Power Producers Oppose Legislation Helping Millstone Nuclear Plant


Electrical Testing & Commissioning of Power Systems

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$599
Coupon Price:
$499
Reserve Your Seat Today

Millstone Nuclear Legislation faces opposition from Calpine, Dynegy, NRG, and EPSA, as Connecticut debates market access, ratepayer impacts, renewable and low-carbon procurement, and Dominion transparency amid low natural gas and power prices.

 

Key Points

A Connecticut plan to expand Millstone's market access while balancing ratepayer costs, competition and low carbon goals.

✅ Guarantees market access via low-carbon procurement process

✅ Raises concerns over rates, competition, and transparency

✅ Positions nuclear alongside renewables in Connecticut policy

 

Power producers are set to announce Tuesday their opposition to legislation that would guarantee markets for the Millstone nuclear plant, calling it special treatment for one energy source in Connecticut.

Legislation has yet to be drafted, but it could follow a measure that failed last year, proposing to boost Millstone's access to electricity markets amid a broader market overhaul in Connecticut that lawmakers are weighing.

Calpine Corp., Dynegy, NRG Energy and the Electric Power Supply Association say state assistance to Millstone could drive up energy costs for businesses and residents, echoing arguments that in deregulated electricity markets subsidies are unnecessary and distortive, the companies and trade association say the legislature should require Dominion Resources Inc., Millstone's parent company, to make public its financial records to prove it needs a change in state law.

"This legislation would carve out a significant part of the market in the region for one company under different terms than anything we could hope for," said John E. Shelk, president and chief executive officer of the Electric Power Supply Association.

Thomas F. Farrell II, chief executive officer of Dominion, told investor analysts on a conference call to discuss fourth-quarter earnings last week that power prices have been "under some pressure."

Referring to the possibility of favorable legislation, Dominion is "hopeful that things will improve there," he said.

Shelk said Farrell's comment is an admission that "this is all about the drag Millstone is having on the corporate parent."

"The Connecticut legislature has proposed a competitive process to reduce retail electric rates, and amid debates like ACORE's FERC filing on subsidy proposals state energy officials would determine whether it is in ratepayers' best interests," Dominion spokesman Kevin Hennessy said.

Several nuclear plants around the country, unable to compete with low natural gas prices, have shut, even as New England weighs transmission proposals like the Maine-Quebec transmission line to access lower-carbon power options.

"There was a trend and a very distressing trend," Reed, D-Branford, said at a public hearing last month.

The plan that failed last year would have allowed nuclear energy to participate in a competitive purchase of renewable or low-carbon electric power, including contentious imports such as the Northern Pass hydropower project that has stirred debate, in a process administered by the state. If Millstone were to be selected, it would be guaranteed a market as natural gas prices decline.

Dan Weekley, vice president of corporate affairs at Dominion, rejected a proposal that the company's financial records be opened for public inspection, saying any information would be irrelevant.

"What is in the customers' and the ultimate ratepayers' best interests?" he asked at the public hearing. "What is the best price for consumers?"

AARP Connecticut said it also will oppose Millstone legislation. A legislative proposal could reclassify power generated by the plant as renewable fuel, allowing Dominion to undercut the cost of other renewable fuels and receive a higher price for its power, AARP said.

Related News

Florida Power & Light Faces Controversy Over Hurricane Rate Surcharge

FPL Hurricane Surcharge explained: restoration costs, Florida PSC review, rate impacts, grid resilience, and transparency after Hurricanes Debby and Helene as FPL funds infrastructure hardening and rapid storm recovery across Florida.

 

Key Points

A fee by Florida Power & Light to recoup hurricane restoration costs, under Florida PSC review for consumer fairness.

✅ Funds Debby and Helene restoration, materials, and crews

✅ Reviewed by Florida PSC for consumer protection and fairness

✅ Raises questions on grid resilience, transparency, and renewables

 

In the aftermath of recent hurricanes, Florida Power & Light (FPL) is under scrutiny as it implements a rate surcharge, alongside proposed rate hikes that span multiple years, to help cover the costs of restoration and recovery efforts. The surcharges, attributed to Hurricanes Debby and Helene, have stirred significant debate among consumers and state regulators, highlighting the ongoing challenges of hurricane preparedness and response in the Sunshine State.

Hurricanes are a regular threat in Florida, and FPL, as the state's largest utility provider, plays a critical role in restoring power and services after such events. However, the financial implications of these natural disasters often leave residents questioning the fairness and necessity of additional charges on their monthly bills. The newly proposed surcharge, which is expected to affect millions of customers, has ignited discussions about the adequacy of the company’s infrastructure investments and its responsibility in disaster recovery.

FPL’s decision to implement a surcharge comes as the company faces rising operational costs due to extensive damage caused by the hurricanes. Restoration efforts are not only labor-intensive but also require significant investment in materials and equipment to restore power swiftly and efficiently. With the added pressures of increased demand for electricity during peak hurricane seasons, utilities like FPL must navigate complex financial landscapes, similar to Snohomish PUD's weather-related rate hikes seen in other regions, while ensuring reliable service.

Consumer advocacy groups have raised concerns over the timing and justification for the surcharge. Many argue that frequent rate increases following natural disasters can strain already financially burdened households, echoing pandemic-related shutoff concerns raised during COVID that heightened energy insecurity. Florida residents are already facing inflationary pressures and rising living costs, making additional surcharges particularly difficult for many to absorb. Critics assert that utility companies should prioritize transparency and accountability, especially when it comes to costs incurred during emergencies.

The Florida Public Service Commission (PSC), which regulates utility rates and services, even as California regulators face calls for action amid soaring bills elsewhere, is tasked with reviewing the surcharge proposal. The commission’s role is crucial in determining whether the surcharge is justified and in line with the interests of consumers. As part of this process, stakeholders—including FPL, consumer advocacy groups, and the general public—will have the opportunity to voice their opinions and concerns. This input is essential in ensuring that the commission makes an informed decision that balances the utility’s financial needs with consumer protection.

In recent years, FPL has invested heavily in strengthening its infrastructure to better withstand hurricane impacts. These investments include hardening power lines, enhancing grid resilience, and implementing advanced technologies for quicker recovery, with public outage prevention tips also promoted to enhance preparedness. However, as storms become increasingly severe due to climate change, the question arises: are these measures sufficient? Critics argue that more proactive measures are needed to mitigate the impacts of future storms and reduce the reliance on post-disaster rate increases.

Additionally, the conversation around climate resilience is becoming increasingly prominent in discussions about energy policy in Florida. As extreme weather events grow more common, utilities are under pressure to innovate and adapt their systems. Some experts suggest that FPL and other utilities should explore alternative strategies, such as investing in decentralized energy resources like solar and battery storage, even as Florida declined federal solar incentives that could accelerate adoption, which could provide more reliable service during outages and reduce the overall strain on the grid.

The issue of rate surcharges also highlights a broader conversation about the energy landscape in Florida. With a growing emphasis on renewable energy and sustainability, consumers are becoming more aware of the environmental impacts of their energy choices, and some recall a one-time Gulf Power bill decrease as an example of short-term relief. This shift in consumer awareness may push utilities like FPL to reevaluate their business models and explore more sustainable practices that align with the public’s evolving expectations.

As FPL navigates the complexities of hurricane recovery and financial sustainability, the impending surcharge serves as a reminder of the ongoing challenges faced by utility providers in a climate-volatile world. While the need for recovery funding is undeniable, the manner in which it is implemented and communicated will be crucial in maintaining public trust and ensuring fair treatment of consumers. As discussions unfold in the coming weeks, all eyes will be on the PSC’s decision and FPL’s approach to balancing recovery efforts with consumer affordability.

 

Related News

View more

Power Co-Op Gets Bond Rating Upgrade After Exiting Kemper Deal

Cooperative Energy bond rating upgrade signals lower debt costs as Fitch lifts GO Zone Bonds to A, reflecting Kemper exit, shift to owned generation, natural gas, and renewable energy for co-op members and borrowing rates.

 

Key Points

Fitch raised Cooperative Energy's GO Zone Bonds to A, cutting debt costs after Kemper exit and shift to natural gas.

✅ Fitch upgrades 2009A GO Zone Bonds from A- to A.

✅ Kemper divestment reduced risk and exposure to coal.

✅ Shift to owned generation, natural gas, renewables lowers costs.

 

Cooperative Energy and its 11 co-op members will see lower debt costs on $35.4 million bond; similar to regional utilities offering one-time bill decreases for customers recently.

Bailing out of its 15 percent ownership stake in Mississippi Power’s Kemper gasification plant, amid debates over coal and nuclear subsidies in federal policy, has helped Hattiesburg-based Cooperative Energy gain a ratings upgrade on a $35.4 million bond issue.

The electric power co-op, which changed its name to Cooperative Energy from South Mississippi Electric Power Association in November, received a ratings upgrade from A- to A for its 2009 2009A Mississippi Business Finance Corporation Gulf Opportunity Zone Bonds, even as other utilities announced bill reductions for customers during 2020.

“This rating upgrade reflects the success of our strategy to move from purchased power to owned generation resources, and from coal to natural gas and renewable energy as clean energy priorities gain traction,” said Cooperative Energy President/CEO Jim Compton in a press release.  “The result for our members is lower borrowing costs and more favorable rates.”

An “A” rating from Fitch designates the bond issue as “near premium quality,” a status noted as utilities adapted to pandemic-era electricity demand trends nationwide.

 

Related News

View more

Kaspersky Lab Discovers Russian Hacker Infrastructure

Crouching Yeti APT targets energy infrastructure with watering-hole attacks, compromising servers to steal credentials and stage intrusions; Kaspersky Lab links the Energetic Bear group to ICS threats across Russia, US, Europe, and Turkey.

 

Key Points

Crouching Yeti APT, aka Energetic Bear, is a threat group that targets energy firms using watering-hole attacks.

✅ Targets energy infrastructure via watering-hole compromises

✅ Uses open-source tools and backdoored sshd for persistence

✅ Scans global servers to stage intrusions and steal credentials

 

A hacker collective known for attacking industrial companies around the world have had some of their infrastructure identified by Russian security specialists.

Kaspersky Lab said that it has discovered a number of servers compromised by the group, belonging to different organisations based in Russia, the US, and Turkey, as well as European countries.

The Russian-speaking hackers, known as Crouching Yeti or Energetic Bear, mostly focus on energy facilities, as seen in reports of infiltration of the U.S. power grid targeting critical infrastructure, for the main purpose of stealing valuable data from victim systems.

 

Hacked servers

Crouching Yeti is described as an advanced persistent threat (APT) group that Kaspersky Lab has been tracking since 2010.

#google#

Kaspersky Lab said that the servers it has compromised are not just limited to industrial companies. The servers were hit in 2016 and 2017 with different intentions. Some were compromised to gain access to other resources or to be used as intermediaries to conduct attacks on other resources.

Others, including those hosting Russian websites, were used as watering holes.

It is a common tactic for Crouching Yeti to utilise watering hole attacks where the attackers inject websites with a link redirecting visitors to a malicious server.

“In the process of analysing infected servers, researchers identified numerous websites and servers used by organisations in Russia, US, Europe, Asia and Latin America that the attackers had scanned with various tools, possibly to find a server that could be used to establish a foothold for hosting the attackers’ tools and to subsequently develop an attack,” said the security specialists in a blog posting.

“The range of websites and servers that captured the attention of the intruders is extensive,” the firm said. “Kaspersky Lab researchers found that the attackers had scanned numerous websites of different types, including online stores and services, public organisations, NGOs, manufacturing, etc.

Kaspersky Lab said that the hackers used publicly available malicious tools, designed for analysing servers, and for seeking out and collecting information. The researchers also found a modified sshd file with a preinstalled backdoor. This was used to replace the original file and could be authorised with a ‘master password’.

“Crouching Yeti is a notorious Russian-speaking group that has been active for many years and is still successfully targeting industrial organisations through watering hole attacks, among other techniques,” explained Vladimir Dashchenko, head of vulnerability research group at Kaspersky Lab ICS CERT.

 

Russian government?

“Our findings show that the group compromised servers not only for establishing watering holes, but also for further scanning, and they actively used open-sourced tools that made it much harder to identify them afterwards,” he said.

“The group’s activities, such as initial data collection, the theft of authentication data, and the scanning of resources, are used to launch further attacks,” said Dashchenko. “The diversity of infected servers and scanned resources suggests the group may operate in the interests of the third parties.”

This may well tie into a similar conclusion from a rival security vendor.

In 2014 CrowdStrike claimed that the ‘Energetic Bear’ group was also tracked in Symantec's Dragonfly research and had been hacking foreign companies on behalf of the Russian state.

The security vendor had said the group had been carrying out attacks on foreign companies since 2012, with reports of breaches at U.S. power plants that underscored the campaign, and there was evidence that these operations were sanctioned by the Russian government.

Last month the United States for the first time publicly accused Russia in a condemnation of Russian grid hacking of attacks against the American power grid.

Symantec meanwhile warned last year of a resurgence in cyber attacks on European and US energy companies, including reports of access to U.S. utility control rooms that could result in widespread power outages.

And last July the UK’s National Cyber Security Centre (NCSC) acknowledged it was investigating a broad wave of attacks on companies in the British energy and manufacturing sectors.

 

Related News

View more

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

China, Cambodia agree to nuclear energy cooperation

Cambodia-CNNC Nuclear Energy MoU advances peaceful nuclear cooperation, human resources development, and Belt and Road ties, targeting energy security and applications in medicine, agriculture, and industry across ASEAN under IAEA-guided frameworks.

 

Key Points

A pact to expand peaceful nuclear tech and skills, boosting Cambodia's energy, healthcare under ASEAN and Belt and Road.

✅ Human resources development and training pipelines

✅ Peaceful nuclear applications in medicine, agriculture, industry

✅ Aligns with IAEA guidance, ASEAN links, Belt and Road goals

 

Cambodia has signed a memorandum of understanding with China National Nuclear Corporation (CNNC) on cooperation in the peaceful use of nuclear energy. The agreement calls for cooperation on human resources development.

The agreement was signed yesterday by CNNC chief accountant Li Jize and Tekreth Samrach, Cambodia's secretary of state of the Office of the Council of Ministers and vice chairman of the Cambodian Commission on Sustainable Development. It was signed during the 14th China-ASEAN Expo and China-ASEAN Business and Investment Summit, being held in Nanning, the capital of China's Guangxi province.

The signing was witnessed by Cambodia's minister of commerce and other government officials, CNNC said.

"This is another important initiative of China National Nuclear Corporation in implementing the 'One Belt, One Road' strategy as China's nuclear program continues to advance and strengthening cooperation with ASEAN countries in international production capacity, laying a solid foundation for follow-up cooperation between the two countries," CNNC said.

One Belt, One Road is China's project to link trade in about 60 Asian and European countries along a new Silk Road, even as Romania ended talks with a Chinese partner in a separate nuclear project.

CNNC noted that Cambodia's current power supply cannot meet its basic electricity needs, while sectors including medicine, agriculture and industry require a "comprehensive upgrade". It said Cambodia has great market potential for nuclear power and nuclear technology applications.

On 14 August, CNNC vice president Wang Jinfeng met with Tin Ponlok, secretary general of Cambodia's National Council for Sustainable Development, to consult on the draft MOU. Cambodia's Ministry of Environment said these discussions focused on human resources in nuclear power for industrial development and environmental protection.

In late August, CNNC president Qian Zhimin visited Cambodia and met Say Chhum, president of the Senate of Cambodia. Qian noted that CNNC will support Cambodia in applying nuclear technologies in industry, agriculture and medical science, thus developing its economy and improving the welfare of the population. Cambodia can start training workers, promoting new energy exploitation as India's nuclear revival progresses in Asia, and infrastructure construction, and increasing its capabilities in scientific research and industrial manufacturing, he said. This will help the country achieve its long-term goal of the peaceful use of nuclear energy, he added.

In November 2015, Russian state nuclear corporation Rosatom signed a nuclear cooperation agreement with Cambodia, focused on a possible research reactor, but with consideration of nuclear power, while KHNP in Bulgaria illustrates parallel developments in Europe. A further cooperation agreement was signed in March 2016, and in May Rosatom and the National Council for Sustainable Development signed memoranda to establish a nuclear energy information centre in Cambodia and set up a joint working group on the peaceful uses of atomic energy.

In mid-2016, Cambodia's Ministry of Industry, Mines and Energy held discussions with CNNC on building a nuclear power plant and establishing the regulatory and legal infrastructure for that, in collaboration with the International Atomic Energy Agency, mirroring IAEA assistance in Bangladesh on nuclear development.

 

Related News

View more

Electric Utilities Plot Bullish Course for EV Charging Infrastructure

EV Charging Infrastructure Incentives are expanding as utilities fund public chargers, Level 2 networks, DC fast charging, grid-managed off-peak programs, and equitable access across Ohio, New Jersey, and Florida to accelerate clean transportation.

 

Key Points

Utility-backed programs funding Level 2 and DC fast chargers, managing grid demand, and expanding EV equity.

✅ Incentives for Level 2 and DC fast public charging stations.

✅ Grid-friendly off-peak charging to balance demand.

✅ Equity targets place chargers in low-income communities.

 

Electric providers in Florida, Ohio and New Jersey recently announced plans to expand electric vehicle charging networks and infrastructure through various incentive programs that could add thousands of new public chargers in the next several years.

Elsewhere, utilities are advancing similar efforts, with Michigan EV programs proposing more than $20 million for charging infrastructure to accelerate adoption.

American Electric Power in Ohio will offer nearly $10 million in incentives toward the build out of 375 EV charging stations throughout the company's service territory, which largely includes Columbus.

Meanwhile, the Public Service Electric and Gas Company (PSE&G), an electric utility provider in New Jersey, has proposed a six-year plan to support the development of nearly 40,000 electric vehicle chargers across a wide range of customers and sectors, said Francis Sullivan, a spokesperson for PSE&G.

And Duke Energy in Florida is installing up to 530 EV charging stations across its service area, as part of its Park and Plug pilot program, which will be making the charging ports available in multifamily housing complexes, workplaces and other high traffic areas.

"We are bringing cleaner energy to Florida through 700 megawatts of new universal solar, and we are helping our customers to bring clean transportation to the state as well," Catherine Stempien, Duke Energy Florida president, said in a statement. "We are committed to providing smarter, cleaner energy alternatives for all our customers."

The project in Ohio is making incentive funding available to government organizations, multifamily housing developments and workplaces, covering from 50 percent to all of the costs. The plan, to be rolled out in the next four years, aims to incentivize the development of 300 level-two chargers and 75 "fast chargers" capable of charging a car's battery in minutes rather than hours.

"I think what's interesting about what we're seeing now in the industry is that electric vehicles and electric vehicle charging are expanding beyond California, and like other Pacific Coast states," said Scott Fisher, vice president of marketing at Greenlots, maker of car chargers and software. Greenlots has been selected as one of the companies to provide the chargers for the AEP project.

California has occupied the lion's share of the electric vehicle market, making up about 5 percent of the cars on the state's highways. The U.S. market sits at about 1.5 percent. However, indications show the EV boom may be set to take off as more models are being rolled out, and prices are making the electric cars more competitive with their gas-powered counterparts. The group Securing America's Future Energy (SAFE) announced the one-millionth electric vehicle is on course to be sold in the United States this month.

In a statement, Ben Prochazka, vice president of the Electrification Coalition, an EV advocacy group, called this "a major milestone and brings us one step closer to reducing our transportation system's dependence on oil. This is a direct result of the tireless efforts by communities and advocates throughout the 'EV ecosystem.'"

In New Jersey, PSE&G's efforts -- which are part of the company's proposed Clean Energy Future program -- will not only focus on building out the charging infrastructure, but structure car recharging to control charging and encourage residents to charge their cars during off-peak times.

"For now, with a modest number of charging stations in the market, it's not a huge problem. But over time, as you're putting in many thousands of these stations, what you want to make sure is that those stations are operating in sync with state power grids, where you don't have people all charging at the same time at like 5 p.m. on a hot summer day," said Fisher.

PSE&G also plans to offer incentives to encourage the development of level-two chargers and DC fast-chargers, as well as "provide grants and incentives for 100 electric school buses and EV charging infrastructure at school districts in PSE&G's service territory," said Sullivan.

"PSE&G will also help fund electrification projects at customer locations such as ports, airports and transit facilities," Sullivan added, via email.

Utilities and transportation planners are also keeping the concept of equity in mind -- to ensure EVs are adopted by more than just the Tesla owner -- and will also focus on placing infrastructure in low-income areas.

"Ten percent of the stations will be in low income areas, defined by census blocks," said Scott Blake, a communications consultant at AEP in Columbus.

Duke Energy also announced 10 percent of the chargers it is installing in Florida will be in "income-qualified communities," according to a company press release.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified