility.

"I don't think the problem we face is a bill that people can't understand, I think the problem is rates that are too high," said energy critic Peter Tabuns. "Fifteen million dollars seems awfully expensive to me."

But Hydro One says a 2016 survey of its customers indicated about 40 per cent had trouble understanding their bills.

Ferio Pugliese, the company's executive vice-president of customer care and corporate affairs, said the redesign was aimed at giving customers a simpler bill.

"The new format is a format that when tested and put in front of our customers has been designed to give customers the four or five salient items they want to see on their bill," he said.

About $9-million has already gone into redesigning bills, mostly for residential customers, Pugliese said. Cosmetic changes to bills account for about 25 per cent of the cost, with the rest of the money going toward updating information systems and improving digital billing platforms, he said.

The additional $6-million Hydro One is looking to spend would go toward bill changes mostly for its commercial, industrial and large distribution account customers.

Energy Minister Glenn Thibeault noted in a statement that the Ontario Energy Board has yet to decide on the expense, but he suggested he sees the bill redesign as necessary alongside legislation to lower electricity rates introduced by the province.

"With Ontarians wanting clearer bills that are easier to understand, Hydro One's bill redesign project is a necessary improvement that will help customers," he wrote.

"Reductions from the Fair Hydro Plan (the government's 25 per cent cut to bills last year) are important information for both households and businesses, and it's our job to provide clear, helpful answers whenever possible."

The OEB recently ordered Hydro One to lower a rate increase it had been seeking for this year to 0.2 per cent down from 4.8 per cent.

The regulator also rejected a Hydro One proposal to give shareholders all of the tax savings generated by the IPO in 2015 when the Liberal government first began partially privatizing the utility. The OEB instead mandated shareholders receive 62 per cent of the savings while ratepayers receive the remaining 38 per cent.

 

 

Related News

Related News

EVs could drive 38% rise in US electricity demand, DOE lab finds

EV-Driven Electricity Demand Growth will reshape utilities through electrification, EV adoption, grid modernization, and ratebasing of charging, as NREL forecasts rising terawatt-hours, CAGR increases, and demand-side flexibility to manage emissions and reliability.

 

Key Points

Growth in power consumption fueled by EV adoption and electrification, increasing utility sales and grid investment.

✅ NREL projects 20%-38% higher U.S. load by 2050

✅ Utilities see CAGR up to 1.6% and 80 TWh/year growth

✅ Demand-side flexibility and EV charging optimize grids

 

Utilities have struggled with flat demand for years, but analysis by the National Renewable Energy Laboratory predicts steady growth across the next three decades — largely driven by the adoption of electric vehicles, including models like the Tesla Model 3 that are reshaping expectations.

The study considers three scenarios, a reference case and medium- and high-adoption electrification predictions. All indicate demand growth, but in the medium and high scenarios for 2050, U.S. electricity consumption increases by 20% and 38%, respectively, compared to business as usual.

Utilities could go from stagnant demand to compound annual growth rates of 1.6%, which would amount to sustained absolute growth of 80 terawatt-hours per year.

"This unprecedented absolute growth in annual electricity consumption can significantly alter supply-side infrastructure development requirements," the report says, and could challenge state power grids in multiple regions.

NREL's Trieu Mai, principal investigator for the study, cautions that more research is needed to fully assess the drivers and impacts of electrification, "as well as the role and value of demand-side flexibility."

"Although we extensively and qualitatively discuss the potential drivers and barriers behind electric technology adoption in the report, much more work is needed to quantitatively understand these factors," Mai said in a statement.

However, utilities have largely bought into the dream.

"Electric vehicles are the biggest opportunity we see right now," Energy Impact Partners CEO Hans Kobler told Utility Dive. And the impact could go beyond just higher kilowattt-hour sales, particularly as electric truck fleets come online.

"When the transportation sector is fully electrified, it will result in around $6 trillion in investment," Kobler said. "Half of that is on the infrastructure side of the utility." And the industry can also benefit through ratebasing charging stations and managing the new demand.

One benefit that NREL's report points to is the possibility of "expanded value streams enabled by electric and/or grid-connected technologies," such as energy storage and mobile chargers that enhance flexibility.

"Many electric utilities are carefully watching the trend toward electrification, as it has the potential to increase sales and revenues that have stagnated or fallen over the past decade," the report said, highlighting potential benefits for all customers as adoption grows. "Beyond power system planning, other motivations to study electrification include its potential to impact energy security, emissions, and innovation in electrical end-use technologies and overall efficient system integration. The impacts of electrification could be far-reaching and have benefits and costs to various stakeholders."

 

Related News

View more

Several Milestones Reached at Nuclear Power Projects Around the World

Nuclear Power Construction Milestones spotlight EPR builds, Hualong One steam generators, APR-1400 grid integration, and VVER startups, with hot functional testing, hydrostatic checks, and commissioning advancing toward fuel loading and commercial operation.

 

Key Points

Key reactor project steps, from testing and grid readiness to startup, marking progress toward safe commercial operation.

✅ EPR units advance through cold and hot functional testing

✅ Hualong One installs 365-ton steam generators at Fuqing 5

✅ APR-1400 and VVER projects progress toward grid connection

 

The world’s nuclear power industry has been busy in the new year, with several construction projects, including U.S. reactor builds, reaching key milestones as 2018 began.

 

EPR Units Making Progress

Four EPR nuclear units are under construction in three countries: Olkiluoto 3 in Finland began construction in August 2005, Flamanville 3 in France began construction in December 2007, and Taishan 1 and 2 in China began construction in November 2009. Each of the new units is behind schedule and over budget, but recent progress may signal an end to some of the construction difficulties.

EDF reported that cold functional tests were completed at Flamanville 3 on January 6. The main purpose of the testing was to confirm the integrity of primary systems, and verify that components important to reactor safety were properly installed and ready to operate. More than 500 welds were inspected while pressure was held greater than 240 bar (3,480 psi) during the hydrostatic testing, which was conducted under the supervision of the French Nuclear Safety Authority.

With cold testing successfully completed, EDF can now begin preparing for hot functional tests, which verify equipment performance under normal operating temperatures and pressures. Hot testing is expected to begin in July, with fuel loading and reactor startup possible by year end. The company also reported that the total cost for the unit is projected to be €10.5 billion (in 2015 Euros, excluding interim interest).

Olkiluoto 3 began hot functional testing in December. Teollisuuden Voima Oyj—owner and operator of the site—expects the unit to produce its first power by the end of this year, with commercial operation now slated to begin in May 2019.

Although work on Taishan 1 began years after Olkiluoto 3 and Flamanville 3, it is the furthest along of the EPR units. Reports surfaced on January 2 that China General Nuclear (CGN) had completed hot functional testing on Taishan 1, and that the company expects the unit to be the first EPR to startup. CGN said Taishan 1 would begin commercial operation later this year, with Taishan 2 following in 2019.

 

Hualong One Steam Generators Installed

Another Chinese project reached a notable milestone on January 8. China National Nuclear Corp. announced the third of three steam generators had been installed at the Hualong One demonstration project, which is being constructed as Unit 5 at the Fuqing nuclear power plant.

The Hualong One pressurized water reactor unit, also known as the HPR 1000, is a domestically developed design, part of China’s nuclear program, based on a French predecessor. It has a 1,090 MW capacity. The steam generators reportedly weigh 365 metric tons and stand more than 21 meters tall. The first steam generator was installed at Fuqing 5 on November 10, with the second placed on Christmas Eve.

 

Barakah Switchyard Energized

In the United Arab Emirates, more progress has been made on the four South Korean–designed APR-1400 units under construction at the Barakah nuclear power plant. On January 4, Emirates Nuclear Energy Corp. (ENEC) announced that the switchyard for Units 3 and 4 had been energized and connected to the power grid, a crucial step in Abu Dhabi toward completion. Unit 2’s main power transformer, excitation transformer, and auxiliary power transformer were also energized in preparation for hot functional testing on that unit.

“These milestones are a result of our extensive collaboration with our Prime Contractor and Joint Venture partner, the Korea Electric Power Corporation (KEPCO),” ENEC CEO Mohamed Al Hammadi said in a press release. “Working together and benefitting from the experience gained when conducting the same work on Unit 1, the teams continue to make significant progress while continuing to implement the highest international standards of safety, security and quality.”

In 2017, ENEC and KEPCO achieved several construction milestones including installation and concrete pouring for the reactor containment building liner dome section on Unit 3, and installation of the reactor containment liner plate rings, reactor vessel, steam generators, and condenser on Unit 4.

Construction began on the four units (Figure 1) in July 2012, May 2013, September 2014, and September 2015, respectively. Unit 1 is currently undergoing commissioning and testing activities while awaiting regulatory review and receipt of the unit’s operating license from the Federal Authority for Nuclear Regulation, before achieving 100% power in a later phase. According to ENEC, Unit 2 is 90% complete, Unit 3 is 79% complete, and Unit 4 is 60% complete.

 

VVER Units Power Up

On December 29, Russia’s latest reactor to commence operation—Rostov 4 near the city of Volgodonsk—reached criticality, as other projects like Leningrad II-1 advance across the fleet, and was operated at its minimum controlled reactor power (MCRP). Criticality is a term used in the nuclear industry to indicate that each fission event in the reactor is releasing a sufficient number of neutrons to sustain an ongoing series of reactions, which means the neutron population is constant and the chain reaction is stable.

“The transfer to the MCRP allows [specialists] to carry out all necessary physical experiments in the critical condition of [the] reactor unit (RU) to prove its design criteria,” Aleksey Deriy, vice president of Russian projects for ASE Engineering Co., said in a press release. “Upon the results of the experiments the specialists will decide on the RU powerup.”

Rostov 4 is a VVER-1000 reactor with a capacity of 1,000 MW. The site is home to three other VVER units: Unit 1 began commercial operation in 2001, Unit 2 in 2010, and Unit 3 in 2015.

 

Related News

View more

Russians hacked into US electric utilities: 6 essential reads

U.S. power grid cyberattacks expose critical infrastructure to Russian hackers, DHS warns, targeting SCADA, smart grid sensors, and utilities; NERC CIP defenses, microgrids, and resilience planning aim to mitigate outages and supply chain disruptions.

 

Key Points

U.S. power grid cyberattacks target utility control systems, risking outages, disruption, requiring stronger defenses.

✅ Russian access to utilities and SCADA raises outage risk

✅ NERC CIP, DHS, and utilities expand cyber defenses

✅ Microgrids and renewables enhance resilience, islanding capability

 

The U.S. Department of Homeland Security has revealed that Russian government hackers accessed control rooms at hundreds of U.S. electrical utility companies, gaining far more access to the operations of many more companies than previously disclosed by federal officials.

Securing the electrical grid, upon which is built almost the entirety of modern society, is a monumental challenge. Several experts have explained aspects of the task, potential solutions and the risks of failure for The Conversation:

 

1. What’s at stake?

The scale of disruption would depend, in part, on how much damage the attackers wanted to do. But a major cyberattack on the electricity grid could send surges through the grid, much as solar storms have done.

Those events, explains Rochester Institute of Technology space weather scholar Roger Dube, cause power surges, damaging transmission equipment. One solar storm in March 1989, he writes, left “6 million people without power for nine hours … [and] destroyed a large transformer at a New Jersey nuclear plant. Even though a spare transformer was nearby, it still took six months to remove and replace the melted unit.”

More serious attacks, like larger solar storms, could knock out manufacturing plants that build replacement electrical equipment, gas pumps to fuel trucks to deliver the material and even “the machinery that extracts oil from the ground and refines it into usable fuel. … Even systems that seem non-technological, like public water supplies, would shut down: Their pumps and purification systems need electricity.”

In the most severe cases, with fuel-starved transportation stalled and other basic infrastructure not working, “[p]eople in developed countries would find themselves with no running water, no sewage systems, no refrigerated food, and no way to get any food or other necessities transported from far away. People in places with more basic economies would also be without needed supplies from afar.”

 

2. It wouldn’t be the first time

Russia has penetrated other countries’ electricity grids in the past, and used its access to do real damage. In the middle of winter 2015, for instance, a Russian cyberattack shut off the power to Ukraine’s capital in the middle of winter 2015.

Power grid scholar Michael McElfresh at Santa Clara University discusses what happened to cause hundreds of thousands of Ukrainians to lose power for several hours, and notes that U.S. utilities use software similar to their Ukrainian counterparts – and therefore share the same vulnerabilities.

 

3. Security work is ongoing

These threats aren’t new, write grid security experts Manimaran Govindarasu from Iowa State and Adam Hahn from Washington State University. There are a lot of people planning defenses, including the U.S. government, as substation attacks are growing across the country. And the “North American Electric Reliability Corporation, which oversees the grid in the U.S. and Canada, has rules … for how electric companies must protect the power grid both physically and electronically.” The group holds training exercises in which utility companies practice responding to attacks.

 

4. There are more vulnerabilities now

Grid researcher McElfresh also explains that the grid is increasingly complex, with with thousands of companies responsible for different aspects of generating, transmission, and delivery to customers. In addition, new technologies have led companies to incorporate more sensors and other “smart grid” technologies. He describes how that, as a recent power grid report card underscores, “has created many more access points for penetrating into the grid computer systems.”

 

5. It’s time to ramp up efforts

The depth of access and potential control over electrical systems means there has never been a better time than right now to step up grid security amid a renewed focus on protecting the grid among policymakers and utilities, writes public-utility researcher Theodore Kury at the University of Florida. He notes that many of those efforts may also help protect the grid from storm damage and other disasters.

 

6. A possible solution could be smaller grids

One protective effort was identified by electrical engineer Joshua Pearce at Michigan Technological University, who has studied ways to protect electricity supplies to U.S. military bases both within the country and abroad. He found that the Pentagon has already begun testing systems, as the military ramps up preparation for major grid hacks, that combine solar-panel arrays with large-capacity batteries. “The equipment is connected together – and to buildings it serves – in what is called a ‘microgrid,’ which is normally connected to the regular commercial power grid but can be disconnected and become self-sustaining when disaster strikes.”

He found that microgrid systems could make military bases more resilient in the face of cyberattacks, criminals or terrorists and natural disasters – and even help the military “generate all of its electricity from distributed renewable sources by 2025 … which would provide energy reliability and decrease costs, [and] largely eliminate a major group of very real threats to national security.”

 

Related News

View more

CAA Quebec Shines at the Quebec Electric Vehicle Show

CAA Quebec Electric Mobility spotlights EV adoption, charging infrastructure, consumer education, and sustainability, highlighting policy collaboration, model showcases, and greener transport solutions from the Quebec Electric Vehicle Show to accelerate climate goals and practical ownership.

 

Key Points

CAA Quebec's program advancing EV education, charging network advocacy, and collaboration for sustainable transport.

✅ Consumer education demystifying EV range and charging

✅ Hands-on showcases of new EV models and safety tech

✅ Advocacy for faster, wider public charging networks

 

The Quebec Electric Vehicle Show has emerged as a significant event for the automotive industry, drawing attention from enthusiasts, industry experts, and consumers alike, similar to events like Everything Electric in Vancouver that amplify public interest. This year, CAA Quebec took center stage, showcasing its commitment to promoting electric vehicles (EVs) and sustainable transportation solutions.

A Strong Commitment to Electric Mobility

CAA Quebec’s participation in the show underscores its dedication to facilitating the transition to electric mobility. With the rising concerns over climate change and the increasing popularity of electric vehicles, as Canada pursues ambitious EV targets nationwide, organizations like CAA are pivotal in educating the public about the benefits and practicality of EV ownership. At the show, CAA Quebec offered valuable insights into the latest trends in electric mobility, including advancements in technology, charging infrastructure, and the overall impact on the environment.

Educational Initiatives

One of the highlights of CAA Quebec's presentation was its focus on education. The organization hosted informative sessions aimed at demystifying electric vehicles for the average consumer. Many potential buyers are still apprehensive about making the switch from traditional gasoline-powered cars. CAA Quebec addressed common misconceptions about EVs, such as range anxiety and charging challenges, providing attendees with the knowledge they need to make informed decisions.

The sessions included expert panels discussing the future of electric vehicles, with insights from automotive industry leaders and environmental experts, and addressing debates such as experts questioning Quebec's EV push that shape policy discussions.

Showcasing Innovative EVs

CAA Quebec also showcased a variety of electric vehicles from different manufacturers, giving attendees the chance to see and experience the latest models firsthand, similar to a popular EV event in Regina that drew strong community interest. This hands-on approach allowed potential buyers to explore the features of EVs, from performance metrics to safety technologies. By allowing consumers to interact with the vehicles, CAA Quebec helped to bridge the gap between interest and action, encouraging more people to consider an electric vehicle as their next purchase.

Addressing Infrastructure Challenges

A significant barrier to the widespread adoption of electric vehicles remains the availability of charging infrastructure. CAA Quebec took the opportunity to address this critical issue during the show. The organization has been actively involved in advocating for improved charging networks across Quebec, emphasizing the need for more public charging stations and faster charging options, where examples like BC's Electric Highway illustrate how corridor charging can ease long-distance travel concerns.

Collaboration with Government and Industry

CAA Quebec’s efforts are bolstered by collaboration with both government and industry stakeholders. The organization is working closely with provincial authorities to develop policies that support the growth of electric vehicle infrastructure. Additionally, partnerships with automotive manufacturers are paving the way for more sustainable practices in vehicle production and distribution, and utilities exploring vehicle-to-grid pilots in Nova Scotia to enhance grid resilience.

A Bright Future for Electric Vehicles

The Quebec Electric Vehicle Show highlighted not only the current state of electric mobility but also its promising future, reflected in growing interest in EVs in southern Alberta and other provinces. With the support of organizations like CAA Quebec, consumers are becoming more aware of the benefits of electric vehicles. This awareness is crucial as Quebec aims to achieve its ambitious climate goals, including a significant reduction in greenhouse gas emissions.

CAA Quebec's presence at the Quebec Electric Vehicle Show exemplifies its leadership in promoting electric vehicles and sustainable transportation. By focusing on education, showcasing innovative models, and advocating for improved infrastructure, CAA Quebec is helping to pave the way for a greener future. As the automotive landscape continues to evolve, the insights and initiatives presented at the show will play a vital role in guiding consumers towards embracing electric mobility. The future is electric, and with organizations like CAA Quebec at the helm, that future looks promising.

 

Related News

View more

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

‘Tsunami of data’ could consume one fifth of global electricity by 2025

ICT Electricity Demand is surging as data centers, 5G, IoT, and server farms expand, straining grids, boosting carbon emissions, and challenging climate targets unless efficiency, renewable energy, and smarter cooling dramatically improve.

 

Key Points

ICT electricity demand is power used by networks, devices, and data centers across the global communications sector.

✅ Projected to reach up to 20 percent of global electricity by 2025

✅ Driven by data centers, 5G traffic, IoT, and high-res streaming

✅ Mitigation: efficiency, renewable PPAs, advanced cooling, workload shifts

 

The communications industry could use 20% of all the world’s electricity by 2025, hampering attempts to meet climate change targets, even as countries like New Zealand's electrification plans seek broader decarbonization, and straining grids as demand by power-hungry server farms storing digital data from billions of smartphones, tablets and internet-connected devices grows exponentially.

The industry has long argued that it can considerably reduce carbon emissions by increasing efficiency and reducing waste, but academics are challenging industry assumptions. A new paper, due to be published by US researchers later this month, will forecast that information and communications technology could create up to 3.5% of global emissions by 2020 – surpassing aviation and shipping – and up to 14% 2040, around the same proportion as the US today.

Global computing power demand from internet-connected devices, high resolution video streaming, emails, surveillance cameras and a new generation of smart TVs is increasing 20% a year, consuming roughly 3-5% of the world’s electricity in 2015, says Swedish researcher Anders Andrae.

In an update o a 2016 peer-reviewed study, Andrae found that without dramatic increases in efficiency, the ICT industry could use 20% of all electricity and emit up to 5.5% of the world’s carbon emissions by 2025. This would be more than any country, except China, India and the USA, where China's data center electricity use is drawing scrutiny.

He expects industry power demand to increase from 200-300 terawatt hours (TWh) of electricity a year now, to 1,200 or even 3,000TWh by 2025. Data centres on their own could produce 1.9 gigatonnes (Gt) (or 3.2% of the global total) of carbon emissions, he says.

“The situation is alarming,” said Andrae, who works for the Chinese communications technology firm Huawei. “We have a tsunami of data approaching. Everything which can be is being digitalised. It is a perfect storm. 5G [the fifth generation of mobile technology] is coming, IP [internet protocol] traffic is much higher than estimated, and all cars and machines, robots and artificial intelligence are being digitalised, producing huge amounts of data which is stored in data centres.”

US researchers expect power consumption to triple in the next five years as one billion more people come online in developing countries, and the “internet of things” (IoT), driverless cars, robots, video surveillance and artificial intelligence grows exponentially in rich countries.

The industry has encouraged the idea that the digital transformation of economies and large-scale energy efficiencies will slash global emissions by 20% or more, but the scale and speed of the revolution has been a surprise.

Global internet traffic will increase nearly threefold in the next five years says the latest Cisco Visual Networking Index, a leading industry tracker of internet use.

“More than one billion new internet users are expected, growing from three billion in 2015 to 4.1bn by 2020. Over the next five years global IP networks will support up to 10bn new devices and connections, increasing from 16.3bn in 2015 to 26bn by 2020,” says Cisco.

A 2016 Berkeley laboratory report for the US government estimated the country’s data centres, which held about 350m terabytes of data in 2015, could together need over 100TWh of electricity a year by 2020. This is the equivalent of about 10 large nuclear power stations.

Data centre capacity is also rocketing in Europe, where the EU's plan to double electricity use by 2050 could compound demand, and Asia with London, Frankfurt, Paris and Amsterdam expected to add nearly 200MW of consumption in 2017, or the power equivalent of a medium size power station.

“We are seeing massive growth of data centres in all regions. Trends that started in the US are now standard in Europe. Asia is taking off massively,” says Mitual Patel, head of EMEA data centre research at global investment firm CBRE.

“The volume of data being handled by such centres is growing at unprecedented rates. They are seen as a key element in the next stage of growth for the ICT industry”, says Peter Corcoran, a researcher at the university of Ireland, Galway.

Using renewable energy sounds good but no one else benefits from what will be generated, and it skews national attempts to reduce emissions

Ireland, which with Denmark is becoming a data base for the world’s biggest tech companies, has 350MW connected to data centres but this is expected to triple to over 1,000MW, or the equivalent of a nuclear power station size plant, in the next five years.

Permission has been given for a further 550MW to be connected and 750MW more is in the pipeline, says Eirgrid, the country’s main grid operator.

“If all enquiries connect, the data centre load could account for 20% of Ireland’s peak demand,” says Eirgrid in its All-Island Generation Capacity Statement 2017-2026  report.

The data will be stored in vast new one million square feet or larger “hyper-scale” server farms, which companies are now building. The scale of these farms is huge; a single $1bn Apple data centre planned for Athenry in Co Galway, expects to eventually use 300MW of electricity, or over 8% of the national capacity and more than the daily entire usage of Dublin. It will require 144 large diesel generators as back up for when the wind does not blow.

 Facebook’s Lulea data centre in Sweden, located on the edge of the Arctic circle, uses outside air for cooling rather than air conditioning and runs on hydroelectic power generated on the nearby Lule River. Photograph: David Levene for the Guardian

Pressed by Greenpeace and other environment groups, large tech companies with a public face , including Google, Facebook, Apple, Intel and Amazon, have promised to use renewable energy to power data centres. In most cases they are buying it off grid but some are planning to build solar and wind farms close to their centres.

Greenpeace IT analyst Gary Cook says only about 20% of the electricity used in the world’s data centres is so far renewable, with 80% of the power still coming from fossil fuels.

“The good news is that some companies have certainly embraced their responsibility, and are moving quite aggressively to meet their rapid growth with renewable energy. Others are just growing aggressively,” he says.

Architect David Hughes, who has challenged Apple’s new centre in Ireland, says the government should not be taken in by the promises.

“Using renewable energy sounds good but no one else benefits from what will be generated, and it skews national attempts to reduce emissions. Data centres … have eaten into any progress we made to achieving Ireland’s 40% carbon emissions reduction target. They are just adding to demand and reducing our percentage. They are getting a free ride at the Irish citizens’ expense,” says Hughes.

Eirgrid estimates indicate that by 2025, one in every 3kWh generated in Ireland could be going to a data centre, he added. “We have sleepwalked our way into a 10% increase in electricity consumption.”

Fossil fuel plants may have to be kept open longer to power other parts of the country, and manage issues like SF6 use in electrical equipment, and the costs will fall on the consumer, he says. “We will have to upgrade our grid and build more power generation both wind and backup generation for when the wind isn’t there and this all goes onto people’s bills.”

Under a best case scenario, says Andrae, there will be massive continuous improvements of power saving, as the global energy transition gathers pace, renewable energy will become the norm and the explosive growth in demand for data will slow.

But equally, he says, demand could continue to rise dramatically if the industry keeps growing at 20% a year, driverless cars each with dozens of embedded sensors, and cypto-currencies like Bitcoin which need vast amounts of computer power become mainstream.

“There is a real risk that it all gets out of control. Policy makers need to keep a close eye on this,” says Andrae.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.