More stability for electricity consumers


NFPA 70b Training - Electrical Maintenance

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$599
Coupon Price:
$499
Reserve Your Seat Today

Alberta Bill 34 stabilizes electricity prices by empowering the Balancing Pool to borrow, smooth wholesale volatility, and extend PPA cost recovery, protecting consumers with rate stability, predictable power bills, and a reliable grid transition.

 

Key Points

Alberta Bill 34 allows Balancing Pool financing to smooth PPA costs and stabilize electricity prices for consumers.

✅ Loan access for Balancing Pool to manage obligations

✅ Spreads PPA costs to 2030 to reduce monthly charges

✅ Smooths wholesale volatility, stabilizing consumer power bills

 

Proposed legislation would further reduce price volatility in the electricity system and support the province’s made-in-Alberta transition to a stable and reliable system under new electricity rules that puts consumers first.

Bill 34, the Electric Utilities Amendment Act, would allow the Balancing Pool to borrow money from the province to manage its funding obligations. This change, in conjunction with Ministerial Orders that allow the Balancing Pool to smooth price volatility over a longer period of time, would support electricity costs remaining low and stable.

Currently, the average electricity consumer receives a Balancing Pool credit of $1.95 on their monthly bill.

Without the changes proposed in Bill 34, including electricity market changes in Alberta, the Balancing Pool would have to remove that credit and apply a charge of $8.40 per month (approximately $100 per year) starting Jan. 1, 2017, with similar charges applied until the end of 2020.

With the changes proposed in Bill 34 and with supporting regulations that give the Balancing Pool until 2030 to meet its net zero obligation, the charge would instead be 67 cents per month for the average consumer. That’s the equivalent of a
0.1 cent/KWh increase in electricity prices, and $7.73 less per month than if the government hadn’t acted. The amount will be reviewed annually and adjusted as necessary based on the wholesale price of electricity, amid Calgary retailer pushback over a broader market overhaul.

The changes – which allow the Balancing Pool to manage the cost of the power companies’ return of PPAs earlier this year – in conjunction with reaching a settlement with one of the PPA buyers and tentative settlements with two others, would protect consumers and provide price stability as the province transitions its electricity system and implements changes to production and payment across the market.

By extending the operations of the Balancing Pool, providing a loan and setting the initial consumer charge under a consumer price cap approach, the province is ensuring that consumers do not see an immediate and disproportionate increase to power bills from the companies returning their power contracts. These changes complement the government’s work with the companies to settle the PPA disputes. The government will continue to work with the Balancing Pool to understand what steps the Balancing Pool could take to further reduce the cost impact on consumers.

Additionally, Robert Bhatia has been appointed to chair the Balancing Pool’s Board of Directors. The appointment is effective November 29, 2016.

Mr. Bhatia brings a wealth of knowledge and experience to the Balancing Pool, particularly in the areas of financial and fiscal management, strategic leadership, policy and legislation, governance, and operations. During his more than 30 years working for the Government of Alberta, Mr. Bhatia worked in government ministries responsible for finance and revenue, most notably in deputy minister roles.

Source: Energy Alberta

 

Related News

Related News

Electricity sales in the U.S. actually dropped over the past 7 years

US Electricity Sales Decline amid population growth and GDP gains, as DOE links reduced per capita consumption to energy efficiency, warmer winters, appliances, and bulbs, while hotter summers and rising AC demand may offset savings.

 

Key Points

US electricity sales fell 3% since 2010 despite population and GDP growth, driven by efficiency gains and warmer winters.

✅ DOE links drops to efficiency and warmer winters

✅ Per capita residential use fell about 7% since 2010

✅ Rising AC demand may offset winter heating savings

 

Since 2010, the United States has grown by 17 million people, and the gross domestic product (GDP) has increased by $3.6 trillion. Yet in that same time span, electricity sales in the United States actually declined by 3%, according to data released by the U.S. Department of Energy (DOE), even as electricity prices rose at a 41-year pace nationwide.

The U.S. decline in electricity sales is remarkable given that the U.S. population increased by 5.8% in that same time span. This means that per capita electricity use fell even more than that; indeed, the Department of Energy pegs residential electricity sales per capita as having declined by 7%, even as inflation-adjusted residential bills rose 5% in 2022 nationwide.

There are likely multiple reasons for this decline in electricity sales. Department of Energy analysts suggest that, at least in part, it is due to increased adoption of energy-efficient appliances and bulbs, like compact fluorescents. Indeed, the DOE notes that there is a correlation between consumer spending on “energy efficiency” and a reduction in per capita electricity sales, while utilities invest more in delivery infrastructure to modernize the grid.

Yet the DOE also notes that states with a greater increase in warm weather days had a corresponding decrease in electricity sales, as milder weather can reduce power demand across years. In southern states, the effect was most dramatic: for instance, from 2010 to 2016, Florida had a 56% decrease in cold weather days that would require heating and as a result, saw a 9% decrease in per capita electricity sales.

The moral is that warm winters save on electricity. But if global temperatures continue to rise, and summers become hotter, too, this decrease in winter heating spending may be offset by the increased need to run air conditioning in the summer, and given how electricity and natural gas prices interact, overall energy costs could shift. Indeed, it takes far more energy to cool a room than it does to heat it, for reasons related to the basic laws of thermodynamics. 

 

Related News

View more

Symantec Proves Russian

Dragonfly energy sector cyberattacks target ICS and SCADA across critical infrastructure, including the power grid and nuclear facilities, using spearphishing, watering-hole sites, supply-chain compromises, malware, and VPN exploits to gain operational access.

 

Key Points

Dragonfly APT campaigns target energy firms and ICS to gain grid access, risking manipulation and service disruption.

✅ Breaches leveraged spearphishing, watering-hole sites, and supply chains.

✅ Targeted ICS, SCADA, VPNs to pivot into operational networks.

✅ Aimed to enable power grid manipulation and potential outages.

 

An October, 2017 report by researchers at Symantec Corp., cited by the U.S. government, has linked recent US power grid cyber attacks to a group of hackers it had code-named "Dragonfly", and said it found evidence critical infrastructure facilities in Turkey and Switzerland also had been breached.

The Symantec researchers said an earlier wave of attacks by the same group starting in 2011 was used to gather intelligence on companies and their operational systems. The hackers then used that information for a more advanced wave of attacks targeting industrial control systems that, if disabled, leave millions without power or water.

U.S. intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attacks, condemned by the U.S. government, striking almost simultaneously at multiple locations, are testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

#google#

While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers.

“Since at least March 2016, Russian government cyber actors… targeted government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors,” according to Thursday’s FBI and Department of Homeland Security report. The report did not say how successful the attacks were or specify the targets, but said that the Russian hackers “targeted small commercial facilities’ networks where they staged malware, conducted spearphishing, and gained remote access into energy sector networks.” At least one target of a string of infrastructure attacks last year was a nuclear power facility in Kansas.

Symantec doesn’t typically point fingers at particular nations in its research on cyberattacks, said Eric Chien, technical director of Symantec’s Security Technology and Response division, though he said his team doesn’t see anything it would disagree with in the new federal report. The government report appears to corroborate Symantec’s research, showing that the hackers had penetrated computers and accessed utility control rooms that would let them directly manipulate power systems, he says.

“There were really no more technical hurdles for them to do something like flip off the power,” he said.

And as for the group behind the attacks, Chien said it appears to be relatively dormant for now, but it has gone quiet in the past only to return with new hacks.

“We expect they’re sort of retooling now, and they likely will be back,”

 


 

In some cases, Dragonfly successfully broke into the core systems that control US and European energy companies, Symantec revealed.

“The energy sector has become an area of increased interest to cyber-attackers over the past two years,” Symantec said in its report.

“Most notably, disruptions to Ukraine’s power system in 2015 and 2016 were attributed to a cyberattack and led to power outages affecting hundreds of thousands of people. In recent months, there have also been media reports of attempted attacks on the electricity grids in some European countries, as well as reports of companies that manage nuclear facilities in the US being compromised by hackers.

“The Dragonfly group appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so. Symantec customers are protected against the activities of the Dragonfly group.”

In recent weeks, senior US intelligence officials said that the Kremlin believes it can launch hacking operations against the West with impunity, including a cyber weapon that can disrupt power grids, according to assessments.

The DHS and FBI report further elaborated: “This campaign comprises two distinct categories of victims: staging and intended targets. The initial victims are peripheral organisations such as trusted third-party suppliers with less-secure networks, referred to as ‘staging targets’ throughout this alert.

“The threat actors used the staging targets’ networks as pivot points and malware repositories when targeting their final intended victims. National Cybersecurity and Communications Integration Center and FBI judge the ultimate objective of the actors is to compromise organisational networks, also referred to as the ‘intended target’.”

According to the US alert, hackers used a variety of attack methods, including spear-phishing emails, watering-hole domains, credential gathering, open source and network reconnaissance, host-based exploitation, and deliberate targeting of ICS infrastructure.

The attackers also targeted VPN software and used password cracking tools.

Once inside, the attackers downloaded tools from a remote server and then carried out a number of actions, including modifying key systems to store plaintext credentials in memory, and built web shells to gain command and control of targeted systems.

“This actors’ campaign has affected multiple organisations in the energy, nuclear, water, aviation, construction and critical manufacturing sectors, with hundreds of victims across the U.S. power grid confirmed,” the DHS said, before outlining a number of steps that IT managers in infrastructure organisations can take to cleanse their systems and defend against Russian hackers. he said.
 

 

Related News

View more

Canada’s Opportunity in the Global Electricity Market

Canada Clean Electricity Exports leverage hydroelectric power, energy storage, and transmission interconnections to meet rising IEA-forecast demand, support electrification, decarbonize grids, and attract green finance with stable policy and advanced technology.

 

Key Points

Canada's cross-border power sales from hydro and renewables, enabled by storage, transmission, and supportive policy.

✅ Hydro leads generation; expand transmission interties to the US

✅ Deploy storage to balance wind and solar variability

✅ Streamline regulation and green finance to scale exports

 

As global electricity demand continues to surge, Canada finds itself uniquely positioned to capitalize on this expanding market by choosing an electric, connected and clean pathway that scales with demand. With its vast natural resources, advanced technology, and stable political environment, Canada can play a crucial role in meeting the world’s energy needs while also advancing its own economic interests.

The International Energy Agency (IEA) has projected that global electricity demand will grow significantly over the next decade, driven by factors such as population growth, urbanization, and the increasing electrification of various sectors, including transportation and industry. This presents a golden opportunity for Canada to bolster its energy security as it boasts an abundance of renewable energy sources, particularly hydroelectric power. Currently, hydroelectricity accounts for about 60% of Canada’s total electricity generation, making it one of the largest producers of this clean energy source in the world.

The growing emphasis on renewable energy aligns perfectly with Canada’s strengths, with the Prairie Provinces emerging as leaders in new wind and solar capacity across the country. As countries worldwide strive to reduce their carbon footprints and transition to greener energy solutions, Canada’s clean energy resources can be harnessed not only to meet domestic needs but also to export electricity to neighboring countries and beyond. The U.S., for instance, is already a significant market for Canadian electricity, with interconnections facilitating the flow of power across borders. Expanding these connections and investing in infrastructure could further increase Canada’s electricity exports.

Moreover, advancements in energy storage technology present another avenue for Canada to enhance its role in the global electricity market. With the rise of intermittent energy sources like wind and solar, the ability to store excess electricity generated during peak production times becomes essential. Canada’s expertise in technology and innovation positions it well to develop and deploy energy storage solutions that can stabilize the grid through grid modernization projects and ensure a reliable supply of electricity.

Additionally, Canada’s commitment to reducing greenhouse gas emissions and combating climate change aligns with the global shift towards sustainable energy. By investing in renewable energy projects and supporting research and development, Canada can not only meet its climate targets, including zero-emissions electricity by 2035, but also attract international investment. Green financing initiatives are becoming increasingly popular, and Canada can leverage its reputation as a leader in environmental stewardship to tap into this growing market.

However, to fully realize these opportunities, Canada must address some key challenges. Regulatory hurdles, infrastructure limitations, and the need for a coordinated national energy strategy are critical issues that must be navigated. Streamlining regulations and fostering collaboration between federal and provincial governments will be essential in creating a conducive environment for investment in renewable energy projects.

Furthermore, public acceptance and community engagement are vital components of developing new energy projects, especially where solar power adoption lags and outreach is needed. Ensuring that local communities benefit from these initiatives—whether through job creation, economic investment, or shared revenues—will help garner support and facilitate smoother project implementation.

In addition to domestic efforts, Canada should also position itself as a global leader in energy diplomacy. By collaborating with other nations to share best practices, technologies, and resources, Canada can strengthen its influence in international energy discussions. Engaging in multilateral initiatives aimed at addressing energy poverty and promoting sustainable development will not only enhance Canada’s standing on the world stage but also open doors for Canadian companies to expand their reach.

In conclusion, as the global demand for electricity rises, Canada stands at a crossroads, with a tremendous opportunity to lead in the clean energy sector. By leveraging its natural resources, investing in technology, and fostering international partnerships, Canada can not only meet its energy needs but also pursue zero-emission electricity by 2035 while positioning itself as a key player in the global electricity market. The path forward will require strategic planning, investment, and collaboration, but the potential rewards are significant—both for Canada and the planet.

 

Related News

View more

Ontario looks to build on electricity deal with Quebec

Ontario-Quebec Electricity Deal explores hydro imports, terawatt hours, electricity costs, greenhouse gas cuts, and baseload impacts, amid debates on Pickering nuclear operations and competitive procurement in Ontario's long-term energy planning.

 

Key Points

A proposed hydro import deal from Quebec, balancing costs, emissions, and reliability for Ontario electricity customers.

✅ Draft 20-year, 8 TWh offer reported by La Presse disputed

✅ Ontario seeks lower costs and GHG cuts versus alternatives

✅ Not a baseload replacement; Pickering closure not planned

 

Ontario is negotiating a possible energy swap agreement to buy electricity from Quebec, but the government is disputing a published report that it is preparing to sign a deal for enough electricity to power a city the size of Ottawa.

La Presse reported Tuesday that it obtained a copy of a draft, 20-year deal that says Ontario would buy eight terawatt hours a year from Quebec – about 6 per cent of Ontario’s consumption – whether the electricity is consumed or not.

Ontario Energy Minister Glenn Thibeault’s office said the province is in discussions to build on an agreement signed last year for Ontario to import up to two terawatt hours of electricity a year from Quebec.

 

But his office released a letter dated late last month to his Quebec counterpart, in which Mr. Thibeault said the offer extended in June was unacceptable because it would increase the average residential electricity bill by $30 a year.

“I am hopeful that your continued support and efforts will help to further discussions between our jurisdictions that could lead to an agreement that is in the best interest of both Ontario and Quebec,” Mr. Thibeault wrote July 27 to Pierre Arcand.

Ontario would prepare a “term sheet” for the next stage of discussions ahead of the two ministers meeting at the Energy and Mines Ministers Conference later this month in New Brunswick, Mr. Thibeault wrote.

Any future agreements with Quebec will have to provide a reduction in Ontario electricity rates compared with other alternatives and demonstrate measurable reductions in greenhouse gas emissions, he wrote.

Progressive Conservative Leader Patrick Brown said Ontario doesn’t need eight terawatt hours of additional power and suggested it means the Liberal government is considering closing power facilities such as the Pickering nuclear plant early.

A senior Energy Ministry official said that is not on the table. The government has said it intends to keep operating two units at Pickering until 2022, and the other four units until 2024.

Even if the Quebec offer had been accepted, the energy official said, that power wouldn’t have replaced any of Ontario’s baseload power because it couldn’t have been counted on 24 hours a day, 365 days a year.

The Society of Energy Professionals said Mr. Thibeault was right to reject the deal, but called on him to release the Long-Term Energy Plan – which was supposed to be out this spring – before continuing negotiations.

Some commentators have argued for broader reforms to address Ontario's hydro system challenges, urging policymakers to review all options as negotiations proceed.

The Ontario Energy Association said the reported deal would run counter to the government’s stated energy objectives amid concerns over electricity prices in the province.

“Ontarians will not get the benefit of competition to ensure it is the best of all possible options for the province, and companies who have invested in Ontario and have employees here will not get the opportunity to provide alternatives,” president and chief executive Vince Brescia said in a statement. “Competitive processes should be used for any new significant system capacity in Ontario.”

The Association of Power Producers of Ontario said it is concerned the government is even considering deals that would “threaten to undercut a competitive marketplace and long-term planning.”

“Ontario already has a surplus of energy, so it’s very difficult to see how this deal or any other sole-source deal with Quebec could benefit the province and its ratepayers,” association president and CEO David Butters said in a statement.

The Ontario Waterpower Association also said such a deal with Quebec would “present a significant challenge to continued investment in waterpower in Ontario.”

 

Related News

View more

UK Electricity prices hit 10-year high as cheap wind power wanes

UK Electricity Price Surge driven by wholesale gas costs, low wind output, and higher gas-fired generation, as National Grid boosts base load power to meet demand, lifting weekend prices toward decade highs.

 

Key Points

A sharp rise in UK power prices tied to gas spikes, waning wind, and higher reliance on gas-fired generation.

✅ Wholesale gas prices squeeze power, doubling weekend baseload.

✅ Wind generation falls to 3GW, forcing more gas-fired plants.

✅ Tariff hikes signal bill pressure and supplier strain.

 

The UK’s electricity market has followed the lead of surging wholesale gas prices this week to reach weekend highs, with UK peak power prices not seen in a decade across the market.

The power market has avoided the severe volatility which ripped through the gas market this week because strong winds helped to supply ample electricity to meet demand, reflecting recent record wind generation across the UK.

But as freezing winds begin to wane this weekend National Grid will need to use more gas-fired power plants to fill the gap, meaning the cost of generating electricity will surge.

Jamie Stewart, an energy expert at ICIS, said the price for base load power this weekend has already soared to around £80 per megawatt hour, almost double what one would expect to see for a weekend in March.

National Grid will increase its use of expensive gas-fired power by an extra 7GW to make up for low wind power, which is forecast to drop by two-thirds in the days ahead.

Wind speeds helped to protect the electricity system from huge price hikes on the neighbouring gas market on Thursday, by generating as much as 13GW by some estimates.

However, by the end of Friday this output will fall by almost half to 7GW and slump to lows of 3GW by Saturday, Mr Stewart said.

The power price was already higher than usual at £53/MWh last weekend even before the full force of the storms, including Storm Malik wind generation, hit Britain. That was still well above the more typical "mid-40s” price for this time of year, Mr Stewart added.

The twin price spikes across the UK’s energy markets has raised fears of household bill hikes in the months ahead, even as an emergency energy plan is not going ahead.

Late on Thursday Big Six supplier E.on quietly pushed through a dual-fuel tariff increase of 2.6%, to drive the average bill up to £1,153 from 19 April.

Energy supply minnow Bulb also increased prices by £24 a year for its 300,000 customers, blaming rising wholesale costs.

The UK has suffered two gas price shocks this winter, which is the first since the owner of British Gas shuttered the country’s largest gas storage facility at Rough off the Yorkshire coast.

A string of gas supply outages this week cut supplies to the UK just as freezing conditions drove demand for gas-heating a third higher than normal for this time of year.

It was the first time in almost ten years that National Grid was forced to issue a short supply warning to the market that supplies would fall short of demand unless factories agree to use less.

The twelve-year market price highs followed a pre-Christmas spike when the UK’s most important North Sea pipeline shut down at the same time as a deadly explosion at Europe’s most important gas hub, based in the Austrian town of Baumgarten.

 

Related News

View more

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.