REV Campus Challenge Receives $2 MILLION in Funding


NFPA 70e Training - Arc Flash

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$199
Coupon Price:
$149
Reserve Your Seat Today

REV Campus Challenge Funding supports energy efficiency, clean energy planning, and renewable power on New York campuses via NYSERDA grants, cutting greenhouse gas emissions and advancing the 50 percent by 2030 Clean Energy Standard.

 

Key Points

REV Campus Challenge Funding provides NYSERDA grants to hire consultants, improve campus efficiency, and cut emissions.

✅ NYSERDA-backed funds for third-party energy planning

✅ Helps campuses reduce greenhouse gas emissions

✅ Advances New York's 50% renewables by 2030

 

The REV Campus Challenge announced in August 2016 recently has gained funding support to aid more colleges and universities in becoming more energy efficient, with technologies like battery energy storage supporting campus performance. Governor Cuomo announced these funds, which are made available by NYSSGC member New York State Energy Research and Development Authority (NYSERDA), during the Southern Tier Regional Sustainable Development and Collaborative Governance Conference, as New York expands EV infrastructure through initiatives like Tesla's NYC charging network to support broader clean energy adoption. REV Campus Challenge members can apply to for funding to hire a third-party energy consultant to help with energy planning, drawing on models like the low-income housing microgrid in Brooklyn, and decreasing greenhouse gas emissions. REV Campus Challenge members are helping New York drive clean energy activities and, alongside other states' clean vehicle initiatives progress, reach its Clean Energy Standard of having 50 percent of the State’s electricity come from renewable energy resources by 2030.

Beyond New York, pilots of vehicle-to-grid integration illustrate how transportation electrification can support renewable targets.

 

Related News

Related News

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

EU Smart Meters Spur Growth in the Customer Analytics Market

EU Smart Meter Analytics integrates AMI data with grid edge platforms, enabling back-office efficiency, revenue assurance, and customer insights via cloud and PaaS solutions, while system integration cuts costs and improves utility performance.

 

Key Points

EU smart meter analytics uses AMI data and cloud to improve utility performance, revenue assurance, and outcomes.

✅ AMI underpins grid edge analytics and utility IT/OT integration

✅ Cloud and PaaS reduce costs and scale data-driven applications

✅ Focus shifts from meter rollout to back-office and revenue analytics

 

Europe's investment in smart meters has begun to open up the market for analytics that benefit both utilities and customers.

Two new reports from GTM Research demonstrate the substantial investment in both advanced metering infrastructure (AMI) and specific customer analytics segments -- the first report analyzes the progress of AMI deployment in Europe, while the second is a comprehensive assessment of analytics use cases, including AI in utility operations, enabled by or interacting with AMI.

The Third Energy Package mandated EU member states to perform a cost-benefit analysis to evaluate the economic viability of deploying smart meters and broader grid modernization costs across member states. Two-thirds of the member states found there was a net positive result, while seven members found negative or inconclusive results.

“The mandate spurred AMI deployment in the EU, but all member states are deploying some AMI. Even without an overall positive cost-benefit outcome, utilities found pockets of customers where there is a positive business case for AMI,” said Paulina Tarrant, research associate at GTM Research and lead author of “Racing to 2020: European Policy, Deployment and Market Share Primer.”

Annual AMI contracting peaked in 2013 -- two years after the mandate -- with 29 million contracted that year. Today, 100 million meters have been contracted overall. As member states reach their respective targets, the AMI market will cool in Europe and spending on analytics and applications will continue to ramp up, aligning with efforts to invest in smarter infrastructure across the sector, Tarrant noted.

Between 2017 and 2021, more than $30 billion will be spent on utility back-office and revenue-assurance analytics in the EU, reflecting the shift toward the digital grid architecture, according to GTM Research’s Grid Edge Customer Utility Analytics Ecosystems: Competitive Analysis, Forecasts and Case Studies.

The report examines the broad landscape of customer analytics showing how AMI interacts with the larger IT/OT environment of a utility.

“The benefits of AMI expand beyond revenue assurance -- in fact, AMI represents the backbone of many customer utility analytics and grid edge solutions,” said Timotej Gavrilovic, author of the Grid Edge Customer Utility Ecosystems report.

Integration is key, according to the report.

“Technology providers are integrating data sets, solutions and systems and partnering with others to provide a one-stop shop serving broad utility needs, increasing efficiencies and reducing costs,” Gavrilovic said. “Cloud-based deployments and platform-as-a-service offerings are becoming commonplace, creating an opportunity for utilities to balance the cost versus performance tradeoff to optimize their analytics systems and applications.”

A diverse array of customer analytics applications is a critical foundation for demonstrating the positive cost-benefit of AMI.

“Advanced analytics and applications are key to ensuring that AMI investments provide a positive return after smart meters are initiated,” said Tarrant. “Improved billing and revenue assurance was not enough everywhere to show customer benefit -- these analytics packages will leverage the distributed network infrastructure, including advanced inverters used with distributed energy resources, and subsequent increased data access, uniting the electricity markets of the EU.”

 

Related News

View more

Despite delays, BC Hydro says crews responded well to 'atypical' storm

BC Hydro Ice Storm Response to Fraser Valley power outages highlights freezing rain impacts, round the clock crews, infrastructure challenges, and climate change risks across the Lower Mainland during winter weather and restoration efforts.

 

Key Points

A plan for freezing rain events that prioritizes safety, rapid repairs, and clear communication to restore power.

✅ Prioritizes hazards, critical loads, and public safety first

✅ Deploys crews, contractors, and equipment across affected areas

✅ Addresses climate risks without costly undergrounding expansion

 

Call it the straw that broke the llama's back.

The loss of power during recent Fraser Valley ice storms meant Jennifer Quick, who lives on a Mission farm, had no running water, couldn't cook with appliances and still had to tend to a daughter sick with stomach flu.

As if that wasn't enough, she had to endure the sight of her shivering llamas.

"I brought them outside at one point and when I brought them back in, they had icicles on their fur," she said, adding the animals stayed in the warmth of their barn from then on.

For three and a half days, Quick and her family were among more than 160,000 BC Hydro customers in the Fraser Valley left in the dark after ice storms whipped through the region.

BC Hydro expects to get all customers back online Tuesday, five days after the storm hit.

And with another storm possibly on the horizon, the utility is defending its response to the treacherous weather, noting that windstorm power outages can be widespread.

BC Hydro spokesperson Mora Scott said the utility has a "best in class" storm response system, similar to PG&E winter storm prep in the U.S.

"In a typical storm situation we normally have 95 per cent of our customers back up within 24 hours. Ice storms are different and obviously this was an atypical storm for us," she said.

Scott said that in this case, the utility got power back on for 75 per cent of customers within 24 hours. It took the work of 450 employees called in from around B.C., working around the clock, a mobilization echoed by Sudbury Hydro crews after a storm, she said.

The work was complicated by trees falling near crews, icy roads, low visibility and even substations so frozen over the ice had to be melted off with blowtorches.

She said that in the long term, BC Hydro has no plans to make changes to how it responds to extreme ice storms or how infrastructure is built.

"Seeing ice build up in the Lower Mainland like this is a rare event," she said. "So to build for extremes like that probably doesn't make a lot of sense."

 

Climate change will bring storms

But CBC meteorologist Johanna Wagstaffe said that might not always be the case as climate change continues to impact our planet.

"The less severe winter events, like light snowfall, will happen less often," she said. "But the disruptive events — like last week's storm — will actually happen more often and we are already seeing this shift happen."

Marc Eliesen, a former CEO of BC Hydro in the early 1990s, said the utility needs to keep that in mind when planning for worst-case scenarios.

"This [storm] is a condition characteristic of the weather in the east, particularly in Ontario and Quebec, where freezing rain outages in Quebec are more common, which is organized to deal with freezing rain and heavy snow on the lines," he said. "This is a new phenomenon for British Columbia."

Eliesen questions whether BC Hydro has adequate equipment and crew training to deal with ice storms if they become more frequent, pointing to Hydro One storm restoration in Ontario as a comparison.

 

'Always something we can learn'

Scott disagrees with some of Eliesen's points.

She said some of the crews called in to deal with the recent storm come from northern B.C. and the Interior and have plenty of experience with snow.

"There's always something we can learn in every major storm situation," she said.

The idea of putting power lines underground was raised by some CBC readers and listeners, but Scott said running underground lines is five to 10 times the cost of running lines on pole, so it is done sparingly. Besides, equipment like substations and transmission lines need to be kept aboveground.

Meanwhile, Wagstaffe said that beginning Thursday, wintry weather could return to the Lower Mainland.

 

Related News

View more

U.S. Nonprofit Invests $250M in Electric Trucks for California Ports

California Ports Electric Truck Leasing accelerates zero-emission logistics, cutting diesel pollution at Los Angeles and Long Beach. A $250 million nonprofit plan funds heavy-duty EVs and charging infrastructure to improve air quality and community health.

 

Key Points

A nonprofit's $250M plan to lease EV trucks at LA/Long Beach ports to cut diesel emissions and improve air quality.

✅ $250M lease program for heavy-duty EVs at LA/Long Beach ports

✅ Cuts diesel emissions; improves air quality in nearby communities

✅ Requires robust charging infrastructure and OEM partnerships

 

In a significant move towards sustainable transportation, a prominent U.S. nonprofit has announced plans to invest $250 million in leasing electric trucks for operations at California ports. This initiative aims to reduce air pollution and promote greener logistics, responding to the urgent need for environmentally friendly solutions in the transportation sector.

Addressing Environmental Concerns

California’s ports, particularly the Port of Los Angeles and the Port of Long Beach, are among the busiest in the United States. However, they also contribute significantly to air pollution due to the heavy reliance on diesel trucks for cargo transport. These ports are essential for the economy, facilitating trade and commerce, but the environmental toll is considerable. Diesel emissions are linked to respiratory issues and other health problems in nearby communities, which often bear the brunt of pollution.

The nonprofit's investment in electric trucks is a critical step towards mitigating these environmental challenges. By transitioning to electric vehicles (EVs), the project aims to significantly cut emissions from port operations, contributing to California's broader goals of reducing greenhouse gas emissions and improving air quality.

The Scale of the Initiative

This ambitious initiative involves leasing a fleet of electric trucks that will operate within the ports and surrounding areas. The $250 million investment is expected to facilitate the acquisition of hundreds of electric vehicles, which will replace conventional diesel trucks used for cargo transport. This fleet will help demonstrate the viability and effectiveness of electric trucks in heavy-duty applications, paving the way for broader adoption.

The plan includes partnerships with established electric truck manufacturers, such as the Volvo VNR Electric platform, and local logistics companies to ensure seamless integration of these vehicles into existing operations. By collaborating with industry leaders, the initiative seeks to establish a model that can be replicated in other major logistics hubs across the country.

Economic and Community Benefits

The introduction of electric trucks is expected to yield multiple benefits, not only in terms of environmental impact but also economically. As these trucks begin operations, and as other fleets adopt electric mail trucks, they will create jobs within the green technology sector, from manufacturing to maintenance and charging infrastructure development. The project is anticipated to stimulate local economies, providing new opportunities in communities that have historically been disadvantaged by pollution.

Moreover, the initiative is poised to enhance public health. By reducing diesel emissions, the nonprofit aims to improve air quality for residents living near the ports, and emerging research links EV adoption to fewer asthma-related ER visits in local communities. This could lead to decreased healthcare costs associated with pollution-related illnesses, benefiting both the community and the healthcare system.

Challenges Ahead

While the initiative is promising, challenges remain. The successful implementation of electric trucks at scale requires a robust charging infrastructure capable of supporting the significant power needs of a large fleet. Additionally, the transition from diesel to electric vehicles involves significant upfront costs, even with leasing arrangements. Ensuring that logistics companies can manage these costs effectively will be crucial for the project's success.

Furthermore, electric trucks currently face limitations in terms of range and payload capacity compared to their diesel counterparts. Continued advancements in battery technology and infrastructure development will be necessary to fully realize the potential of electric vehicles in heavy-duty applications.

The Bigger Picture

This investment in electric trucks aligns with broader national and global efforts to combat climate change. As governments and organizations commit to reducing carbon emissions, initiatives like this one represent crucial steps toward achieving sustainability goals, and ports worldwide are also piloting complementary technologies like hydrogen-powered cranes to decarbonize cargo handling.

California has set ambitious targets for reducing greenhouse gas emissions, including a mandate for all new trucks to be zero-emission by 2045. The nonprofit’s investment not only supports these goals, amid ongoing debates over funding priorities in the state, but also serves as a pilot program that could inform future policies and investments in clean transportation.

The $250 million investment in electric trucks for California ports marks a significant milestone in the push for sustainable transportation solutions. By addressing the urgent need for cleaner logistics, this initiative stands to benefit the environment, public health, and the economy. As the project unfolds, it will be closely watched as a potential model for similar efforts across the country and beyond, with developments such as the all-electric berth at London Gateway illustrating parallel advances, highlighting the critical intersection of innovation, sustainability, and community well-being in the modern logistics landscape.

 

Related News

View more

Manitoba Hydro hikes face opposition as hearings begin

Manitoba Hydro rate hikes face public hearings over electricity rates, utility bills, and debt, with impacts on low-income households, Indigenous communities, and Winnipeg services amid credit rating pressure and rising energy costs.

 

Key Points

Manitoba Hydro seeks 7.9% annual increases to stabilize finances and debt, impacting electricity costs for households.

✅ Proposed hikes: 7.9% yearly through 2023/24

✅ Driven by debt, credit rating declines, rising interest

✅ Disproportionate impact on low-income and Indigenous communities

 

Hearings began Monday into Manitoba Hydro’s request for consecutive annual rate hikes of 7.9 per cent.  The crown corporation is asking for the steep hikes to commence April 1, 2018.

The increases would continue through 2023/2024, under a multi-year rate plan before dropping to what Hydro calls “sustainable” levels.

Patti Ramage, legal counsel for Hydro, said while she understands no one welcomes the “exceptional” rate increases, the company is dealing with exceptional circumstances.

It’s the largest rate increase Hydro has ever asked for, though a scaled-back increase was discussed later, saying rising debt and declining credit ratings are affecting its financial stability.

President and CEO Kelvin Shepherd said Hydro is borrowing money to fund its interest payments, and acknowledged that isn’t an effective business model.

Hydro’s application states that it will be spending up to 63 per cent of its revenue on paying financial expenses if the current request for rate hikes is not approved.

If it does get the increase it wants, that number could shrink to 45 per cent – which Ramage says is still quite high, but preferable to the alternative.

She cited the need to take immediate action to fix Hydro’s finances instead of simply hoping for the best.

“The worst thing we can do is defer action… that’s why we need to get this right,” Ramage said.

A number of intervenors presented varying responses to Hydro’s push for increased rates, with many focusing on how the hikes would affect Manitobans with lower incomes.

Senwung Luk spoke on behalf of the Assembly of Manitoba Chiefs, and said the proposed rates would hit First Nations reserves particularly hard.

He noted that 44.2 per cent of housing on reserves in the province needs significant improvement, which means electricity use tends to be higher to compensate for the lower quality of infrastructure.

Luk says this problem is compounded by the higher rates of poverty in Indigenous populations, with 76 per cent of children on reserves in Manitoba living below the poverty line.

If the increase goes forward, he said the AMC hopes to see a reduced rate for those living on reserves, despite a recent appeal court ruling on such pricing.

Byron Williams, speaking on behalf of the Consumers Coalition, said the 7.9 per cent increase unreasonably favours the interests of Hydro, and is unjustly biased against virtually everyone else.

In Saskatchewan, the NDP criticized an SaskPower 8 per cent rate hike as unfair to customers, highlighting regional concerns.

Williams said customers using electric space heating would be more heavily targeted by the rate increase, facing an extra $13.14 a month as opposed to the $6.88 that would be tacked onto the bills of those not using electric space heating.

Williams also called Hydro’s financial forecasts unreliable, bringing the 7.9 per cent figure into question.

Lawyer George Orle, speaking for the Manitoba Keewatinowi Okimakanak, said the proposed rate hikes would “make a mockery” of the sacrifices made by First Nations across the province, given that so much of Hydro’s infrastructure is on Indigenous land.

The city of Winnipeg also spoke out against the jump, saying property taxes could rise or services could be cut if the hikes go ahead to compensate for increased, unsustainable electricity costs.

In British Columbia, a BC Hydro 3 per cent increase also moved forward, drawing attention to affordability.

A common theme at the hearing was that Hydro’s request was not backed by facts, and that it was heading towards fear-mongering.

Manitoba Hydro’s CEO begged to differ as he plead his case during the first hearing of a process that is expected to take 10 weeks.

 

Related News

View more

After alert on Russian hacking, a renewed focus on protecting U.S. power grid

U.S. Power Grid Cybersecurity combats DHS-FBI flagged threats to energy infrastructure, with PJM Interconnection using ICS/SCADA segmentation, phishing defenses, incident response, and resilience exercises against Russia-linked attacks and pipeline intrusions.

 

Key Points

Strategies, controls, and training that protect U.S. electric infrastructure from cyber threats and disruptions.

✅ ICS/SCADA network segmentation and zero-trust architecture

✅ Employee phishing drills and incident response playbooks

✅ DOE-led grid exercises and threat intelligence sharing

 

The joint alert from the FBI and Department of Homeland Security last month warning that Russia was hacking into critical U.S. energy infrastructure, as outlined in six essential reads on Russian hacks from recent coverage, came as no surprise to the nation’s largest grid operator, PJM Interconnection.

“You will never stop people from trying to get into your systems. That isn’t even something we try to do.” said PJM Chief Information Officer, Tom O’Brien. “People will always try to get into your systems. The question is, what controls do you have to not allow them to penetrate? And how do you respond in the event they actually do get into your system?”

PJM is the regional transmission organization for 65 million people, covering 13 states, including Pennsylvania, and Washington D.C.

On a rainy day in early April, about 10 people were working inside PJM’s main control center, outside Philadelphia, closely monitoring floor-to-ceiling digital displays showing real-time information from the electric power sector throughout PJM’s territory in the mid-Atlantic and parts of the midwest, amid reports that hackers accessed control rooms at U.S. utilities.

#google#

Donnie Bielak, a reliability engineering manager, was overseeing things from his office, perched one floor up.

“This is a very large, orchestrated effort that goes unnoticed most of the time,” Bielak said. “That’s a good thing.”

But the industry certainly did take notice in late 2015 and early 2016, when hackers successfully disrupted power to the Ukrainian grid. The outages lasted a few hours and affected about 225,000 customers. It was the first publicly-known case of a cyber attack causing major disruptions to a power grid. It was widely blamed on Russia.

One of the many lessons of the Ukraine attacks was a reminder to people who work on critical infrastructure to keep an eye out for odd communications.

“A very large percentage of entry points to attacks are coming through emails,” O’Brien said. “That’s why PJM, as well as many others, have aggressive phishing campaigns. We’re training our employees.”

O’Brien doesn’t want to get into specifics about how PJM deals with cyber threats. But one common way to limit exposure is by having separate systems: For example, industrial controls in a power plant are not connected to corporate business networks, a separation underscored after breaches at U.S. power plants prompted reviews across the sector.

Since 2011, North American grid operators and government agencies have also done large, security exercises every two years. Thousands of people practice how they’d respond to a coordinated physical or cyber event, including rising substation attacks that highlight resilience gaps.

So far, nothing like that has happened in the U.S. It’s possible, but not likely, according to Robert M. Lee, a former military intelligence analyst, who runs the industrial cybersecurity firm Dragos.

“The more complex the system, the harder it is to have a scalable attack,” said Lee, who co-authored a report analyzing the Ukraine attacks. “If you wanted to take out a power generation station– that isn’t the most complex thing. Let’s say you cause an hour of outage. But now you want to cause two months of outages? That’s an exponential increase in effort required.”

For example, he said, it would very difficult for hackers to knock out power to the entire east coast for a long time. But briefly disrupting a major city is easier. That’s the sort of thing that keeps him up at night.

“I worry about an adversary getting into, maybe, Washington D.C.’s portion of the grid, taking down power for 30 minutes,” he said.

The Department of Energy is creating a new office focused on cybersecurity and emergency response, following the U.S. government’s condemnation of power grid hacking by Russia.

Deterrence may be one reason why there has not yet been a major attack on the U.S. grid, said John MacWilliams, a former senior DOE official who’s now a fellow at Columbia University’s Center on Global Energy Policy.

“That’s obviously an act of war,” he said. “We have the capability of responding either through cyber mechanisms or kinetic military.”

In the meantime, small-scale incidents keep happening.

This spring, another cyber attack targeted natural gas pipelines. Four companies shut down their computer systems, just in case, but they say no service was disrupted.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified