Massachusetts stirs controversy with solar demand charge, TOU pricing cut


mass puc logo

CSA Z463 Electrical Maintenance

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$249
Coupon Price:
$199
Reserve Your Seat Today

Massachusetts Solar Net Metering faces new demand charges and elimination of residential time-of-use rates under an MDPU order, as Eversource cites grid cost fairness while clean energy advocates warn of impacts on distributed solar growth.

 

Key Points

Policy letting solar customers net out usage with exports; MDPU now adds demand charges and ends TOU rates.

✅ New residential solar demand charges start Dec 31, 2018.

✅ Optional residential TOU rates eliminated by MDPU order.

✅ Eversource cites grid cost fairness; advocates warn slower solar.

 

A recent Massachusetts Department of Public Utilities' rate case order changes the way solar net metering works and eliminates optional residential time-of-use rates, stirring controversy between clean energy advocates and utility Eversource and potential consumer backlash over rate design.

"There is a lot of room to talk about what net-energy metering should look like, but a demand charge is an unfair way to charge customers," Mark LeBel, staff attorney at non-profit clean energy advocacy organization Acadia Center, said in a Tuesday phone call. Acadia Center is an intervenor in the rate case and opposed the changes.

The Friday MDPU order implements demand charges for new residential solar projects starting on December 31, 2018. Such charges are based on the highest peak hourly consumption over the course of a month, regardless of what time the power is consumed.

Eversource contends the demand charge will more fairly distribute the costs of maintaining the local power grid, echoing minimum charge proposals aimed at low-usage customers. Net metering is often criticized for not evenly distributing those costs, which are effectively subsidized by non-net-metered customers.

"What the demand charge will do is eliminate, to the extent possible, the unfair cross subsidization by non-net-metered customers that currently exists with rates that only have kilowatt-hour charges and no kilowatt demand, Mike Durand, Eversource spokesman, said in a Tuesday email. 

"For net metered facilities that use little kilowatt-hours, a demand charge is a way to charge them for their fair share of the cost of the significant maintenance and upgrade work we do on the local grid every day," Durand said. "Currently, their neighbors are paying more than their share of those costs."

It will not affect existing facilities, Durand said, only those installed after December 31, 2018.

Solar advocates are not enthusiastic about the change and see it slowing the growth of solar power, particularly residential rooftop solar, in the state.

"This is a terrible outcome for the future of solar in Massachusetts," Nathan Phelps, program manager of distributed generation and regulatory policy at solar power advocacy group Vote Solar, said in a Tuesday phone call.

"It's very inconsistent with DPU precedent and numerous pieces of legislation passed in the last 10 years," Phelps said. "The commonwealth has passed several pieces of legislation that are supportive of renewable energy and solar power. I don't know what the DPU was thinking."

 

TIME-OF-USE PRICING ELIMINATED

It does not matter when during the month peak demand occurs -- which could be during the week in the evening -- customers will be charged the same as they would on a hot summer day, LeBel said. Because an individual customer's peak usage does not necessarily correspond to peak demand across the utility's system, consumers are not being provided incentives to reduce energy usage in a way that could benefit the power system, Acadia Center said in a Tuesday statement.

However, Eversource maintains that residential customer distribution peaks based on customer load profiles do not align with basic service peak periods, which are based on Independent System Operator New England's peaks that reflect market-based pricing, even as a Connecticut market overhaul advances in the region, according to the MDPU order.

"The residential Time of Use rates we're eliminating are obsolete, having been designed decades ago when we were responsible for both the generation and the delivery of electricity," Eversource's Durand said.

"We are no longer in the generation business, having divested of our generation assets in Massachusetts in compliance with the law that restructured of our industry back in the late 1990s. Time Varying pricing is best used with generation rates, where the price for electricity changes based on time of day and electricity demand and can significantly alter electric bills for households," he said.

Additionally, only 0.02% of residential customers take service on Eversource's TOU rates and it would be difficult for residential customers to avoid peak period rates because they do not have the ability to shift or reduce load, according to the order.

"The Department allowed the Companies' proposal to eliminate their optional residential TOU rates in order to consolidate and align their residential rates and tariffs to better achieve the rate structure goal of simplicity," the MDPU said in the order.

Related News

Hydro One wants to spend another $6-million to redesign bills

Hydro One Bill Redesign Spending sparks debate over Ontario Energy Board regulation, rate applications, privatization, and digital billing upgrades, as surveys cite confusing invoices under the Fair Hydro Plan for residential, commercial, and industrial customers.

 

Key Points

$15M project to simplify Hydro One bills, upgrade systems, and improve digital billing for commercial customers.

✅ $9M spent; $6M proposed for C&I and large-account changes.

✅ OEB to rule amid rate application and privatization scrutiny.

✅ Survey: 40% of customers struggled to understand bills.

 

Ontario's largest and recently privatized electricity utility has spent $9-million to redesign bills and is proposing to spend an additional $6-million on the project.

Hydro One has come under fire for spending since the Liberal government sold more than half of the company, notably for its CEO's $4.5-million pay.

Now, the NDP is raising concerns with the $15-million bill redesign expense contained in a rate application from the formerly public utility.

"I don't think the problem we face is a bill that people can't understand, I think the problem is rates that are too high," said energy critic Peter Tabuns. "Fifteen million dollars seems awfully expensive to me."

But Hydro One says a 2016 survey of its customers indicated about 40 per cent had trouble understanding their bills.

Ferio Pugliese, the company's executive vice-president of customer care and corporate affairs, said the redesign was aimed at giving customers a simpler bill.

"The new format is a format that when tested and put in front of our customers has been designed to give customers the four or five salient items they want to see on their bill," he said.

About $9-million has already gone into redesigning bills, mostly for residential customers, Pugliese said. Cosmetic changes to bills account for about 25 per cent of the cost, with the rest of the money going toward updating information systems and improving digital billing platforms, he said.

The additional $6-million Hydro One is looking to spend would go toward bill changes mostly for its commercial, industrial and large distribution account customers.

Energy Minister Glenn Thibeault noted in a statement that the Ontario Energy Board has yet to decide on the expense, but he suggested he sees the bill redesign as necessary alongside legislation to lower electricity rates introduced by the province.

"With Ontarians wanting clearer bills that are easier to understand, Hydro One's bill redesign project is a necessary improvement that will help customers," he wrote.

"Reductions from the Fair Hydro Plan (the government's 25 per cent cut to bills last year) are important information for both households and businesses, and it's our job to provide clear, helpful answers whenever possible."

The OEB recently ordered Hydro One to lower a rate increase it had been seeking for this year to 0.2 per cent down from 4.8 per cent.

The regulator also rejected a Hydro One proposal to give shareholders all of the tax savings generated by the IPO in 2015 when the Liberal government first began partially privatizing the utility. The OEB instead mandated shareholders receive 62 per cent of the savings while ratepayers receive the remaining 38 per cent.

 

 

Related News

View more

Tesla’s Powerwall as the beating heart of your home

GMP Tesla Powerwall Program replaces utility meters with smart battery storage, enabling virtual power plant services, demand response, and resilient homes, integrating solar readiness, EV charging support, and smart grid controls across Vermont households.

 

Key Points

Green Mountain Power uses Tesla Powerwalls as smart meters, creating a VPP for demand response and home backup.

✅ $30 monthly for 10 years or $3,000 upfront for two units

✅ Utility controls batteries for peak shaving and demand response

✅ Enables backup power, solar readiness, and EV charging support

 

There are more than 100 million single-family homes in the United States of America. If each of these homes were to have two 13.5 kWh Tesla Powerwalls, that would total 2.7 Terawatt-hours worth of electricity stored. Prior research has suggested that this volume of energy storage could get us halfway to the 5.4 TWh of storage needed to let the nation get 80% of its electricity from solar and wind, as states like California increasingly turn to grid batteries to support the transition.

Vermont utility Green Mountain Power (GMP) seeks to remove standard electric utility metering hardware and replace it with the equipment inside of a Tesla Powerwall, as part of a broader digital grid evolution underway. Mary Powell, President and CEO of Green Mountain Power, says, “We have a vision of a battery system in every single home” and they’ve got a patent pending software solution to make it happen.

The Resilient Home program will install two standard Tesla Powerwalls each in 250 homes in GMP’s service area. The homeowner will pay either $30 a month for ten years ($3,600), or $3,000 up front. At the end of the ten year period, payments end, but the unit can stay in the home for an additional five years – or as long as it has a usable life.

A single Powerwall costs approximately $6,800, making this a major discount.

GMP notes that the home must have reliable internet access to allow GMP and Tesla to communicate with the Powerwall. GMP will control the functions of the Powerwall, effectively operating a virtual power plant across participating homes, expanding the scope of programs like those that saved the state’s ratepayers more than $500,000 during peak demand events last year. The utility specifically notes that customers agree to share stored energy with GMP on several peak demand days each year.

The hardware can be designed to interact with current backup generators during power outages, or emerging fuel cell solutions that maintain battery charge longer during extended outages, however, the units will not charge from the generator. As noted the utility will be making use of the hardware during normal operating times, however, during a power outage the private home owner will be able to use the electricity to back up both their house and top off their car.

The utility told pv magazine USA that the Powerwalls are standard from the factory, with GMP’s patent pending software solution being the special sauce (has a hint of recent UL certifications). GMP said the program will also get home owners “adoption ready” for solar power, including microgrid energy storage markets, and other smart devices.

Sonnen’s ecoLinx is already directly interacting with a home’s electrical panel (literally throwing wifi enabled circuit breakers). Now with Tesla Powerwalls being used to replace utility meters, we see one further layer of integration that will lead to design changes that will drive residential solar toward $1/W. Electric utilities are also experimenting with controlling module level electronics and smart solar inverters in 100% residential penetration situations. And of course, considering that California is requiring solar – and probably storage in the future – in all new homes, we should expect to see further experimentation in this model. Off grid solar inverter manufacturers already include electric panels with their offerings.

If we add in the electric car, and have vehicle-to-grid abilities, we start to see a very strong amount of electricity generation and energy storage, helping to keep the lights on during grid stress, potentially happening in more than 100 million residential power plants. Resilient homes indeed.

 

Related News

View more

Kaspersky Lab Discovers Russian Hacker Infrastructure

Crouching Yeti APT targets energy infrastructure with watering-hole attacks, compromising servers to steal credentials and stage intrusions; Kaspersky Lab links the Energetic Bear group to ICS threats across Russia, US, Europe, and Turkey.

 

Key Points

Crouching Yeti APT, aka Energetic Bear, is a threat group that targets energy firms using watering-hole attacks.

✅ Targets energy infrastructure via watering-hole compromises

✅ Uses open-source tools and backdoored sshd for persistence

✅ Scans global servers to stage intrusions and steal credentials

 

A hacker collective known for attacking industrial companies around the world have had some of their infrastructure identified by Russian security specialists.

Kaspersky Lab said that it has discovered a number of servers compromised by the group, belonging to different organisations based in Russia, the US, and Turkey, as well as European countries.

The Russian-speaking hackers, known as Crouching Yeti or Energetic Bear, mostly focus on energy facilities, as seen in reports of infiltration of the U.S. power grid targeting critical infrastructure, for the main purpose of stealing valuable data from victim systems.

 

Hacked servers

Crouching Yeti is described as an advanced persistent threat (APT) group that Kaspersky Lab has been tracking since 2010.

#google#

Kaspersky Lab said that the servers it has compromised are not just limited to industrial companies. The servers were hit in 2016 and 2017 with different intentions. Some were compromised to gain access to other resources or to be used as intermediaries to conduct attacks on other resources.

Others, including those hosting Russian websites, were used as watering holes.

It is a common tactic for Crouching Yeti to utilise watering hole attacks where the attackers inject websites with a link redirecting visitors to a malicious server.

“In the process of analysing infected servers, researchers identified numerous websites and servers used by organisations in Russia, US, Europe, Asia and Latin America that the attackers had scanned with various tools, possibly to find a server that could be used to establish a foothold for hosting the attackers’ tools and to subsequently develop an attack,” said the security specialists in a blog posting.

“The range of websites and servers that captured the attention of the intruders is extensive,” the firm said. “Kaspersky Lab researchers found that the attackers had scanned numerous websites of different types, including online stores and services, public organisations, NGOs, manufacturing, etc.

Kaspersky Lab said that the hackers used publicly available malicious tools, designed for analysing servers, and for seeking out and collecting information. The researchers also found a modified sshd file with a preinstalled backdoor. This was used to replace the original file and could be authorised with a ‘master password’.

“Crouching Yeti is a notorious Russian-speaking group that has been active for many years and is still successfully targeting industrial organisations through watering hole attacks, among other techniques,” explained Vladimir Dashchenko, head of vulnerability research group at Kaspersky Lab ICS CERT.

 

Russian government?

“Our findings show that the group compromised servers not only for establishing watering holes, but also for further scanning, and they actively used open-sourced tools that made it much harder to identify them afterwards,” he said.

“The group’s activities, such as initial data collection, the theft of authentication data, and the scanning of resources, are used to launch further attacks,” said Dashchenko. “The diversity of infected servers and scanned resources suggests the group may operate in the interests of the third parties.”

This may well tie into a similar conclusion from a rival security vendor.

In 2014 CrowdStrike claimed that the ‘Energetic Bear’ group was also tracked in Symantec's Dragonfly research and had been hacking foreign companies on behalf of the Russian state.

The security vendor had said the group had been carrying out attacks on foreign companies since 2012, with reports of breaches at U.S. power plants that underscored the campaign, and there was evidence that these operations were sanctioned by the Russian government.

Last month the United States for the first time publicly accused Russia in a condemnation of Russian grid hacking of attacks against the American power grid.

Symantec meanwhile warned last year of a resurgence in cyber attacks on European and US energy companies, including reports of access to U.S. utility control rooms that could result in widespread power outages.

And last July the UK’s National Cyber Security Centre (NCSC) acknowledged it was investigating a broad wave of attacks on companies in the British energy and manufacturing sectors.

 

Related News

View more

How Synchrophasors are Bringing the Grid into the 21st Century

Synchrophasors deliver PMU-based, real-time monitoring for the smart grid, helping NYISO prevent blackouts, cut costs, and integrate renewables, with DOE-backed deployments boosting reliability, situational awareness, and data sharing across regional partners.

 

Key Points

Synchrophasors, or PMUs, are grid sensors that measure synced voltage, current, and frequency to enhance reliability.

✅ Real-time grid visibility and situational awareness

✅ Early fault detection to prevent cascading outages

✅ Supports renewable integration and lowers operating costs

 

Have you ever heard of a synchrophasor? It may sound like a word out of science fiction, but these mailbox-sized devices are already changing the electrical grid as we know it.

The grid was born over a century ago, at a time when our needs were simpler and our demand much lower. More complex needs are putting a heavy strain on the aging infrastructure, which is why we need to innovate and update our grid with investments in a smarter electricity infrastructure so it’s ready for the demands of today.

That’s where synchrophasors come in.

A synchrophasor is a sophisticated monitoring device that can measure the instantaneous voltage, current and frequency at specific locations on the grid. This gives operators a near-real-time picture of what is happening on the system, including insights into power grid vulnerabilities that allow them to make decisions to prevent power outages.

Just yesterday I attended the dedication of the New York Independent System Operator's smart grid control center, a $75 million project that will use these devices to locate grid problems at an early stage and share these data with their regional partners. This should mean fewer blackouts for the State of New York. I would like to congratulate NYISO for being a technology leader.

And not only will these synchrophasors help prevent outages, but they also save money. By providing more accurate and timely data on system limits, synchrophasors make the grid more reliable and efficient, thereby reducing planning and operations costs and addressing grid modernization affordability concerns for utilities.

The Department has worked with utilities across the country to increase the number of synchrophasors five-fold -- from less than 200 in 2009 to over 1,700 today. And this is just a part of our commitment to making a smarter, more resilient grid a reality, reinforced by grid improvement funding from DOE.

In September 2013, the US Department of Energy announced up to $9 million in funding to facilitate rapid response to unusual grid conditions. As a result, utilities will be able to better detect and head off potential blackouts, while improving day-to-day grid reliability and helping with the integration of solar into the grid and other clean renewable sources.

If you’d like to learn more about our investments in the smart grid and how they are improving our electrical infrastructure, please visit the Office of Electricity Delivery and Energy Reliability’s www.smartgrid.gov.

Patricia Hoffman is Assistant Secretary, Office of Electricity Delivery & Energy Reliability

 

Related News

View more

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

Energy Efficiency and Demand Response Can Nearly Level Southeast Electricity Demand for More than a Decade

Southeast Electricity Demand Forecast examines how energy efficiency, photovoltaics, electric vehicles, heat pumps, and demand response shape grid needs, stabilize load through 2030, shift peaks, and inform utility planning across the region.

 

Key Points

An outlook of load shaped by efficiency, solar, EVs, with demand response keeping usage steady through 2030.

✅ Stabilizes regional demand through 2030 under accelerated adoption

✅ Energy efficiency and demand response are primary levers

✅ EVs and heat pumps drive growth post 2030; shift winter peaks

 

Electricity markets in the Southeast are facing many changes on the customer side of the meter. In a new report released today, we look at how energy efficiency, photovoltaics (solar electricity), electric vehicles, heat pumps, and demand response (shifting loads from periods of high demand) might affect electricity needs in the Southeast.

We find that if all of these resources are pursued on an accelerated basis, electricity demand in the region can be stabilized until about 2030.

After that, demand will likely grow in the following decade because of increased market penetration of electric vehicles and heat pumps, but energy planners will have time to deal with this growth if these projections are borne out. We also find that energy efficiency and demand response can be vital for managing electricity supply and demand in the region and that these resources can help contain energy demand growth, reducing the impact of expensive new generation on consumer wallets.

 

National trends

This is the second ACEEE report looking at regional electricity demand. In 2016, we published a study on electricity consumption in New England, finding an even more pronounced effect. For New England, with even more aggressive pursuit of energy efficiency and these other resources, consumption was projected to decline through about 2030, before rebounding in the following decade.

These regional trends fit into a broader national pattern. In the United States, electricity consumption has been characterized by flat electricity demand for the past decade. Increased energy efficiency efforts have contributed to this lack of consumption growth, even as the US economy has grown since the Great Recession. Recently, the US Energy Information Administration (EIA – a branch of the US Department of Energy) released data on US electricity consumption in 2016, finding that 2016 consumption was 0.3% below 2015 consumption, and other analysts reported a 1% slide in 2023 on milder weather.

 

Five scenarios for the Southeast

ACEEE’s new study focuses on the Southeast because it is very different from New England, with warmer weather, more economic growth, and less-aggressive energy efficiency and distributed energy policies than the Northeast. For the Southeast, we examined five scenarios: a business-as-usual scenario; two alternative scenarios with progressively higher levels of energy efficiency, photovoltaics informed by a solar strategy for the South that is emerging regionally, electric vehicles, heat pumps, and demand response; and two scenarios combining high numbers of electric vehicles and heat pumps with more modest levels of the other resources. This figure presents electricity demand for each of these scenarios:

Over the 2016-2040 period, we project that average annual growth will range from 0.1% to 1.0%, depending on the scenario, much slower than historic growth in the region. Energy efficiency is generally the biggest contributor to changes in projected 2040 electricity consumption relative to the business-as-usual scenario, as shown in the figure below, which presents our accelerated scenario that is based on levels of energy efficiency and other resources now targeted by leading states and utilities in the Southeast.

To date, Entergy Arkansas has achieved the annual efficiency savings as a percent of sales shown in the accelerated scenario and Progress Energy (a division of Duke Energy) has nearly achieved those savings in both North and South Carolina. Sixteen states outside the Southeast have also achieved these savings statewide.

The efficiency savings shown in the aggressive scenario have been proposed by the Arkansas PSC. This level of savings has already been achieved by Arizona as well as six other states. Likewise, the demand response savings we model have been achieved by more than 10 utilities, including four in the Southeast. The levels of photovoltaic, electric vehicle, and heat pump penetration are more speculative and are subject to significant uncertainty.

We also examined trends in summer and winter peak demand. Most utilities in the Southeast have historically had peak demand in the summer, often seeing heatwave-driven surges that stress operations across the Eastern U.S., but our analysis shows that winter peaks will be more likely in the region as photovoltaics and demand response reduce summer peaks and heat pumps increase winter peaks.

 

Why it’s vital to plan broadly

Our analysis illustrates the importance of incorporating energy efficiency, demand response, and photovoltaics into utility planning forecasts as utility trends to watch continue to evolve. Failing to include these resources leads to much higher forecasts, resulting in excess utility system investments, unnecessarily increasing customer electricity rates. Our analysis also illustrates the importance of including electric vehicles and heat pumps in long-term forecasts. While these technologies will have moderate impacts over the next 10 years, they could become increasingly important in the long run.

We are entering a dynamic period of substantial uncertainty for long-term electricity sales and system peaks, highlighted by COVID-19 demand shifts that upended typical patterns. We need to carefully observe and analyze developments in energy efficiency, photovoltaics, electric vehicles, heat pumps, and demand response over the next few years. As these technologies advance, we can create policies to reduce energy bills, system costs, and harmful emissions, drawing on grid reliability strategies tested in Texas, while growing the Southeast’s economy. Resource planners should be sure to incorporate these emerging trends and policies into their long-term forecasts and planning.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.