Ontario utility finances hydro project

By Ontario Power Generation


Substation Relay Protection Training

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today
In late October, Ontario Power Generation Inc. OPG reached financial close of a $200 million private placement bond offering to fund the re-development and expansion of four hydroelectric generating stations on the lower part of the Mattagami River in northeastern Ontario.

The bonds were issued by Lower Mattagami Energy Limited Partnership LMELP, a limited partnership between OPG, as the sole general partner, and LM Energy Inc., a wholly-owned subsidiary of OPG. LMELP reached financial close of the $200 million private placement issue of senior secured bonds at a fixed 2.228 percent annual interest rate due in October 2017. This is the third of several private placement issues of senior secured bonds planned to be used to refinance commercial paper or other indebtedness, which collectively will complete the forecast $1.9 billion debt financing required for the project.

The redevelopment and expansion of four hydroelectric generating stations will utilize available water more efficiently, and increase production of clean and renewable electricity. One additional generating unit will be added to each of three existing stations - Little Long, Harmonand Kipling. The fourth station - Smoky Falls - will be decommissioned and replaced by a new, three-unit, 267 megawatt MW generating station.

The expanded Lower Mattagami River Complex will have a total generating capacity of 924 MW, which is an increase of 438 MW. Construction began in June 2010 and continues to progress well towards completion in 2015.

Approximately 1,300 people are currently employed by the project including about 250 First Nation and Métis workers.

Related News

27 giant parts from China to be transported to wind farm in Saskatchewan

Port of Vancouver Wind Turbine Blades arrive from China for a Saskatchewan wind farm, showcasing record oversized cargo logistics, tandem crane handling, renewable energy capacity, and North America's longest blades from Goldwind.

 

Key Points

Record-length blades for a Canadian wind farm, boosting renewable energy and requiring heavy-lift logistics at the port.

✅ 27 blades unloaded via tandem cranes with cage supports

✅ 50 turbines headed to Assiniboia over 21 weeks

✅ Largest 250 ft blades to arrive; reduced CO2 vs coal

 

A set of 220-foot-long wind turbine blades arrived at the Port of Vancouver from China over the weekend as part a shipment bound for a wind farm in Canada, alongside BC generating stations coming online in the region.

They’re the largest blades ever handled by the port, and this summer, even larger blades will arrive as companies expand production such as GE’s blade factory in France to meet demand — the largest North America has ever seen.

Alex Strogen described the scene as crews used two tandem cranes to unload 27 giant white blades from the MV Star Kilimanjaro, which picked up the wind turbine assemblies in China. They were manufactured by Goldwind Co.

“When you see these things come off and put onto these trailers, it’s exceptional in the sheer length of them,” Strogen said. “It looks as long as an airplane.”

In fact, each blade is about as long as the wingspan of a Boeing 747.

Groups of longshoremen attached the cranes to each blade and hoisted it into the air and onto a waiting truck. Metal cage-like devices on both ends kept the blades from touching the ground. Once loaded onto the trucks, the blades and shaft parts head to a terminal to be unloaded by another group of workers.

Another fleet of trucks will drive the wind turbines, towers and blades to Assiniboia, Saskatchewan, Canada, over the course of 21 weeks. Potentia Renewables of Toronto is erecting the turbines on 34,000 acres of leased agriculture land, amid wind farm expansion in PEI elsewhere in the country, according to a news release from the Port of Vancouver.

Potentia’s project, called the Golden South Wind Project, will generate approximately 900,000 megawatt-hours of electricity. It also has greatly reduced CO2 emissions compared with a coal-fired plant, and complements tidal power in Nova Scotia in Canada’s clean energy mix, according to the news release.

The project is expected to be operating in 2021, similar to major UK offshore wind additions coming online.

The Port of Vancouver will receive 50 full turbines of two models for the project, as Manitoba invests in new turbines across Canada. In August, the larger of the models, with blades measuring 250 feet, will arrive. They’ll be the longest blades ever imported into any port in North America.

“It’s an exciting year for the port,” said Ryan Hart, chief external affairs officer.

The Port of Vancouver is following all the recommended safety precautions during the COVID-19 pandemic, including social distancing and face masks, Strogen said, with support from initiatives like Bruce Power’s PPE donation across Canada.
As for crews onboard the ships, the U.S. Coast Guard is the agency in charge, and it is monitoring the last port-of-call for all vessels seeking to enter the Columbia River, Hart wrote in an email.

Vessel masters on each ship are responsible for monitoring the health of the crew and are required to report sick or ill crew members to the USCG prior to arrival or face fines and potential arrest.

 

Related News

View more

Coalition pursues extra $7.25B for DOE nuclear cleanup, job creation

DOE Environmental Management Funding Boost seeks $7.25B to accelerate nuclear cleanup, upgrade Savannah River Site infrastructure, create jobs, and support small businesses, echoing ARRA 2009 results and expediting DOE EM waste remediation nationwide.

 

Key Points

A proposed $7.25B stimulus for DOE's EM to accelerate nuclear cleanup, modernize infrastructure, and create jobs.

✅ $7.25B one-time stimulus for DOE EM cleanup and infrastructure.

✅ Targets Savannah River Site; supports jobs and small businesses.

✅ Builds on ARRA 2009; accelerates nuclear waste remediation.

 

A bloc of local governments and nuclear industry, nuclear innovation efforts, labor and community groups are pressing Congress to provide a one-time multibillion-dollar boost to the U.S. Department of Energy Office of Environmental Management, the remediation-focused Savannah River Site landlord.

The organizations and officials -- including Citizens For Nuclear Technology Awareness Executive Director Jim Marra and Savannah River Site Community Reuse Organization President and CEO Rick McLeod -- sent a letter Friday to U.S. House and Senate leadership "strongly" supporting a $7.25 billion funding injection, even as ACORE challenges coal and nuclear subsidies in separate regulatory proceedings, arguing it "will help reignite the national economy," help revive small businesses and create thousands of new jobs despite the novel coronavirus crisis.

More than 30 million Americans have filed unemployment claims in the past two months, with additional clean energy job losses reported, too. Hundreds of thousands of claims have been filed in South Carolina since mid-March, compounding issues like unpaid utility bills in neighboring states.

The requested money could, too, speed Environmental Management's nuclear waste cleanup missions and be used to fix ailing infrastructure and strengthen energy security for rural communities nationwide -- some of which dates back to the Cold War -- at sites across the country. That's a "rare" opportunity, reads the letter, which prominently features the Energy Communities Alliance logo and its chairman's signature.

Similar funding programs, like what was done with the 2009 American Recovery and Reinvestment Act and recent clean energy funding initiatives, have been successful.

At the time, amid a staggering economic downturn nationwide, Environmental Management contractors "hired over 20,000 new workers," putting them "to work to reduce the overall cleanup complex footprint by 688 square miles while strengthening local economies," the Friday letter reads.

The Energy Department's cleanup office estimates the $6 billion investment years ago reduced its environmental liability by $13 billion, according to a 2012 report.

Such a leap forward, the coalition believes, is repeatable, a view reflected in current plans to revitalize coal communities with clean energy projects across the country.

"We are confident that DOE can successfully manage increased funding and leverage it for future economic development as it has in the past," the letter states. It continues: "We take pride in working together to support jobs and development of infrastructure and work that make our country stronger and assists us to recover from the impacts of COVID-19."

As of Monday afternoon, 8,942 cases of COVID-19, the disease caused by the novel coronavirus, have been logged in South Carolina. Aiken County is home to 155 of those cases.

 

Related News

View more

Heathrow Airport Power Outage: Vulnerabilities Flagged Days Before Disruption

Heathrow Airport Power Outage 2025 disrupted operations with mass flight cancellations and diversions after a grid failure, exposing infrastructure resilience gaps, crisis management flaws, and raising passenger compensation and safety oversight concerns.

 

Key Points

A grid failure closed Heathrow, causing mass cancellations and diversions, exposing resilience and communication lapses.

✅ Grid fire triggered airport-wide shutdown

✅ 1,400+ flights canceled or diverted

✅ Inquiry probes resilience, communication, compensation

 

On March 21, 2025, Heathrow Airport, Europe's busiest, suffered a catastrophic power outage, similar to another high-profile outage seen at major events, that led to the cancellation and diversion of over 1,400 flights, affecting nearly 300,000 passengers and costing airlines an estimated £100 million. The power failure, triggered by a fire at an electricity substation in west London, left Heathrow with a significant operational crisis. This disruption is even more significant considering that Heathrow is one of the most expensive airports globally, which raises concerns about its infrastructure resilience and broader electricity system resilience across Europe.

In a parliamentary committee meeting, Heathrow officials admitted that vulnerabilities in the airport’s power supply were flagged just days before the outage. Nigel Wicking, Chief Executive of the Heathrow Airline Operators' Committee (HAOC), informed MPs that concerns regarding power resilience had been raised on March 15, following disruptions caused by cable thefts impacting runway lights. Despite these warnings, the airport’s management did not address the vulnerabilities urgently, even as UK net zero policies continue to reshape infrastructure planning, which ultimately led to the disastrous outage.

The airport was closed for a day, with serious consequences for not only airlines but also the surrounding community and businesses. British Airways alone faced millions of pounds in losses, and passengers experienced significant emotional distress, missing vital life events like weddings and funerals due to flight cancellations. The committee is now questioning officials from National Grid and Scottish and Southern Electricity Networks to better understand why Heathrow’s infrastructure failed, in the context of a cleaner grid following the British carbon tax that reduced coal use, how it communicated with affected parties, and what measures will be taken to compensate impacted passengers.

Heathrow’s Chief Executive, Thomas Woldbye, defended the closure decision, stating it would have been disastrous to keep the airport open under such circumstances. He noted that continuing operations would have left tens of thousands of passengers stranded and would have posed safety risks due to the failure of fire surveillance and CCTV systems. However, Wicking, representing the airlines, pointed out that Heathrow’s lack of resilience was unacceptable given the amount spent on the airport, emphasizing the need for better infrastructure, including addressing SF6 in switchgear during upgrades, and more transparent management practices.

Looking forward, the MPs intend to investigate the airport’s emergency preparedness, why the resilience review from 2018 wasn’t shared with airlines, and whether enough preventative measures were in place amid surging data demand that could strain electricity supplies. The outcome of this inquiry could have lasting effects on how Heathrow and other major airports handle their infrastructure and crisis management systems, as drought-driven hydro challenges demonstrate the wider climate stresses on power networks.

 

Related News

View more

Africa must quadruple power investment to supply electricity for all, IEA says

Africa Energy Investment must quadruple, says IEA, to deliver electricity access via grids, mini-grids, and stand-alone solar PV, wind, hydropower, natural gas, and geothermal, targeting $120 billion annually and 2.5% of GDP.

 

Key Points

Africa Energy Investment funds reliable, low-carbon electricity via grids, mini-grids, and renewables.

✅ Requires about $120B per year, or 2.5% of GDP

✅ Mix: grids, mini-grids, stand-alone solar PV and wind

✅ Targets reliability, economic growth, and electricity access

 

African countries will need to quadruple their rate of investment in their power sectors for the next two decades to bring reliable electricity to all Africans, as outlined in the IEA’s path to universal access analysis, an International Energy Agency (IEA) study published on Friday said.

If African countries continue on their policy trajectories, 530 million Africans will still lack electricity in 2030, the IEA report said. It said bringing reliable electricity to all Africans would require annual investment of around $120 billion and a global push for clean, affordable power to mobilize solutions.

“We’re talking about 2.5% of GDP that should go into the power sector,” Laura Cozzi, the IEA’s Chief Energy Modeller, told journalists ahead of the report’s launch. “India’s done it over the past 20 years. China has done it, with solar PV growth outpacing any other fuel, too. So it’s something that is doable.”

Taking advantage of technological advances and optimizing natural resources, as highlighted in a renewables roadmap, could help Africa’s economy grow four-fold by 2040 while requiring just 50% more energy, the agency said.

Africa’s population is currently growing at more than twice the global average rate. By 2040, it will be home to more than 2 billion people. Its cities are forecast to expand by 580 million people, a historically unprecedented pace of urbanization.

While that growth will lead to economic expansion, it will pile pressure on power sectors that have already failed to keep up with demand, with the sub-Saharan electricity challenge intensifying across the region. Nearly half of Africans - around 600 million people - do not have access to electricity. Last year, Africa accounted for nearly 70% of the global population lacking power, a proportion that has almost doubled since 2000, the IEA found.

Some 80% of companies in sub-Saharan Africa suffered frequent power disruptions in 2018, leading to financial losses that curbed economic growth.

The IEA recommended changing how power is distributed, with mini-grids and stand-alone systems like household solar playing a larger role in complementing traditional grids as targeted efforts to accelerate access funding gain momentum.

According to IEA Executive Director Fatih Birol, with the right government policies and energy strategies, Africa has an opportunity to pursue a less carbon-intensive development path than other regions.

“To achieve this, it has to take advantage of the huge potential that solar, wind, hydropower, natural gas and energy efficiency offer,” he said.

Despite possessing the world’s greatest solar potential, Africa boasts just 5 gigawatts of solar photovoltaics (PV), or less than 1% of global installed capacity, a slow green transition that underscores the scale of the challenge, the report stated.

To meet demand, African nations should add nearly 15 gigawatts of PV each year through 2040. Wind power should also expand rapidly, particularly in Ethiopia, Kenya, Senegal and South Africa. And Kenya should develop its geothermal resources.

 

Related News

View more

British Columbia Halts Further Expansion of Self-Driving Vehicles

BC Autonomous Vehicle Ban freezes new driverless testing and deployment as BC develops a regulatory framework, prioritizing safety, liability clarity, and road sharing with pedestrians and cyclists while existing pilot projects continue.

 

Key Points

A moratorium pausing new driverless testing until a safety-first regulatory framework and clear liability rules exist.

✅ Freezes new AV testing and deployment provincewide

✅ Current pilot shuttles continue under existing approvals

✅ Focus on safety, liability, and road-user integration

 

British Columbia has halted the expansion of fully autonomous vehicles on its roads. The province has announced it will not approve any new applications for testing or deployment of vehicles that operate without a human driver until it develops a new regulatory framework, even as it expands EV charging across the province.


Safety Concerns and Public Questions

The decision follows concerns about the safety of self-driving vehicles and questions about who would be liable in the event of an accident. The BC government emphasizes the need for robust regulations to ensure that self-driving cars and trucks can safely share the road with traditional vehicles, pedestrians, and cyclists, and to plan for infrastructure and power supply challenges associated with electrified fleets.

"We want to make sure that British Columbians are safe on our roads, and that means putting the proper safety guidelines in place," said Rob Fleming, Minister of Transportation and Infrastructure. "As technology evolves, we're committed to developing a comprehensive framework to address the issues surrounding self-driving technology."


What Does the Ban Mean?

The ban does not affect current pilot projects involving self-driving vehicles that already operate in BC, such as limited shuttle services and segments of the province's Electric Highway that support charging and operations.


Industry Reaction

The response from industry players working on autonomous vehicle technology has been mixed, amid warnings of a potential EV demand bottleneck as adoption ramps up. While some acknowledge the need for clear regulations, others express concern that the ban could stifle innovation in the province.

"We understand the government's desire to ensure safety, but a blanket ban risks putting British Columbia behind in the development of this important technology," says a spokesperson for a self-driving vehicle start-up.


Debate Over Self-Driving Technology

The BC ban highlights a larger debate about the future of autonomous vehicles. While proponents point to potential benefits such as improved safety, reduced traffic congestion, and increased accessibility, and national policies like Canada's EV goals aim to accelerate adoption, critics raise concerns about liability, potential job losses in the transportation sector, and the ability of self-driving technology to handle complex driving situations.


BC Not Alone

British Columbia is not the only jurisdiction grappling with the regulation of self-driving vehicles. Several other provinces and states in both Canada and the U.S. are also working to develop clear legal and regulatory frameworks for this rapidly evolving technology, even as studies suggest B.C. may need to double its power output to fully electrify road transport.


The Road Ahead

The path forward for fully autonomous vehicles in BC depends on the government's ability to create a regulatory framework that balances safety considerations with fostering innovation, and align with clean-fuel investments like the province's hydrogen project to support zero-emission mobility.  When and how that framework will materialize remains unclear, leaving the future of self-driving cars in the province temporarily uncertain.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.