Smart Grid Solutions Using ProFieldMETER™ Technology


Protective Relay Training - Basic

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$699
Coupon Price:
$599
Reserve Your Seat Today

SGS AMI Deployment delivers Advanced Metering Infrastructure for Con Edison and O&R, installing smart meters, gas modules, and a territory-wide communications network with ProFieldMETER across NYC, Westchester, and northern New Jersey.

 

Key Points

SGS project deploying smart meters and AMI network for Con Edison and O&R across NYC, Westchester, and northern NJ.

✅ 3.9M electric and 1.3M gas meters across NY and NJ

✅ ProFieldMETER and AMI communications network integration

✅ Con Edison and O&R territories: NYC, Westchester, northern NJ

 

Smart Grid Solutions (SGS) has been awarded a contract by Consolidated Edison Company of NY, Inc. and Orange & Rockland (O&R) Utilities, Inc., both regulated operating companies of Consolidated Edison, Inc. (NYSE: ED), to install electric smart meters and gas smart modules.

The contract also includes building the supporting communications network for territory-wide coverage using SGS's industry-leading ProFieldMETER technology, a key component alongside digital transformer stations in modern grids.

The contract is part of a landmark plan to deploy Advanced Metering Infrastructure (AMI) across Consolidated Edison Inc.'s service territory, which covers New York City and Westchester County, and Orange & Rockland's service territory, which includes those two New York counties, as well as adjacent parts of northern New Jersey. Approximately 3.9 million electric meters and 1.3 million gas meters are involved.

Similar smart city efforts, such as Spokane's grid-out approach, illustrate how modern grid deployments support broader urban innovation.

"Being selected for the largest, most comprehensive smart grid project awarded since SGS introduced its innovative ProField technology cements its premier position in the smart grid industry," says Shashi Gupta, Chief Executive Officer of SGS.

"We felt that the technology being offered by SGS would integrate seamlessly into our existing processes and help ensure that safety and productivity remain a priority for Consolidated Edison," says Tom Magee, General Manager of the AMI Implementation team.

 

Related News

Related News

Four Major Types of Substation Integration Service Providers Account for More than $1 Billion in Annual Revenues

Substation Automation Services help electric utilities modernize through integration, EPC engineering, protective relaying, communications and security, with CAPEX and OPEX insights and a growing global market for third-party providers worldwide rapidly.

 

Key Points

Engineering, integration, and EPC support modernizing utility substations with protection, control, and secure communications

✅ Third-party engineering, EPC, and OEM services for utilities

✅ Integration of multi-vendor devices and platforms

✅ Focus on relays, communications, security, CAPEX-OPEX

 

The Newton-Evans Research Company has released additional findings from its newly published four volume research series entitled: The World Market for Substation Automation and Integration Programs in Electric Utilities: 2017-2020.

This report series has observed four major types of professional third-party service providers that assist electric utilities with substation modernization. These firms range from (1) smaller local or regional engineering consultancies with substation engineering resources to (2) major global participants in EPC work, to (3) the engineering services units of manufacturers of substation devices and platforms, to (4) substation integration specialist firms that source and integrate devices from multiple manufacturers for utility and industrial clients, and often provide substation automation training to support implementation.

2016 Global Share Estimates for Professional Services Providers of Electric Power Substation Integration and Automation Activities

The North American market report (Volume One) includes survey participation from 65 large and midsize US and Canadian electric utilities while the international market report (Volume Two) includes survey participation from 32 unique utilities in 20 countries around the world. In addition to the baseline survey questions, the report includes 2017 substation survey findings on four additional specific topics: communications issues; protective relaying trends; security topics and the CAPEX/OPEX outlook for substation modernization.

Volume Three is the detailed market synopsis and global outlook for substation automation and integration:

Section One of the report provides top-level views of substation modernization, automation & integration and the emerging digital grid landscape, and a narrative market synopsis.

Section Two provides mid-year 2017 estimates of population, electric power generation capacity, transmission substations, including the 2 GW UK substation commissioning as a benchmark, and primary MV distribution substations for more than 120 countries in eight world regions. Information on substation related expenditures and spending for protection and control for each major world region and several major countries is also provided.

Section Three provides information on NGO funding resources for substation modernization among developing nations.

Section Four of this report volume includes North American market share estimates for 2016 shipments of many substation automation-related devices and equipment, such as trends in the digital relay market for utilities.

The Supplier Profiles report (Volume Four) provides descriptive information on the substation modernization offerings of more than 90 product and services companies, covering leading players in the transformer market as well.

 

Related News

View more

Kaspersky Lab Discovers Russian Hacker Infrastructure

Crouching Yeti APT targets energy infrastructure with watering-hole attacks, compromising servers to steal credentials and stage intrusions; Kaspersky Lab links the Energetic Bear group to ICS threats across Russia, US, Europe, and Turkey.

 

Key Points

Crouching Yeti APT, aka Energetic Bear, is a threat group that targets energy firms using watering-hole attacks.

✅ Targets energy infrastructure via watering-hole compromises

✅ Uses open-source tools and backdoored sshd for persistence

✅ Scans global servers to stage intrusions and steal credentials

 

A hacker collective known for attacking industrial companies around the world have had some of their infrastructure identified by Russian security specialists.

Kaspersky Lab said that it has discovered a number of servers compromised by the group, belonging to different organisations based in Russia, the US, and Turkey, as well as European countries.

The Russian-speaking hackers, known as Crouching Yeti or Energetic Bear, mostly focus on energy facilities, as seen in reports of infiltration of the U.S. power grid targeting critical infrastructure, for the main purpose of stealing valuable data from victim systems.

 

Hacked servers

Crouching Yeti is described as an advanced persistent threat (APT) group that Kaspersky Lab has been tracking since 2010.

#google#

Kaspersky Lab said that the servers it has compromised are not just limited to industrial companies. The servers were hit in 2016 and 2017 with different intentions. Some were compromised to gain access to other resources or to be used as intermediaries to conduct attacks on other resources.

Others, including those hosting Russian websites, were used as watering holes.

It is a common tactic for Crouching Yeti to utilise watering hole attacks where the attackers inject websites with a link redirecting visitors to a malicious server.

“In the process of analysing infected servers, researchers identified numerous websites and servers used by organisations in Russia, US, Europe, Asia and Latin America that the attackers had scanned with various tools, possibly to find a server that could be used to establish a foothold for hosting the attackers’ tools and to subsequently develop an attack,” said the security specialists in a blog posting.

“The range of websites and servers that captured the attention of the intruders is extensive,” the firm said. “Kaspersky Lab researchers found that the attackers had scanned numerous websites of different types, including online stores and services, public organisations, NGOs, manufacturing, etc.

Kaspersky Lab said that the hackers used publicly available malicious tools, designed for analysing servers, and for seeking out and collecting information. The researchers also found a modified sshd file with a preinstalled backdoor. This was used to replace the original file and could be authorised with a ‘master password’.

“Crouching Yeti is a notorious Russian-speaking group that has been active for many years and is still successfully targeting industrial organisations through watering hole attacks, among other techniques,” explained Vladimir Dashchenko, head of vulnerability research group at Kaspersky Lab ICS CERT.

 

Russian government?

“Our findings show that the group compromised servers not only for establishing watering holes, but also for further scanning, and they actively used open-sourced tools that made it much harder to identify them afterwards,” he said.

“The group’s activities, such as initial data collection, the theft of authentication data, and the scanning of resources, are used to launch further attacks,” said Dashchenko. “The diversity of infected servers and scanned resources suggests the group may operate in the interests of the third parties.”

This may well tie into a similar conclusion from a rival security vendor.

In 2014 CrowdStrike claimed that the ‘Energetic Bear’ group was also tracked in Symantec's Dragonfly research and had been hacking foreign companies on behalf of the Russian state.

The security vendor had said the group had been carrying out attacks on foreign companies since 2012, with reports of breaches at U.S. power plants that underscored the campaign, and there was evidence that these operations were sanctioned by the Russian government.

Last month the United States for the first time publicly accused Russia in a condemnation of Russian grid hacking of attacks against the American power grid.

Symantec meanwhile warned last year of a resurgence in cyber attacks on European and US energy companies, including reports of access to U.S. utility control rooms that could result in widespread power outages.

And last July the UK’s National Cyber Security Centre (NCSC) acknowledged it was investigating a broad wave of attacks on companies in the British energy and manufacturing sectors.

 

Related News

View more

Manitoba Hydro hikes face opposition as hearings begin

Manitoba Hydro rate hikes face public hearings over electricity rates, utility bills, and debt, with impacts on low-income households, Indigenous communities, and Winnipeg services amid credit rating pressure and rising energy costs.

 

Key Points

Manitoba Hydro seeks 7.9% annual increases to stabilize finances and debt, impacting electricity costs for households.

✅ Proposed hikes: 7.9% yearly through 2023/24

✅ Driven by debt, credit rating declines, rising interest

✅ Disproportionate impact on low-income and Indigenous communities

 

Hearings began Monday into Manitoba Hydro’s request for consecutive annual rate hikes of 7.9 per cent.  The crown corporation is asking for the steep hikes to commence April 1, 2018.

The increases would continue through 2023/2024, under a multi-year rate plan before dropping to what Hydro calls “sustainable” levels.

Patti Ramage, legal counsel for Hydro, said while she understands no one welcomes the “exceptional” rate increases, the company is dealing with exceptional circumstances.

It’s the largest rate increase Hydro has ever asked for, though a scaled-back increase was discussed later, saying rising debt and declining credit ratings are affecting its financial stability.

President and CEO Kelvin Shepherd said Hydro is borrowing money to fund its interest payments, and acknowledged that isn’t an effective business model.

Hydro’s application states that it will be spending up to 63 per cent of its revenue on paying financial expenses if the current request for rate hikes is not approved.

If it does get the increase it wants, that number could shrink to 45 per cent – which Ramage says is still quite high, but preferable to the alternative.

She cited the need to take immediate action to fix Hydro’s finances instead of simply hoping for the best.

“The worst thing we can do is defer action… that’s why we need to get this right,” Ramage said.

A number of intervenors presented varying responses to Hydro’s push for increased rates, with many focusing on how the hikes would affect Manitobans with lower incomes.

Senwung Luk spoke on behalf of the Assembly of Manitoba Chiefs, and said the proposed rates would hit First Nations reserves particularly hard.

He noted that 44.2 per cent of housing on reserves in the province needs significant improvement, which means electricity use tends to be higher to compensate for the lower quality of infrastructure.

Luk says this problem is compounded by the higher rates of poverty in Indigenous populations, with 76 per cent of children on reserves in Manitoba living below the poverty line.

If the increase goes forward, he said the AMC hopes to see a reduced rate for those living on reserves, despite a recent appeal court ruling on such pricing.

Byron Williams, speaking on behalf of the Consumers Coalition, said the 7.9 per cent increase unreasonably favours the interests of Hydro, and is unjustly biased against virtually everyone else.

In Saskatchewan, the NDP criticized an SaskPower 8 per cent rate hike as unfair to customers, highlighting regional concerns.

Williams said customers using electric space heating would be more heavily targeted by the rate increase, facing an extra $13.14 a month as opposed to the $6.88 that would be tacked onto the bills of those not using electric space heating.

Williams also called Hydro’s financial forecasts unreliable, bringing the 7.9 per cent figure into question.

Lawyer George Orle, speaking for the Manitoba Keewatinowi Okimakanak, said the proposed rate hikes would “make a mockery” of the sacrifices made by First Nations across the province, given that so much of Hydro’s infrastructure is on Indigenous land.

The city of Winnipeg also spoke out against the jump, saying property taxes could rise or services could be cut if the hikes go ahead to compensate for increased, unsustainable electricity costs.

In British Columbia, a BC Hydro 3 per cent increase also moved forward, drawing attention to affordability.

A common theme at the hearing was that Hydro’s request was not backed by facts, and that it was heading towards fear-mongering.

Manitoba Hydro’s CEO begged to differ as he plead his case during the first hearing of a process that is expected to take 10 weeks.

 

Related News

View more

Russian hackers had 'hundreds of victims' as they infiltrated U.S. power grid

Russian cyberattacks on U.S. power grid exposed DHS warnings: Dragonfly/Energetic Bear breached control rooms, ICS networks, and could trigger blackouts via switch manipulation, phishing, and malware, threatening critical infrastructure and utility operations nationwide.

 

Key Points

State-backed breaches of utility ICS and control rooms enabled potential switch manipulation and blackouts.

✅ DHS: Dragonfly/Energetic Bear breached utility networks

✅ Access reached control rooms and ICS for switch control

✅ Ongoing campaign via phishing, malware, lateral movement

 

Russian hackers for a state-sponsored organization invaded hundreds of control rooms of U.S. electric utilities that could have led to blackouts, a new report says.

The group, known as Dragonfly or Energetic Bear, infiltrated networks of U.S. utilities as part of an effort that is likely ongoing, Department of Homeland Security officials told the Wall Street Journal.

Jonathan Home, chief of industrial-control-system analysis for DHS, said the hackers “got to the point where they could have thrown switches” and upset power flows.

Although the agency did not disclose which companies were impacted, the officials at a briefing Monday said that there were “hundreds of victims” including breaches at power plants across the U.S., and that some companies may not be aware that hackers infiltrated their networks yet.

According to experts, Russia has been preparing for such attacks for some time now, prompting a renewed focus on protecting the grid among utilities and policymakers.

“They’ve been intruding into our networks and are positioning themselves for a limited or widespread attack,” said former Deputy Assistant Defense Secretary Michael Carpenter, now senior director at the Penn Biden Center at the University of Pennsylvania, per the Wall Street Journal. “They are waging a covert war on the West.”

Earlier this year, the Trump administration claimed Russia had staged a power grid hacking campaign against the U.S. energy grid and other U.S. infrastructure.

The report comes after President Trump told reporters last week during a joint press conference in Helsinki alongside Russian President Vladimir Putin that he had no reason not to believe the Russian leader's assurances to him that the Kremlin was not to blame for interference in the election.

Trump later admitted that he misspoke when he said he didn’t “see any reason why” Russia would have meddled in the 2016 election, and said he believes the U.S. intelligence community assessment that found that the Russian government did interfere in the electoral process.

 

Related News

View more

Americans Keep Using Less and Less Electricity

U.S. Electricity Demand Decoupling signals GDP growth without higher load, driven by energy efficiency, LED adoption, services-led output, and rising renewables integration with the grid, plus EV charging and battery storage supporting decarbonization.

 

Key Points

GDP grows as electricity use stays flat, driven by efficiency, renewables, and a shift toward services and output.

✅ LEDs and codes cut residential and commercial load intensity.

✅ Wind, solar, and gas gain share as coal and nuclear struggle.

✅ EVs and storage can grow load and enable grid decarbonization.

 

By Justin Fox

Economic growth picked up a little in the U.S. in 2017. But electricity use fell, with electricity sales projections continuing to decline, according to data released recently by the Energy Information Administration. It's now been basically flat for more than a decade:


 

Measured on a per-capita basis, electricity use is in clear decline, and is already back to the levels of the mid-1990s.

 


 

Sources: U.S. Energy Information Administration, U.S. Bureau of Economic Analysis

*Includes small-scale solar generation from 2014 onward

 

I constructed these charts to go all the way back to 1949 in part because I can (that's how far back the EIA data series goes) but also because it makes clear what a momentous change this is. Electricity use rose and rose and rose and then ... it didn't anymore.

Slower economic growth since 2007 has been part of the reason, but the 2017 numbers make clear that higher gross domestic product no longer necessarily requires more electricity, although the Iron Law of Climate is often cited to suggest rising energy use with economic growth. I wrote a column last year about this big shift, and there's not a whole lot new to say about what's causing it: mainly increased energy efficiency (driven to a remarkable extent by the rise of LED light bulbs), and the continuing migration of economic activity away from making tangible things and toward providing services and virtual products such as games and binge-watchable TV series (that are themselves consumed on ever-more-energy-efficient electronic devices).

What's worth going over, though, is what this means for those in the business of generating electricity. The Donald Trump administration has made saving coal-fired electric plants a big priority; the struggles of nuclear power plants have sparked concern from multiple quarters. Meanwhile, U.S. natural gas production has grown by more than 40 percent since 2007, thanks to hydraulic fracturing and other new drilling techniques, while wind and solar generation keep making big gains in cost and market share. And this is all happening within the context of a no-growth electricity market.

In China, a mystery in China's electricity data has complicated global comparisons.

 

Here are the five main sources of electric power in the U.S.:


 

The big story over the past decade has been coal and natural gas trading places as the top fuel for electricity generation. Over the past year and a half coal regained some of that lost ground as natural gas prices rose from the lows of early 2016. But with overall electricity use flat and production from wind and solar on the rise, that hasn't translated into big increases in coal generation overall.

Oh, and about solar. It's only a major factor in a few states (California especially), so it doesn't make the top five. But it's definitely on the rise.

 

 

What happens next? For power generators, the best bet for breaking out of the current no-growth pattern is to electrify more of the U.S. economy, especially transportation. A big part of the attraction of electric cars and trucks for policy-makers and others is their potential to be emissions-free. But they're only really emissions-free if the electricity used to charge them is generated in an emissions-free manner -- creating a pretty strong business case for continuing "decarbonization" of the electric industry. It's conceivable that electric car batteries could even assist in that decarbonization by storing the intermittent power generated by wind and solar and delivering it back onto the grid when needed.

I don't know exactly how all this will play out. Nobody does. But the business of generating electricity isn't going back to its pre-2008 normal. 

 

Related News

View more

After alert on Russian hacking, a renewed focus on protecting U.S. power grid

U.S. Power Grid Cybersecurity combats DHS-FBI flagged threats to energy infrastructure, with PJM Interconnection using ICS/SCADA segmentation, phishing defenses, incident response, and resilience exercises against Russia-linked attacks and pipeline intrusions.

 

Key Points

Strategies, controls, and training that protect U.S. electric infrastructure from cyber threats and disruptions.

✅ ICS/SCADA network segmentation and zero-trust architecture

✅ Employee phishing drills and incident response playbooks

✅ DOE-led grid exercises and threat intelligence sharing

 

The joint alert from the FBI and Department of Homeland Security last month warning that Russia was hacking into critical U.S. energy infrastructure, as outlined in six essential reads on Russian hacks from recent coverage, came as no surprise to the nation’s largest grid operator, PJM Interconnection.

“You will never stop people from trying to get into your systems. That isn’t even something we try to do.” said PJM Chief Information Officer, Tom O’Brien. “People will always try to get into your systems. The question is, what controls do you have to not allow them to penetrate? And how do you respond in the event they actually do get into your system?”

PJM is the regional transmission organization for 65 million people, covering 13 states, including Pennsylvania, and Washington D.C.

On a rainy day in early April, about 10 people were working inside PJM’s main control center, outside Philadelphia, closely monitoring floor-to-ceiling digital displays showing real-time information from the electric power sector throughout PJM’s territory in the mid-Atlantic and parts of the midwest, amid reports that hackers accessed control rooms at U.S. utilities.

#google#

Donnie Bielak, a reliability engineering manager, was overseeing things from his office, perched one floor up.

“This is a very large, orchestrated effort that goes unnoticed most of the time,” Bielak said. “That’s a good thing.”

But the industry certainly did take notice in late 2015 and early 2016, when hackers successfully disrupted power to the Ukrainian grid. The outages lasted a few hours and affected about 225,000 customers. It was the first publicly-known case of a cyber attack causing major disruptions to a power grid. It was widely blamed on Russia.

One of the many lessons of the Ukraine attacks was a reminder to people who work on critical infrastructure to keep an eye out for odd communications.

“A very large percentage of entry points to attacks are coming through emails,” O’Brien said. “That’s why PJM, as well as many others, have aggressive phishing campaigns. We’re training our employees.”

O’Brien doesn’t want to get into specifics about how PJM deals with cyber threats. But one common way to limit exposure is by having separate systems: For example, industrial controls in a power plant are not connected to corporate business networks, a separation underscored after breaches at U.S. power plants prompted reviews across the sector.

Since 2011, North American grid operators and government agencies have also done large, security exercises every two years. Thousands of people practice how they’d respond to a coordinated physical or cyber event, including rising substation attacks that highlight resilience gaps.

So far, nothing like that has happened in the U.S. It’s possible, but not likely, according to Robert M. Lee, a former military intelligence analyst, who runs the industrial cybersecurity firm Dragos.

“The more complex the system, the harder it is to have a scalable attack,” said Lee, who co-authored a report analyzing the Ukraine attacks. “If you wanted to take out a power generation station– that isn’t the most complex thing. Let’s say you cause an hour of outage. But now you want to cause two months of outages? That’s an exponential increase in effort required.”

For example, he said, it would very difficult for hackers to knock out power to the entire east coast for a long time. But briefly disrupting a major city is easier. That’s the sort of thing that keeps him up at night.

“I worry about an adversary getting into, maybe, Washington D.C.’s portion of the grid, taking down power for 30 minutes,” he said.

The Department of Energy is creating a new office focused on cybersecurity and emergency response, following the U.S. government’s condemnation of power grid hacking by Russia.

Deterrence may be one reason why there has not yet been a major attack on the U.S. grid, said John MacWilliams, a former senior DOE official who’s now a fellow at Columbia University’s Center on Global Energy Policy.

“That’s obviously an act of war,” he said. “We have the capability of responding either through cyber mechanisms or kinetic military.”

In the meantime, small-scale incidents keep happening.

This spring, another cyber attack targeted natural gas pipelines. Four companies shut down their computer systems, just in case, but they say no service was disrupted.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified