City of Medicine Hat Electric Utility Recognized for Health and Safety Excellence


NFPA 70e Training - Arc Flash

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$199
Coupon Price:
$149
Reserve Your Seat Today

Medicine Hat Electric Utility Safety Awards spotlight Canadian Electricity Association OHS excellence, recognizing occupational health and safety leadership, employee safety performance, rigorous training, safe work methods, and shared best practices across Canadian utilities.

 

Key Points

CEA OHS honors for outstanding occupational health and employee safety performance across Canadian electric utilities.

✅ President's and Vice President's Awards achieved

✅ CEA OHS program tracks industry safety performance

✅ Focus on training, safe methods, best practices

 

Mayor Ted Clugston and Canadian Electricity Association (CEA) Chief Operating Officer Francis Bradley gathered at City Hall earlier today to present the City of Medicine Hat Electric Utility with several awards of excellence in health and safety practices.

The annual CEA Occupational Health and Safety (OHS) Awards identify top safety performing member companies and publicly recognize their commitment to safety and their contribution to the declining trend of workplace incidents each year.

The City of Medicine Hat Electric Utility was awarded with the President’s Award of Safety Excellence for Employee Safety and two Vice President’s Awards of Safety Excellence.

 “The City of Medicine Hat takes pride in producing and delivering safe, reliable and cost effective electrical energy to our customers,” said Mayor Ted Clugston.  “These awards are a great staff achievement, and demonstrate the City’s commitment to the health and safety of our employees, contracted workers and workplace visitors. As members of the Canadian Electricity Association, we are pleased to be recognized alongside other major utility providers across Canada in the electricity sector today.”

For more than 30 years, CEA has tracked and monitored the safety record of its member utilities. The Canadian electric utility industry is one of the safest maintenance, operation and construction related industries in the country due in a large measure to the high level of arc flash training and other programs; the establishment of safe work methods; and the sharing of industry best practices established through the OHS program.

Related News

Symantec Proves Russian

Dragonfly energy sector cyberattacks target ICS and SCADA across critical infrastructure, including the power grid and nuclear facilities, using spearphishing, watering-hole sites, supply-chain compromises, malware, and VPN exploits to gain operational access.

 

Key Points

Dragonfly APT campaigns target energy firms and ICS to gain grid access, risking manipulation and service disruption.

✅ Breaches leveraged spearphishing, watering-hole sites, and supply chains.

✅ Targeted ICS, SCADA, VPNs to pivot into operational networks.

✅ Aimed to enable power grid manipulation and potential outages.

 

An October, 2017 report by researchers at Symantec Corp., cited by the U.S. government, has linked recent US power grid cyber attacks to a group of hackers it had code-named "Dragonfly", and said it found evidence critical infrastructure facilities in Turkey and Switzerland also had been breached.

The Symantec researchers said an earlier wave of attacks by the same group starting in 2011 was used to gather intelligence on companies and their operational systems. The hackers then used that information for a more advanced wave of attacks targeting industrial control systems that, if disabled, leave millions without power or water.

U.S. intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attacks, condemned by the U.S. government, striking almost simultaneously at multiple locations, are testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

#google#

While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers.

“Since at least March 2016, Russian government cyber actors… targeted government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors,” according to Thursday’s FBI and Department of Homeland Security report. The report did not say how successful the attacks were or specify the targets, but said that the Russian hackers “targeted small commercial facilities’ networks where they staged malware, conducted spearphishing, and gained remote access into energy sector networks.” At least one target of a string of infrastructure attacks last year was a nuclear power facility in Kansas.

Symantec doesn’t typically point fingers at particular nations in its research on cyberattacks, said Eric Chien, technical director of Symantec’s Security Technology and Response division, though he said his team doesn’t see anything it would disagree with in the new federal report. The government report appears to corroborate Symantec’s research, showing that the hackers had penetrated computers and accessed utility control rooms that would let them directly manipulate power systems, he says.

“There were really no more technical hurdles for them to do something like flip off the power,” he said.

And as for the group behind the attacks, Chien said it appears to be relatively dormant for now, but it has gone quiet in the past only to return with new hacks.

“We expect they’re sort of retooling now, and they likely will be back,”

 


 

In some cases, Dragonfly successfully broke into the core systems that control US and European energy companies, Symantec revealed.

“The energy sector has become an area of increased interest to cyber-attackers over the past two years,” Symantec said in its report.

“Most notably, disruptions to Ukraine’s power system in 2015 and 2016 were attributed to a cyberattack and led to power outages affecting hundreds of thousands of people. In recent months, there have also been media reports of attempted attacks on the electricity grids in some European countries, as well as reports of companies that manage nuclear facilities in the US being compromised by hackers.

“The Dragonfly group appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so. Symantec customers are protected against the activities of the Dragonfly group.”

In recent weeks, senior US intelligence officials said that the Kremlin believes it can launch hacking operations against the West with impunity, including a cyber weapon that can disrupt power grids, according to assessments.

The DHS and FBI report further elaborated: “This campaign comprises two distinct categories of victims: staging and intended targets. The initial victims are peripheral organisations such as trusted third-party suppliers with less-secure networks, referred to as ‘staging targets’ throughout this alert.

“The threat actors used the staging targets’ networks as pivot points and malware repositories when targeting their final intended victims. National Cybersecurity and Communications Integration Center and FBI judge the ultimate objective of the actors is to compromise organisational networks, also referred to as the ‘intended target’.”

According to the US alert, hackers used a variety of attack methods, including spear-phishing emails, watering-hole domains, credential gathering, open source and network reconnaissance, host-based exploitation, and deliberate targeting of ICS infrastructure.

The attackers also targeted VPN software and used password cracking tools.

Once inside, the attackers downloaded tools from a remote server and then carried out a number of actions, including modifying key systems to store plaintext credentials in memory, and built web shells to gain command and control of targeted systems.

“This actors’ campaign has affected multiple organisations in the energy, nuclear, water, aviation, construction and critical manufacturing sectors, with hundreds of victims across the U.S. power grid confirmed,” the DHS said, before outlining a number of steps that IT managers in infrastructure organisations can take to cleanse their systems and defend against Russian hackers. he said.
 

 

Related News

View more

Canada could be electric, connected and clean — if it chooses

Canada Clean Energy Transition accelerates via carbon pricing, renewables, EV incentives, energy efficiency upgrades, smart grids, interprovincial transmission, and innovation in hydro, wind, solar, and storage to cut emissions and power sustainable growth.

 

Key Points

Canada Clean Energy Transition is a shift to renewables, EVs and efficiency powered by smart policy and innovation.

✅ Carbon pricing and EV incentives accelerate adoption

✅ Grid upgrades, storage, and transmission expand renewables

✅ Industry efficiency and smart tech cut energy waste

 

So, how do we get there?

We're already on our way.

The final weeks of 2016 delivered some progress, as Prime Minister Justin Trudeau and premiers of 11 of the 13 provinces and territories negotiated a new national climate plan. The deal is a game changer. It marks the moment that Canada stopped arguing about whether to tackle climate change and started figuring out how we're going to get there.

We can each be part of the solution by reducing the amount of energy we use, making sure our homes and workplaces are well insulated and choosing energy efficient appliances. When the time comes to upgrade our cars, washing machines and refrigerators, we can take advantage of rebates that cut the cost of electric models. In our homes, we can install smart technology — like automated thermostats — to cut down on energy waste and reduce power bills.

Even industries that use a lot of energy, like mining and manufacturing, could become leaders in sustainability. It would mean investing in energy saving technology, making their operations more efficient and running conveyor belts, robots and other equipment off locally produced renewable electricity.

Meanwhile, laboratories and factories in Ontario, Quebec and British Columbia are making breakthroughs in areas like energy storage, while renewable energy growth in the Prairie Provinces gathers momentum, which will make it possible to access clean power even when the sun isn't shining and the wind isn't blowing.

Liberal leader Justin Trudeau holds a copy of his environmental platform after announcing details of it at Jericho Beach Park in Vancouver, B.C., on Monday June 29, 2015. (Darryl Dyck/Canadian Press)

The scale and speed of Canada's transition to clean energy depends on provincial and federal policies that do things like tax carbon pollution, build interprovincial electricity transmission lines, invest in renewable energy and grid modernization projects that strengthen the system, and increase incentives for electric vehicles. 

Of course, even the best policies won't produce lasting results unless Canadians fight for them and take ownership for our role in the energy transition. Global momentum toward clean energy may be "irreversible," as former U.S. President Barack Obama recently wrote in the journal Science — but it's up to us whether Canada catches that wave or misses out.

Fortunately, clean energy has always been part of Canada's DNA.

We can learn from the past

In remote corners of the newly minted Dominion of Canada, rushing rivers turned the waterwheels that powered the lumber mills that built the places we inhabit today. The first electric lights were switched on in Winnipeg shortly after Confederation. By the turn of the 20th century, hydro power was lighting up towns and cities from coast to coast.  

Our country is home to some of the world's best clean energy resources, and experts note that zero-emissions electricity by 2035 is possible given our strengths, and fully two-thirds of our power is generated from renewable sources like hydro, wind and solar.

Looking to our heritage, we can make clean growth the next chapter in Canada's history

Recent commitments to phase out coal and invest in clean energy infrastructure mean the share of renewable power in Canada's energy mix is poised to grow. The global shift from fossil fuels to clean energy is opening up huge opportunities and Canada's opportunity in the global electricity market is growing as the country has the expertise to deliver solutions around the world.

Looking to our heritage, we can make clean growth the next chapter in Canada's history — building a nation that's electric, connected and on a practical, profitable path to 2035 zero-emission power for households and industry, stronger than ever.

 

Related News

View more

Coal CEO blasts federal agency's decision on power grid

FERC Rejects Trump Coal Plan, denying subsidies for coal-fired and nuclear plants as energy policy shifts toward natural gas and renewables, citing no grid reliability threat and warning about electricity prices and market impacts.

 

Key Points

FERC unanimously rejected subsidies for coal and nuclear plants, finding no grid reliability risk from retirements.

✅ Unanimous FERC vote rejects coal and nuclear compensation

✅ Cites no threat to grid reliability from plant retirements

✅ Opponents warned subsidies would distort power markets and prices

 

A decision by an independent energy agency to reject the Trump administration’s electricity pricing plan to bolster the coal industry could lead to more closures of coal-fired power plants and the loss of thousands of jobs, a top coal executive said Tuesday.

Robert Murray, CEO of Ohio-based Murray Energy Corp., called the action by the Federal Energy Regulatory Commission “a bureaucratic cop-out” that will raise the cost of electricity and jeopardize the reliability and security of the nation’s electric grid.

“While FERC commissioners sit on their hands and refuse to take the action directed by Energy Secretary Rick Perry and President Donald Trump, the decommissioning of more coal-fired and nuclear plants could result, further jeopardizing the reliability, resiliency and security of America’s electric power grids,” Murray said. “It will also raise the cost of electricity for all Americans.”

The five-member energy commission voted unanimously Monday to reject Trump’s plan to reward nuclear and coal-fired power plants for adding reliability to the nation’s power grid. The plan would have made the plants eligible for billions of dollars in government subsidies and help reverse a tide of bankruptcies and loss of market share suffered by the once-dominant coal industry as utilities' shift to natural gas and renewable energy continues.

The Republican-controlled commission said there’s no evidence that any past or planned retirements of coal-fired power plants pose a threat to reliability of the nation’s electric grid.

Murray disputed that and said the recent cold snap that hit the East Coast showed coal’s value, as power users in the Southeast were asked to cut back on electricity usage because of a shortage of natural gas. “If it were not for the electricity generated by our nation’s coal-fired and nuclear power plants, we would be experiencing massive brownouts risk and blackouts in this country,” he said.

Murray Energy is the largest privately owned coal company in the United States, with mining operations in Ohio, Illinois, Kentucky, Utah and West Virginia. Robert Murray, a Trump friend and political supporter, has been pushing hard for federal assistance for his industry. The Associated Press reported last year that Murray asked the Trump administration to issue an emergency order protecting coal-fired power plants from closing. Murray warned that failure to act could cause thousands of coal miners to be laid off and force his largest customer, Ohio-based FirstEnergy Solutions, into bankruptcy.

Perry ultimately rejected Murray’s request, but later asked energy regulators to boost coal and nuclear plants as the administration moved to replace the Clean Power Plan with a more limited approach.

The plan drew widespread opposition from business and environmental groups that frequently disagree with each other, even as some coal and business interests backed the EPA's Affordable Clean Energy rule in court.

Jack Gerard, president and CEO of the American Petroleum Institute, said Tuesday that the Trump plan was “far too narrow” in its focus on power sources that maintain a 90-day fuel supply.

API, the largest lobbying group for oil and gas industry, supports coal and other energy sources, Gerard said, “but we should not put our eggs in an individual basket defined as a 90-day fuel supply (while) unnecessarily intervening in private markets.”

 

Related News

View more

Power Co-Op Gets Bond Rating Upgrade After Exiting Kemper Deal

Cooperative Energy bond rating upgrade signals lower debt costs as Fitch lifts GO Zone Bonds to A, reflecting Kemper exit, shift to owned generation, natural gas, and renewable energy for co-op members and borrowing rates.

 

Key Points

Fitch raised Cooperative Energy's GO Zone Bonds to A, cutting debt costs after Kemper exit and shift to natural gas.

✅ Fitch upgrades 2009A GO Zone Bonds from A- to A.

✅ Kemper divestment reduced risk and exposure to coal.

✅ Shift to owned generation, natural gas, renewables lowers costs.

 

Cooperative Energy and its 11 co-op members will see lower debt costs on $35.4 million bond; similar to regional utilities offering one-time bill decreases for customers recently.

Bailing out of its 15 percent ownership stake in Mississippi Power’s Kemper gasification plant, amid debates over coal and nuclear subsidies in federal policy, has helped Hattiesburg-based Cooperative Energy gain a ratings upgrade on a $35.4 million bond issue.

The electric power co-op, which changed its name to Cooperative Energy from South Mississippi Electric Power Association in November, received a ratings upgrade from A- to A for its 2009 2009A Mississippi Business Finance Corporation Gulf Opportunity Zone Bonds, even as other utilities announced bill reductions for customers during 2020.

“This rating upgrade reflects the success of our strategy to move from purchased power to owned generation resources, and from coal to natural gas and renewable energy as clean energy priorities gain traction,” said Cooperative Energy President/CEO Jim Compton in a press release.  “The result for our members is lower borrowing costs and more favorable rates.”

An “A” rating from Fitch designates the bond issue as “near premium quality,” a status noted as utilities adapted to pandemic-era electricity demand trends nationwide.

 

Related News

View more

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

Americans Keep Using Less and Less Electricity

U.S. Electricity Demand Decoupling signals GDP growth without higher load, driven by energy efficiency, LED adoption, services-led output, and rising renewables integration with the grid, plus EV charging and battery storage supporting decarbonization.

 

Key Points

GDP grows as electricity use stays flat, driven by efficiency, renewables, and a shift toward services and output.

✅ LEDs and codes cut residential and commercial load intensity.

✅ Wind, solar, and gas gain share as coal and nuclear struggle.

✅ EVs and storage can grow load and enable grid decarbonization.

 

By Justin Fox

Economic growth picked up a little in the U.S. in 2017. But electricity use fell, with electricity sales projections continuing to decline, according to data released recently by the Energy Information Administration. It's now been basically flat for more than a decade:


 

Measured on a per-capita basis, electricity use is in clear decline, and is already back to the levels of the mid-1990s.

 


 

Sources: U.S. Energy Information Administration, U.S. Bureau of Economic Analysis

*Includes small-scale solar generation from 2014 onward

 

I constructed these charts to go all the way back to 1949 in part because I can (that's how far back the EIA data series goes) but also because it makes clear what a momentous change this is. Electricity use rose and rose and rose and then ... it didn't anymore.

Slower economic growth since 2007 has been part of the reason, but the 2017 numbers make clear that higher gross domestic product no longer necessarily requires more electricity, although the Iron Law of Climate is often cited to suggest rising energy use with economic growth. I wrote a column last year about this big shift, and there's not a whole lot new to say about what's causing it: mainly increased energy efficiency (driven to a remarkable extent by the rise of LED light bulbs), and the continuing migration of economic activity away from making tangible things and toward providing services and virtual products such as games and binge-watchable TV series (that are themselves consumed on ever-more-energy-efficient electronic devices).

What's worth going over, though, is what this means for those in the business of generating electricity. The Donald Trump administration has made saving coal-fired electric plants a big priority; the struggles of nuclear power plants have sparked concern from multiple quarters. Meanwhile, U.S. natural gas production has grown by more than 40 percent since 2007, thanks to hydraulic fracturing and other new drilling techniques, while wind and solar generation keep making big gains in cost and market share. And this is all happening within the context of a no-growth electricity market.

In China, a mystery in China's electricity data has complicated global comparisons.

 

Here are the five main sources of electric power in the U.S.:


 

The big story over the past decade has been coal and natural gas trading places as the top fuel for electricity generation. Over the past year and a half coal regained some of that lost ground as natural gas prices rose from the lows of early 2016. But with overall electricity use flat and production from wind and solar on the rise, that hasn't translated into big increases in coal generation overall.

Oh, and about solar. It's only a major factor in a few states (California especially), so it doesn't make the top five. But it's definitely on the rise.

 

 

What happens next? For power generators, the best bet for breaking out of the current no-growth pattern is to electrify more of the U.S. economy, especially transportation. A big part of the attraction of electric cars and trucks for policy-makers and others is their potential to be emissions-free. But they're only really emissions-free if the electricity used to charge them is generated in an emissions-free manner -- creating a pretty strong business case for continuing "decarbonization" of the electric industry. It's conceivable that electric car batteries could even assist in that decarbonization by storing the intermittent power generated by wind and solar and delivering it back onto the grid when needed.

I don't know exactly how all this will play out. Nobody does. But the business of generating electricity isn't going back to its pre-2008 normal. 

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified