Power Producers Oppose Legislation Helping Millstone Nuclear Plant


CSA Z463 Electrical Maintenance -

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$249
Coupon Price:
$199
Reserve Your Seat Today

Millstone Nuclear Legislation faces opposition from Calpine, Dynegy, NRG, and EPSA, as Connecticut debates market access, ratepayer impacts, renewable and low-carbon procurement, and Dominion transparency amid low natural gas and power prices.

 

Key Points

A Connecticut plan to expand Millstone's market access while balancing ratepayer costs, competition and low carbon goals.

✅ Guarantees market access via low-carbon procurement process

✅ Raises concerns over rates, competition, and transparency

✅ Positions nuclear alongside renewables in Connecticut policy

 

Power producers are set to announce Tuesday their opposition to legislation that would guarantee markets for the Millstone nuclear plant, calling it special treatment for one energy source in Connecticut.

Legislation has yet to be drafted, but it could follow a measure that failed last year, proposing to boost Millstone's access to electricity markets amid a broader market overhaul in Connecticut that lawmakers are weighing.

Calpine Corp., Dynegy, NRG Energy and the Electric Power Supply Association say state assistance to Millstone could drive up energy costs for businesses and residents, echoing arguments that in deregulated electricity markets subsidies are unnecessary and distortive, the companies and trade association say the legislature should require Dominion Resources Inc., Millstone's parent company, to make public its financial records to prove it needs a change in state law.

"This legislation would carve out a significant part of the market in the region for one company under different terms than anything we could hope for," said John E. Shelk, president and chief executive officer of the Electric Power Supply Association.

Thomas F. Farrell II, chief executive officer of Dominion, told investor analysts on a conference call to discuss fourth-quarter earnings last week that power prices have been "under some pressure."

Referring to the possibility of favorable legislation, Dominion is "hopeful that things will improve there," he said.

Shelk said Farrell's comment is an admission that "this is all about the drag Millstone is having on the corporate parent."

"The Connecticut legislature has proposed a competitive process to reduce retail electric rates, and amid debates like ACORE's FERC filing on subsidy proposals state energy officials would determine whether it is in ratepayers' best interests," Dominion spokesman Kevin Hennessy said.

Several nuclear plants around the country, unable to compete with low natural gas prices, have shut, even as New England weighs transmission proposals like the Maine-Quebec transmission line to access lower-carbon power options.

"There was a trend and a very distressing trend," Reed, D-Branford, said at a public hearing last month.

The plan that failed last year would have allowed nuclear energy to participate in a competitive purchase of renewable or low-carbon electric power, including contentious imports such as the Northern Pass hydropower project that has stirred debate, in a process administered by the state. If Millstone were to be selected, it would be guaranteed a market as natural gas prices decline.

Dan Weekley, vice president of corporate affairs at Dominion, rejected a proposal that the company's financial records be opened for public inspection, saying any information would be irrelevant.

"What is in the customers' and the ultimate ratepayers' best interests?" he asked at the public hearing. "What is the best price for consumers?"

AARP Connecticut said it also will oppose Millstone legislation. A legislative proposal could reclassify power generated by the plant as renewable fuel, allowing Dominion to undercut the cost of other renewable fuels and receive a higher price for its power, AARP said.

Related News

Electricity distributors warn excess solar power in network could cause blackouts, damage infrastructure

Australian Rooftop Solar Grid Constraints are driving debates over voltage rise, export limits, inverter curtailment, DER integration, and network reliability, amid concerns about localized blackouts, infrastructure protection, tariff reform, and battery storage adoption.

 

Key Points

Limits on solar exports to curb voltage rise, protect equipment, and keep the distribution grid reliable.

✅ Voltage rise triggers transformer protection and local outages.

✅ Export limits and smart inverter curtailment manage midday backfeed.

✅ Tariff reform and DER orchestration defer costly network upgrades.

 

With almost 1.8 million Australian homes and businesses relying on power from rooftop solar panels, there is a fight brewing over the impact of solar energy on the national electricity grid.

Electricity distributors are warning that as solar uptake continues to increase, there is a risk excess solar power could flow into the network, elevating power outage risks, causing blackouts and damaging infrastructure.

But is it the network businesses that are actually at risk, as customers turn away from centrally produced electricity?

This is what three different parties have to say:

Andrew Dillon of the network industry peak body, Energy Networks Australia (ENA), told 7.30 the way customers are charged for electricity has to change, or expensive grid upgrades to poles and wires will be needed to keep solar customers on the grid.

"The engineering reality is once we get too much solar in a certain space it does start to cause technical issues," he said.

"If there is too much energy coming back up the system in the middle of the day, it can cause frequency voltage disturbances in the system, which can lead to transformers tripping off to protect themselves from being damaged and that will cause localised blackouts.

"There are pockets of the grid already where we have significant penetration and we are starting to see technical issues."

However, he acknowledges that excess solar power has yet to cause any blackouts, or damage electricity infrastructure.

"I don't buy that at all," he said.

"It can be that in some suburbs or parts of suburbs a high penetration of solar on the point of use can raise voltage, these issues generally can be dealt with quickly.

"The critical issue is think where you are getting that perspective from. It is from an industry whose underlying market is threatened by customers doing it for themselves through peer-to-peer energy models. So, think with some critical insight to these claims."

He said when too many people rely on solar it threatens the very business model of the companies that own Australia's poles and wires.

"When the customers use the network less to buy centrally produced electricity, they ship less product," he said.

"When they ship less product, their underlying business is undermined, they need to charge more to the customers left and that leads to what has been called a death spiral.

"We are seeing rapid reductions in consumption at the point of use per household."

But Mr Dillon denies the distributors are acting out of self-interest.

"I absolutely reject that claim," he said.

"[What] we, as networks, have an interest in is running a safe network, running a reliable network, enabling the transition to a low carbon future and doing all that while keeping costs down as much as possible."

Solar installers say the networks are holding back business

Around Australia the poles and wires companies can decide which solar systems can connect to the grid.

Small systems can connect automatically, but in some areas, those wanting a larger system can find themselves caught up in red tape.

The vice-president of the Australian Solar Council, Glen Morris, said these limitations were holding back solar installation businesses and preventing the take-up of new battery storage technology.

"If you've already got a five kilowatt system, your house is full as far as the network is concerned," Mr Morris said.

"You go to add a battery, that's another five kilowatts and so they say no you're already full … so you can't add storage to your solar system."

The powers that be are stumbling in the dark to prevent a looming energy crisis, as the grid seeks to balance renewables' hidden challenges and competing demands.

Mr Morris also said the networks had the capacity to solve the problem of any excess solar flows into the grid, and infrastructure upgrades were not necessary.

"They already have the capability to turn off your solar invertor whenever they feel like it," he said.

"If they choose to connect that functionality, it's there in the inverter. The customer already has it."

ENA has acknowledged there is frustration with rooftop system size limits in the solar industry.

"What we are seeing is solar installers and others slightly frustrated at different requirements for different networks and sometimes they are unclear on the reasons for that," Mr Dillon said.

"Limitations are in place across the country to keep the lights on and make sure the network stays safe and we don't have sudden rushes of people connecting to the grid that causes outage issues."

But Mr Mountain is unconvinced, calling the limitations "somewhat spurious".

"The published, documented, critically reviewed analyses are few and far between, so it is very easy for engineers to make these arguments and those in policy circles only have so much tolerance for the detail," he said.

 

Related News

View more

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

Electricity sales in the U.S. actually dropped over the past 7 years

US Electricity Sales Decline amid population growth and GDP gains, as DOE links reduced per capita consumption to energy efficiency, warmer winters, appliances, and bulbs, while hotter summers and rising AC demand may offset savings.

 

Key Points

US electricity sales fell 3% since 2010 despite population and GDP growth, driven by efficiency gains and warmer winters.

✅ DOE links drops to efficiency and warmer winters

✅ Per capita residential use fell about 7% since 2010

✅ Rising AC demand may offset winter heating savings

 

Since 2010, the United States has grown by 17 million people, and the gross domestic product (GDP) has increased by $3.6 trillion. Yet in that same time span, electricity sales in the United States actually declined by 3%, according to data released by the U.S. Department of Energy (DOE), even as electricity prices rose at a 41-year pace nationwide.

The U.S. decline in electricity sales is remarkable given that the U.S. population increased by 5.8% in that same time span. This means that per capita electricity use fell even more than that; indeed, the Department of Energy pegs residential electricity sales per capita as having declined by 7%, even as inflation-adjusted residential bills rose 5% in 2022 nationwide.

There are likely multiple reasons for this decline in electricity sales. Department of Energy analysts suggest that, at least in part, it is due to increased adoption of energy-efficient appliances and bulbs, like compact fluorescents. Indeed, the DOE notes that there is a correlation between consumer spending on “energy efficiency” and a reduction in per capita electricity sales, while utilities invest more in delivery infrastructure to modernize the grid.

Yet the DOE also notes that states with a greater increase in warm weather days had a corresponding decrease in electricity sales, as milder weather can reduce power demand across years. In southern states, the effect was most dramatic: for instance, from 2010 to 2016, Florida had a 56% decrease in cold weather days that would require heating and as a result, saw a 9% decrease in per capita electricity sales.

The moral is that warm winters save on electricity. But if global temperatures continue to rise, and summers become hotter, too, this decrease in winter heating spending may be offset by the increased need to run air conditioning in the summer, and given how electricity and natural gas prices interact, overall energy costs could shift. Indeed, it takes far more energy to cool a room than it does to heat it, for reasons related to the basic laws of thermodynamics. 

 

Related News

View more

After alert on Russian hacking, a renewed focus on protecting U.S. power grid

U.S. Power Grid Cybersecurity combats DHS-FBI flagged threats to energy infrastructure, with PJM Interconnection using ICS/SCADA segmentation, phishing defenses, incident response, and resilience exercises against Russia-linked attacks and pipeline intrusions.

 

Key Points

Strategies, controls, and training that protect U.S. electric infrastructure from cyber threats and disruptions.

✅ ICS/SCADA network segmentation and zero-trust architecture

✅ Employee phishing drills and incident response playbooks

✅ DOE-led grid exercises and threat intelligence sharing

 

The joint alert from the FBI and Department of Homeland Security last month warning that Russia was hacking into critical U.S. energy infrastructure, as outlined in six essential reads on Russian hacks from recent coverage, came as no surprise to the nation’s largest grid operator, PJM Interconnection.

“You will never stop people from trying to get into your systems. That isn’t even something we try to do.” said PJM Chief Information Officer, Tom O’Brien. “People will always try to get into your systems. The question is, what controls do you have to not allow them to penetrate? And how do you respond in the event they actually do get into your system?”

PJM is the regional transmission organization for 65 million people, covering 13 states, including Pennsylvania, and Washington D.C.

On a rainy day in early April, about 10 people were working inside PJM’s main control center, outside Philadelphia, closely monitoring floor-to-ceiling digital displays showing real-time information from the electric power sector throughout PJM’s territory in the mid-Atlantic and parts of the midwest, amid reports that hackers accessed control rooms at U.S. utilities.

#google#

Donnie Bielak, a reliability engineering manager, was overseeing things from his office, perched one floor up.

“This is a very large, orchestrated effort that goes unnoticed most of the time,” Bielak said. “That’s a good thing.”

But the industry certainly did take notice in late 2015 and early 2016, when hackers successfully disrupted power to the Ukrainian grid. The outages lasted a few hours and affected about 225,000 customers. It was the first publicly-known case of a cyber attack causing major disruptions to a power grid. It was widely blamed on Russia.

One of the many lessons of the Ukraine attacks was a reminder to people who work on critical infrastructure to keep an eye out for odd communications.

“A very large percentage of entry points to attacks are coming through emails,” O’Brien said. “That’s why PJM, as well as many others, have aggressive phishing campaigns. We’re training our employees.”

O’Brien doesn’t want to get into specifics about how PJM deals with cyber threats. But one common way to limit exposure is by having separate systems: For example, industrial controls in a power plant are not connected to corporate business networks, a separation underscored after breaches at U.S. power plants prompted reviews across the sector.

Since 2011, North American grid operators and government agencies have also done large, security exercises every two years. Thousands of people practice how they’d respond to a coordinated physical or cyber event, including rising substation attacks that highlight resilience gaps.

So far, nothing like that has happened in the U.S. It’s possible, but not likely, according to Robert M. Lee, a former military intelligence analyst, who runs the industrial cybersecurity firm Dragos.

“The more complex the system, the harder it is to have a scalable attack,” said Lee, who co-authored a report analyzing the Ukraine attacks. “If you wanted to take out a power generation station– that isn’t the most complex thing. Let’s say you cause an hour of outage. But now you want to cause two months of outages? That’s an exponential increase in effort required.”

For example, he said, it would very difficult for hackers to knock out power to the entire east coast for a long time. But briefly disrupting a major city is easier. That’s the sort of thing that keeps him up at night.

“I worry about an adversary getting into, maybe, Washington D.C.’s portion of the grid, taking down power for 30 minutes,” he said.

The Department of Energy is creating a new office focused on cybersecurity and emergency response, following the U.S. government’s condemnation of power grid hacking by Russia.

Deterrence may be one reason why there has not yet been a major attack on the U.S. grid, said John MacWilliams, a former senior DOE official who’s now a fellow at Columbia University’s Center on Global Energy Policy.

“That’s obviously an act of war,” he said. “We have the capability of responding either through cyber mechanisms or kinetic military.”

In the meantime, small-scale incidents keep happening.

This spring, another cyber attack targeted natural gas pipelines. Four companies shut down their computer systems, just in case, but they say no service was disrupted.

 

Related News

View more

Coal CEO blasts federal agency's decision on power grid

FERC Rejects Trump Coal Plan, denying subsidies for coal-fired and nuclear plants as energy policy shifts toward natural gas and renewables, citing no grid reliability threat and warning about electricity prices and market impacts.

 

Key Points

FERC unanimously rejected subsidies for coal and nuclear plants, finding no grid reliability risk from retirements.

✅ Unanimous FERC vote rejects coal and nuclear compensation

✅ Cites no threat to grid reliability from plant retirements

✅ Opponents warned subsidies would distort power markets and prices

 

A decision by an independent energy agency to reject the Trump administration’s electricity pricing plan to bolster the coal industry could lead to more closures of coal-fired power plants and the loss of thousands of jobs, a top coal executive said Tuesday.

Robert Murray, CEO of Ohio-based Murray Energy Corp., called the action by the Federal Energy Regulatory Commission “a bureaucratic cop-out” that will raise the cost of electricity and jeopardize the reliability and security of the nation’s electric grid.

“While FERC commissioners sit on their hands and refuse to take the action directed by Energy Secretary Rick Perry and President Donald Trump, the decommissioning of more coal-fired and nuclear plants could result, further jeopardizing the reliability, resiliency and security of America’s electric power grids,” Murray said. “It will also raise the cost of electricity for all Americans.”

The five-member energy commission voted unanimously Monday to reject Trump’s plan to reward nuclear and coal-fired power plants for adding reliability to the nation’s power grid. The plan would have made the plants eligible for billions of dollars in government subsidies and help reverse a tide of bankruptcies and loss of market share suffered by the once-dominant coal industry as utilities' shift to natural gas and renewable energy continues.

The Republican-controlled commission said there’s no evidence that any past or planned retirements of coal-fired power plants pose a threat to reliability of the nation’s electric grid.

Murray disputed that and said the recent cold snap that hit the East Coast showed coal’s value, as power users in the Southeast were asked to cut back on electricity usage because of a shortage of natural gas. “If it were not for the electricity generated by our nation’s coal-fired and nuclear power plants, we would be experiencing massive brownouts risk and blackouts in this country,” he said.

Murray Energy is the largest privately owned coal company in the United States, with mining operations in Ohio, Illinois, Kentucky, Utah and West Virginia. Robert Murray, a Trump friend and political supporter, has been pushing hard for federal assistance for his industry. The Associated Press reported last year that Murray asked the Trump administration to issue an emergency order protecting coal-fired power plants from closing. Murray warned that failure to act could cause thousands of coal miners to be laid off and force his largest customer, Ohio-based FirstEnergy Solutions, into bankruptcy.

Perry ultimately rejected Murray’s request, but later asked energy regulators to boost coal and nuclear plants as the administration moved to replace the Clean Power Plan with a more limited approach.

The plan drew widespread opposition from business and environmental groups that frequently disagree with each other, even as some coal and business interests backed the EPA's Affordable Clean Energy rule in court.

Jack Gerard, president and CEO of the American Petroleum Institute, said Tuesday that the Trump plan was “far too narrow” in its focus on power sources that maintain a 90-day fuel supply.

API, the largest lobbying group for oil and gas industry, supports coal and other energy sources, Gerard said, “but we should not put our eggs in an individual basket defined as a 90-day fuel supply (while) unnecessarily intervening in private markets.”

 

Related News

View more

Hydro One wants to spend another $6-million to redesign bills

Hydro One Bill Redesign Spending sparks debate over Ontario Energy Board regulation, rate applications, privatization, and digital billing upgrades, as surveys cite confusing invoices under the Fair Hydro Plan for residential, commercial, and industrial customers.

 

Key Points

$15M project to simplify Hydro One bills, upgrade systems, and improve digital billing for commercial customers.

✅ $9M spent; $6M proposed for C&I and large-account changes.

✅ OEB to rule amid rate application and privatization scrutiny.

✅ Survey: 40% of customers struggled to understand bills.

 

Ontario's largest and recently privatized electricity utility has spent $9-million to redesign bills and is proposing to spend an additional $6-million on the project.

Hydro One has come under fire for spending since the Liberal government sold more than half of the company, notably for its CEO's $4.5-million pay.

Now, the NDP is raising concerns with the $15-million bill redesign expense contained in a rate application from the formerly public utility.

"I don't think the problem we face is a bill that people can't understand, I think the problem is rates that are too high," said energy critic Peter Tabuns. "Fifteen million dollars seems awfully expensive to me."

But Hydro One says a 2016 survey of its customers indicated about 40 per cent had trouble understanding their bills.

Ferio Pugliese, the company's executive vice-president of customer care and corporate affairs, said the redesign was aimed at giving customers a simpler bill.

"The new format is a format that when tested and put in front of our customers has been designed to give customers the four or five salient items they want to see on their bill," he said.

About $9-million has already gone into redesigning bills, mostly for residential customers, Pugliese said. Cosmetic changes to bills account for about 25 per cent of the cost, with the rest of the money going toward updating information systems and improving digital billing platforms, he said.

The additional $6-million Hydro One is looking to spend would go toward bill changes mostly for its commercial, industrial and large distribution account customers.

Energy Minister Glenn Thibeault noted in a statement that the Ontario Energy Board has yet to decide on the expense, but he suggested he sees the bill redesign as necessary alongside legislation to lower electricity rates introduced by the province.

"With Ontarians wanting clearer bills that are easier to understand, Hydro One's bill redesign project is a necessary improvement that will help customers," he wrote.

"Reductions from the Fair Hydro Plan (the government's 25 per cent cut to bills last year) are important information for both households and businesses, and it's our job to provide clear, helpful answers whenever possible."

The OEB recently ordered Hydro One to lower a rate increase it had been seeking for this year to 0.2 per cent down from 4.8 per cent.

The regulator also rejected a Hydro One proposal to give shareholders all of the tax savings generated by the IPO in 2015 when the Liberal government first began partially privatizing the utility. The OEB instead mandated shareholders receive 62 per cent of the savings while ratepayers receive the remaining 38 per cent.

 

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.