Opinion: Would we use Site C's electricity?


Site C Dam Construction

Protective Relay Training - Basic

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today

Site C Dam Electricity Demand underscores B.C.'s decarbonization path, enabling electrification of EVs, heat pumps, and industry, aligning with BC Hydro forecasts and 2030/2050 GHG targets to supply dependable, renewable baseload power.

 

Key Points

Projected clean power tied to Site C, driven by B.C. electrification to meet 2030 and 2050 greenhouse gas targets.

✅ Aligns with 25-30% by 2030 and 55-70% by 2050 GHG cuts

✅ Supports EVs, heat pumps, and industrial electrification

✅ Provides dependable baseload alongside efficiency gains

 

There are valid reasons not to build the Site C dam. There are also valid reasons to build it. One of the latter is the rapid increase in clean electricity needed to reduce B.C.’s greenhouse gas emissions from burning natural gas, gasoline, diesel and other harmful fossil fuel products.

Although former Premier Christy Clark casually avoided near-term emissions targets, Prime Minister Justin Trudeau has set Canadian targets for both 2030 and 2050, and cleaning up Canada's electricity is critical to meeting them. Studies by my research group at Simon Fraser University and other independent analysts show that B.C.’s cost-effective contribution to these national targets requires us to reduce our emissions 25 to 30 per cent by 2030 and 55 to 70 per cent by 2050 — an energy evolution involving, among other things, a much greater use of electricity in buildings, vehicles and industry.

Recent submissions to the Site C hearing have offered widely different estimates of B.C.’s electricity demand in the decade after the project’s completion in 2025, some arguing the dam’s output will be completely surplus to domestic need for years and perhaps decades, even though improved B.C.-Alberta grid links could help balance regional demand. Some of this variation in demand forecasts is understandable. Industrial demand is especially difficult to predict, dependent as it is on global economic conditions and shifting trade relations. And there are legitimate uncertainties about B.C. Hydro’s ability to reduce electricity demand by promoting efficient products and behaviour through its Power Smart program. But some of the forecasts appear to be deliberate exaggerations, designed to support fixed positions for or against Site C.

Our university-based research team models the energy system changes required to meet national and provincial emissions targets, and we have been comparing estimates of the electricity demand implications. These estimates are produced by academics, as well as by key institutions like B.C. Hydro, the National Energy Board, and the governments of Canada and B.C.

Most electricity forecasts for B.C., including the most recent by B.C. Hydro, do not assume that B.C. reduces its greenhouse gas emissions by 25 to 30 per cent by 2030 and 55 to 70 per cent by 2050. When we adjust Hydro’s forecast for just the low end of these targets, we find that in its latest, August 30, submission to the Site C hearing, which followed the premier’s over-budget go-ahead on the project, Hydro has underestimated the demand for its electricity by about three terawatt-hours in 2025, four in 2030 and 10 in 2035. Hydro’s forecast indicates that it will need the five terawatt-hours from Site C. Our research shows that even if Hydro’s demand forecast is too high, appropriate climate policy nationally and in B.C. will absorb all the electricity the dam can produce soon after its completion.

B.C. Hydro does not forecast electricity demand to 2050. But, studies by us and others show that B.C. electricity demand will be almost double today’s levels if we are to reduce emissions by 55 to 70 per cent, even amid a documented risk of missing the 2050 target, in just over three decades while our population, economy, buildings and equipment grow significantly. Most mid- and small-sized vehicles will be electric. Most buildings will be well insulated and heated by electric resistance or electric heat-pumps, either individually or via district heating systems. And many low temperature industrial applications will be electric.

Aggressive efforts to promote energy efficiency will make an important contribution, such that energy demand will not grow nearly as fast as the economy. But it is delusional to think that humans will stop using energy. Even climate policy scenarios in which we assume unprecedented success with energy efficiency show dramatic increases in the consumption of electricity, this being the most favoured zero-emission form of energy as a replacement for planet-destroying gasoline and natural gas.

The completion of the Site C dam is a complicated and challenging societal choice, and delay-related cost risks highlighted by the premier underscore the stakes. There is unbiased evidence and argument supporting either completion or cancellation. But let’s stick to the unbiased evidence. In the case of our 2030 and 2050 greenhouse gas reduction targets, such evidence shows that we must substantially increase our generation of dependable electricity. If the Site C dam is built, and if we are true to our climate goals, all its electricity will be used in B.C. soon after completion.

Mark Jaccard is a professor of sustainable energy in the School of Resource and Environmental Management at Simon Fraser University.

 

Related News

Related News

Hong Kong to expect electricity bills to rise 1 or 2 per cent

Hong Kong Electricity Tariff Increase reflects a projected 1-2% rise as HK Electric and CLP Power shift to cleaner fuel and natural gas, expand gas-fired units and LNG terminals, and adjust the fuel clause charge.

 

Key Points

An expected 1-2% 2018 rise from cleaner fuel, natural gas projects, asset growth, and shrinking fuel cost surpluses.

✅ Expected 1-2% rise amid cleaner fuel and gas shift

✅ Fuel clause charge and asset expansion pressure prices

✅ HK Electric and CLP Power urged to use surpluses prudently

 

Hong Kong customers have been asked to expect higher electricity bills next year, as seen with BC Hydro rate increases in Canada, with a member of a government panel on energy policy anticipating an increase in tariffs of one or two per cent.

The environment minister, Wong Kam-sing, also hinted they should be prepared to dig deeper into their pockets for electricity, as debates over California electric bills illustrate, in the wake of power companies needing to use more expensive but cleaner fuel to generate power in the future.

HK Electric supplies power to Hong Kong Island, Lamma Island and Ap Lei Chau. Photo: David Wong

The city’s two power companies, HK Electric and CLP Power, are to brief lawmakers on their respective annual tariff adjustments for 2018, amid Ontario electricity price pressures drawing international attention, at a Legislative Council economic development panel meeting on Tuesday.

HK Electric supplies electricity to Hong Kong Island and neighbouring Lamma Island and Ap Lei Chau, while CLP Power serves Kowloon and the New Territories, including Lantau Island.

Wong said on Monday: “We have to appreciate that when we use cleaner fuel, there is a need for electricity tariffs to keep pace. I believe it is the hope of mainstream society to see a low-carbon and healthier environment.”

Secretary for the Environment Wong Kam-sing believes most people desire a low-carbon environment. Photo: Sam Tsang

But he declined to comment on how much the tariffs might rise.

World Green Organisation chief executive William Yu Yuen-ping, also a member of the Energy Advisory Committee, urged the companies to better use their “overflowing” surpluses in their fuel cost recovery accounts.

Tariffs are comprised of two components: a basic amount reflecting a company’s operating costs and investments, and the fuel clause charge, which is based on what the company projects it will pay for fuel for the year.

William Yu of World Green Organisation says the companies should use their surpluses more carefully. Photo: May Tse

Critics have claimed the local power suppliers routinely overestimate their fuel costs and amass huge surpluses.

In recent years, the two managed to freeze or cut their tariffs thanks to savings from lower fuel costs. Last year, HK Electric offered special rebates to its customers, which saw its tariff drop by 17.2 per cent. CLP Power froze its own charge for 2017.

Yu said the two companies should use the surpluses “more carefully” to stabilise tariffs.

Rise after fall in Hong Kong electricity use linked to subsidies

“We estimate a big share of the surplus has been used up and so the honeymoon period is over.”

Based on his group’s research, Yu believed the tariffs would increase by one or two per cent.

Economist and fellow committee member Billy Mak Sui-choi said the expansion of the power companies’ fixed asset bases, such as building new gas-fired units and offshore liquefied natural gas terminals, a pattern reflected in Nova Scotia's 14% rate hike recently approved by regulators, would also cause tariffs to rise.

To fight climate change and improve air quality, the government has pledged to cut carbon intensity by between 50 and 60 per cent by 2020. Officials set a target of boosting the use of natural gas for electricity generation to half the total fuel mix from 2020.

Both power companies are privately owned and monitored by the government through a mutually agreed scheme of control agreements, akin to oversight seen under the UK energy price cap in other jurisdictions. These require the firms to seek government approval for their development plans, including their projected basic tariff levels.

At present, the permitted rate of return on their net fixed assets is 9.99 per cent. The deals are due to expire late next year.

Earlier this year, officials reached a deal with the two companies on the post-2018 scheme, settling on a 15-year term. The new agreements slash their permitted rate of return to 8 per cent.

 

Related News

View more

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

CAA Quebec Shines at the Quebec Electric Vehicle Show

CAA Quebec Electric Mobility spotlights EV adoption, charging infrastructure, consumer education, and sustainability, highlighting policy collaboration, model showcases, and greener transport solutions from the Quebec Electric Vehicle Show to accelerate climate goals and practical ownership.

 

Key Points

CAA Quebec's program advancing EV education, charging network advocacy, and collaboration for sustainable transport.

✅ Consumer education demystifying EV range and charging

✅ Hands-on showcases of new EV models and safety tech

✅ Advocacy for faster, wider public charging networks

 

The Quebec Electric Vehicle Show has emerged as a significant event for the automotive industry, drawing attention from enthusiasts, industry experts, and consumers alike, similar to events like Everything Electric in Vancouver that amplify public interest. This year, CAA Quebec took center stage, showcasing its commitment to promoting electric vehicles (EVs) and sustainable transportation solutions.

A Strong Commitment to Electric Mobility

CAA Quebec’s participation in the show underscores its dedication to facilitating the transition to electric mobility. With the rising concerns over climate change and the increasing popularity of electric vehicles, as Canada pursues ambitious EV targets nationwide, organizations like CAA are pivotal in educating the public about the benefits and practicality of EV ownership. At the show, CAA Quebec offered valuable insights into the latest trends in electric mobility, including advancements in technology, charging infrastructure, and the overall impact on the environment.

Educational Initiatives

One of the highlights of CAA Quebec's presentation was its focus on education. The organization hosted informative sessions aimed at demystifying electric vehicles for the average consumer. Many potential buyers are still apprehensive about making the switch from traditional gasoline-powered cars. CAA Quebec addressed common misconceptions about EVs, such as range anxiety and charging challenges, providing attendees with the knowledge they need to make informed decisions.

The sessions included expert panels discussing the future of electric vehicles, with insights from automotive industry leaders and environmental experts, and addressing debates such as experts questioning Quebec's EV push that shape policy discussions.

Showcasing Innovative EVs

CAA Quebec also showcased a variety of electric vehicles from different manufacturers, giving attendees the chance to see and experience the latest models firsthand, similar to a popular EV event in Regina that drew strong community interest. This hands-on approach allowed potential buyers to explore the features of EVs, from performance metrics to safety technologies. By allowing consumers to interact with the vehicles, CAA Quebec helped to bridge the gap between interest and action, encouraging more people to consider an electric vehicle as their next purchase.

Addressing Infrastructure Challenges

A significant barrier to the widespread adoption of electric vehicles remains the availability of charging infrastructure. CAA Quebec took the opportunity to address this critical issue during the show. The organization has been actively involved in advocating for improved charging networks across Quebec, emphasizing the need for more public charging stations and faster charging options, where examples like BC's Electric Highway illustrate how corridor charging can ease long-distance travel concerns.

Collaboration with Government and Industry

CAA Quebec’s efforts are bolstered by collaboration with both government and industry stakeholders. The organization is working closely with provincial authorities to develop policies that support the growth of electric vehicle infrastructure. Additionally, partnerships with automotive manufacturers are paving the way for more sustainable practices in vehicle production and distribution, and utilities exploring vehicle-to-grid pilots in Nova Scotia to enhance grid resilience.

A Bright Future for Electric Vehicles

The Quebec Electric Vehicle Show highlighted not only the current state of electric mobility but also its promising future, reflected in growing interest in EVs in southern Alberta and other provinces. With the support of organizations like CAA Quebec, consumers are becoming more aware of the benefits of electric vehicles. This awareness is crucial as Quebec aims to achieve its ambitious climate goals, including a significant reduction in greenhouse gas emissions.

CAA Quebec's presence at the Quebec Electric Vehicle Show exemplifies its leadership in promoting electric vehicles and sustainable transportation. By focusing on education, showcasing innovative models, and advocating for improved infrastructure, CAA Quebec is helping to pave the way for a greener future. As the automotive landscape continues to evolve, the insights and initiatives presented at the show will play a vital role in guiding consumers towards embracing electric mobility. The future is electric, and with organizations like CAA Quebec at the helm, that future looks promising.

 

Related News

View more

Four Major Types of Substation Integration Service Providers Account for More than $1 Billion in Annual Revenues

Substation Automation Services help electric utilities modernize through integration, EPC engineering, protective relaying, communications and security, with CAPEX and OPEX insights and a growing global market for third-party providers worldwide rapidly.

 

Key Points

Engineering, integration, and EPC support modernizing utility substations with protection, control, and secure communications

✅ Third-party engineering, EPC, and OEM services for utilities

✅ Integration of multi-vendor devices and platforms

✅ Focus on relays, communications, security, CAPEX-OPEX

 

The Newton-Evans Research Company has released additional findings from its newly published four volume research series entitled: The World Market for Substation Automation and Integration Programs in Electric Utilities: 2017-2020.

This report series has observed four major types of professional third-party service providers that assist electric utilities with substation modernization. These firms range from (1) smaller local or regional engineering consultancies with substation engineering resources to (2) major global participants in EPC work, to (3) the engineering services units of manufacturers of substation devices and platforms, to (4) substation integration specialist firms that source and integrate devices from multiple manufacturers for utility and industrial clients, and often provide substation automation training to support implementation.

2016 Global Share Estimates for Professional Services Providers of Electric Power Substation Integration and Automation Activities

The North American market report (Volume One) includes survey participation from 65 large and midsize US and Canadian electric utilities while the international market report (Volume Two) includes survey participation from 32 unique utilities in 20 countries around the world. In addition to the baseline survey questions, the report includes 2017 substation survey findings on four additional specific topics: communications issues; protective relaying trends; security topics and the CAPEX/OPEX outlook for substation modernization.

Volume Three is the detailed market synopsis and global outlook for substation automation and integration:

Section One of the report provides top-level views of substation modernization, automation & integration and the emerging digital grid landscape, and a narrative market synopsis.

Section Two provides mid-year 2017 estimates of population, electric power generation capacity, transmission substations, including the 2 GW UK substation commissioning as a benchmark, and primary MV distribution substations for more than 120 countries in eight world regions. Information on substation related expenditures and spending for protection and control for each major world region and several major countries is also provided.

Section Three provides information on NGO funding resources for substation modernization among developing nations.

Section Four of this report volume includes North American market share estimates for 2016 shipments of many substation automation-related devices and equipment, such as trends in the digital relay market for utilities.

The Supplier Profiles report (Volume Four) provides descriptive information on the substation modernization offerings of more than 90 product and services companies, covering leading players in the transformer market as well.

 

Related News

View more

Dewa in China to woo renewable energy firms

Dewa-China Renewable Energy Partnership advances solar, clean energy, smart grid, 5G, cloud, and Big Data, linking Dewa with Hanergy and Huawei for R&D, smart meters, demand management, and resilient network infrastructure.

 

Key Points

A Dewa collaboration with Hanergy and Huawei to co-develop solar, smart grid, 5G, cloud, and resilient utility networks.

✅ MoU expands solar PV and distributed generation in Dubai and China

✅ Smart grid R&D: smart meters, demand response, self-healing networks

✅ 5G, cloud, and Big Data enable secure, scalable smart city services

 

A high-level delegation from Dubai Electricity and Water Authority (Dewa) recently visited China in bid to build closer ties with Chinese renewable and clean energy and smart services and smart grid companies, amid broader power grid modernization in Asia trends.

The team led by the managing director and CEO Saeed Mohammed Al Tayer visited the headquarters of Hanergy Holding Group, one of the largest international companies in alternative and renewable energy, in Beijing.

The visit complements the co-operation between Dewa and Hanergy after the signing MoU between the two sides last May, said a statement from Dewa.

The two parties focused on renewable and clean energy and its development, including efforts to integrate solar into the grid through advanced programs, and enhancing opportunities for joint investment.

Al Tayer also visited the Exhibition Hall and Exhibition Centre of the Hanergy Clean Energy Exhibition spread over a 7,000-sq-m area at the Beijing Olympic Park.

He discussed solar power technologies and applications, which included integrated photovoltaic panels and their distribution on the roofs of industrial and residential buildings, residential and mobile power systems, micro-grid installations in remote regions, solar-powered vehicles, and various elements of the exhibition.

Al Tayer and the accompanying delegation later visited the Beijing R&D Centre, which is one of Huaweis largest research institutes, known for Huawei smart grid initiatives across global markets, that employs over 12,000 people. The centre covers the latest pre-5G solutions, Cloud, Big Data, as well as vertical solutions for a smart and safe city.

"The visit is part of a joint venture with Huawei, which includes R&D projects to develop smart network infrastructures and various mechanisms and technologies, aligned with recent U.S. grid improvement funding initiatives, such as smart meters for electricity and water services, energy demand management, and self-recovery mechanisms from errors and disasters," he added.

 

Related News

View more

Kaspersky Lab Discovers Russian Hacker Infrastructure

Crouching Yeti APT targets energy infrastructure with watering-hole attacks, compromising servers to steal credentials and stage intrusions; Kaspersky Lab links the Energetic Bear group to ICS threats across Russia, US, Europe, and Turkey.

 

Key Points

Crouching Yeti APT, aka Energetic Bear, is a threat group that targets energy firms using watering-hole attacks.

✅ Targets energy infrastructure via watering-hole compromises

✅ Uses open-source tools and backdoored sshd for persistence

✅ Scans global servers to stage intrusions and steal credentials

 

A hacker collective known for attacking industrial companies around the world have had some of their infrastructure identified by Russian security specialists.

Kaspersky Lab said that it has discovered a number of servers compromised by the group, belonging to different organisations based in Russia, the US, and Turkey, as well as European countries.

The Russian-speaking hackers, known as Crouching Yeti or Energetic Bear, mostly focus on energy facilities, as seen in reports of infiltration of the U.S. power grid targeting critical infrastructure, for the main purpose of stealing valuable data from victim systems.

 

Hacked servers

Crouching Yeti is described as an advanced persistent threat (APT) group that Kaspersky Lab has been tracking since 2010.

#google#

Kaspersky Lab said that the servers it has compromised are not just limited to industrial companies. The servers were hit in 2016 and 2017 with different intentions. Some were compromised to gain access to other resources or to be used as intermediaries to conduct attacks on other resources.

Others, including those hosting Russian websites, were used as watering holes.

It is a common tactic for Crouching Yeti to utilise watering hole attacks where the attackers inject websites with a link redirecting visitors to a malicious server.

“In the process of analysing infected servers, researchers identified numerous websites and servers used by organisations in Russia, US, Europe, Asia and Latin America that the attackers had scanned with various tools, possibly to find a server that could be used to establish a foothold for hosting the attackers’ tools and to subsequently develop an attack,” said the security specialists in a blog posting.

“The range of websites and servers that captured the attention of the intruders is extensive,” the firm said. “Kaspersky Lab researchers found that the attackers had scanned numerous websites of different types, including online stores and services, public organisations, NGOs, manufacturing, etc.

Kaspersky Lab said that the hackers used publicly available malicious tools, designed for analysing servers, and for seeking out and collecting information. The researchers also found a modified sshd file with a preinstalled backdoor. This was used to replace the original file and could be authorised with a ‘master password’.

“Crouching Yeti is a notorious Russian-speaking group that has been active for many years and is still successfully targeting industrial organisations through watering hole attacks, among other techniques,” explained Vladimir Dashchenko, head of vulnerability research group at Kaspersky Lab ICS CERT.

 

Russian government?

“Our findings show that the group compromised servers not only for establishing watering holes, but also for further scanning, and they actively used open-sourced tools that made it much harder to identify them afterwards,” he said.

“The group’s activities, such as initial data collection, the theft of authentication data, and the scanning of resources, are used to launch further attacks,” said Dashchenko. “The diversity of infected servers and scanned resources suggests the group may operate in the interests of the third parties.”

This may well tie into a similar conclusion from a rival security vendor.

In 2014 CrowdStrike claimed that the ‘Energetic Bear’ group was also tracked in Symantec's Dragonfly research and had been hacking foreign companies on behalf of the Russian state.

The security vendor had said the group had been carrying out attacks on foreign companies since 2012, with reports of breaches at U.S. power plants that underscored the campaign, and there was evidence that these operations were sanctioned by the Russian government.

Last month the United States for the first time publicly accused Russia in a condemnation of Russian grid hacking of attacks against the American power grid.

Symantec meanwhile warned last year of a resurgence in cyber attacks on European and US energy companies, including reports of access to U.S. utility control rooms that could result in widespread power outages.

And last July the UK’s National Cyber Security Centre (NCSC) acknowledged it was investigating a broad wave of attacks on companies in the British energy and manufacturing sectors.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified