Electricity System More Accountable to Nova Scotians


CSA Z462 Arc Flash Training - Electrical Safety Essentials

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$249
Coupon Price:
$199
Reserve Your Seat Today

Nova Scotia Power Penalties empower the Nova Scotia Utility and Review Board to levy financial sanctions for missed customer service standards, reliability and storm response metrics, ensuring compliance with costs borne by shareholders, not ratepayers.

 

Key Points

Regulatory fines up to $1M per year if Nova Scotia Power misses service reliability or storm response standards.

✅ UARB can impose up to $1M in annual penalties.

✅ Applies to service, reliability, and storm response metrics.

✅ Costs borne by shareholders, not ratepayers.

 

The Nova Scotia Utility and Review Board now has the authority to impose financial penalties on Nova Scotia Power for not meeting customer service standards.

Government proclaimed this last section of the Electricity Plan Implementation Act today, Nov. 16, as the board continues with the process of setting performance standards, and as the minister says the province can't order rate cuts under the utility's regulatory framework.

In 2015, Nova Scotia's electricity plan introduced performance standards for service reliability and storm response, and customer service.
     
"Nova Scotians told us they want Nova Scotia Power to be held more accountable and that they want the electricity system to work better for them," said Minister of Energy Michel Samson. "That's why performance standards were a cornerstone of our electricity plan and why we made sure penalties will be paid by Nova Scotia Power shareholders, not ratepayers."
        
Nova Scotia Power could face penalties of up to $1 million annually if it does not meet performance standards when they are in place, while some jurisdictions have provided relief through a lump-sum electricity bill credit for consumers. The penalty provision for reliability and storm response standards is already in force.

Predictable and stable power rates, and bringing innovation and competition into the electrical system are other commitments of Nova Scotia's electricity plan, Our Electricity Future, which stands in contrast to seasonal rate proposals in New Brunswick that risk consumer backlash.

Rates did not change for most Nova Scotians in 2015 and they went down in 2016, while the Premier urged regulators to reject a 14% hike during subsequent proceedings. For the first time ever Nova Scotians will have stable rates, well under the rate of inflation, for the next three years, even as the regulator later approved a 14% increase affecting electricity bills. This has been achieved while Nova Scotia takes aggressive action on climate change.

Source: Nova Scotia Energy

 

Related News

Related News

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

Energy Efficiency and Demand Response Can Nearly Level Southeast Electricity Demand for More than a Decade

Southeast Electricity Demand Forecast examines how energy efficiency, photovoltaics, electric vehicles, heat pumps, and demand response shape grid needs, stabilize load through 2030, shift peaks, and inform utility planning across the region.

 

Key Points

An outlook of load shaped by efficiency, solar, EVs, with demand response keeping usage steady through 2030.

✅ Stabilizes regional demand through 2030 under accelerated adoption

✅ Energy efficiency and demand response are primary levers

✅ EVs and heat pumps drive growth post 2030; shift winter peaks

 

Electricity markets in the Southeast are facing many changes on the customer side of the meter. In a new report released today, we look at how energy efficiency, photovoltaics (solar electricity), electric vehicles, heat pumps, and demand response (shifting loads from periods of high demand) might affect electricity needs in the Southeast.

We find that if all of these resources are pursued on an accelerated basis, electricity demand in the region can be stabilized until about 2030.

After that, demand will likely grow in the following decade because of increased market penetration of electric vehicles and heat pumps, but energy planners will have time to deal with this growth if these projections are borne out. We also find that energy efficiency and demand response can be vital for managing electricity supply and demand in the region and that these resources can help contain energy demand growth, reducing the impact of expensive new generation on consumer wallets.

 

National trends

This is the second ACEEE report looking at regional electricity demand. In 2016, we published a study on electricity consumption in New England, finding an even more pronounced effect. For New England, with even more aggressive pursuit of energy efficiency and these other resources, consumption was projected to decline through about 2030, before rebounding in the following decade.

These regional trends fit into a broader national pattern. In the United States, electricity consumption has been characterized by flat electricity demand for the past decade. Increased energy efficiency efforts have contributed to this lack of consumption growth, even as the US economy has grown since the Great Recession. Recently, the US Energy Information Administration (EIA – a branch of the US Department of Energy) released data on US electricity consumption in 2016, finding that 2016 consumption was 0.3% below 2015 consumption, and other analysts reported a 1% slide in 2023 on milder weather.

 

Five scenarios for the Southeast

ACEEE’s new study focuses on the Southeast because it is very different from New England, with warmer weather, more economic growth, and less-aggressive energy efficiency and distributed energy policies than the Northeast. For the Southeast, we examined five scenarios: a business-as-usual scenario; two alternative scenarios with progressively higher levels of energy efficiency, photovoltaics informed by a solar strategy for the South that is emerging regionally, electric vehicles, heat pumps, and demand response; and two scenarios combining high numbers of electric vehicles and heat pumps with more modest levels of the other resources. This figure presents electricity demand for each of these scenarios:

Over the 2016-2040 period, we project that average annual growth will range from 0.1% to 1.0%, depending on the scenario, much slower than historic growth in the region. Energy efficiency is generally the biggest contributor to changes in projected 2040 electricity consumption relative to the business-as-usual scenario, as shown in the figure below, which presents our accelerated scenario that is based on levels of energy efficiency and other resources now targeted by leading states and utilities in the Southeast.

To date, Entergy Arkansas has achieved the annual efficiency savings as a percent of sales shown in the accelerated scenario and Progress Energy (a division of Duke Energy) has nearly achieved those savings in both North and South Carolina. Sixteen states outside the Southeast have also achieved these savings statewide.

The efficiency savings shown in the aggressive scenario have been proposed by the Arkansas PSC. This level of savings has already been achieved by Arizona as well as six other states. Likewise, the demand response savings we model have been achieved by more than 10 utilities, including four in the Southeast. The levels of photovoltaic, electric vehicle, and heat pump penetration are more speculative and are subject to significant uncertainty.

We also examined trends in summer and winter peak demand. Most utilities in the Southeast have historically had peak demand in the summer, often seeing heatwave-driven surges that stress operations across the Eastern U.S., but our analysis shows that winter peaks will be more likely in the region as photovoltaics and demand response reduce summer peaks and heat pumps increase winter peaks.

 

Why it’s vital to plan broadly

Our analysis illustrates the importance of incorporating energy efficiency, demand response, and photovoltaics into utility planning forecasts as utility trends to watch continue to evolve. Failing to include these resources leads to much higher forecasts, resulting in excess utility system investments, unnecessarily increasing customer electricity rates. Our analysis also illustrates the importance of including electric vehicles and heat pumps in long-term forecasts. While these technologies will have moderate impacts over the next 10 years, they could become increasingly important in the long run.

We are entering a dynamic period of substantial uncertainty for long-term electricity sales and system peaks, highlighted by COVID-19 demand shifts that upended typical patterns. We need to carefully observe and analyze developments in energy efficiency, photovoltaics, electric vehicles, heat pumps, and demand response over the next few years. As these technologies advance, we can create policies to reduce energy bills, system costs, and harmful emissions, drawing on grid reliability strategies tested in Texas, while growing the Southeast’s economy. Resource planners should be sure to incorporate these emerging trends and policies into their long-term forecasts and planning.

 

Related News

View more

How Synchrophasors are Bringing the Grid into the 21st Century

Synchrophasors deliver PMU-based, real-time monitoring for the smart grid, helping NYISO prevent blackouts, cut costs, and integrate renewables, with DOE-backed deployments boosting reliability, situational awareness, and data sharing across regional partners.

 

Key Points

Synchrophasors, or PMUs, are grid sensors that measure synced voltage, current, and frequency to enhance reliability.

✅ Real-time grid visibility and situational awareness

✅ Early fault detection to prevent cascading outages

✅ Supports renewable integration and lowers operating costs

 

Have you ever heard of a synchrophasor? It may sound like a word out of science fiction, but these mailbox-sized devices are already changing the electrical grid as we know it.

The grid was born over a century ago, at a time when our needs were simpler and our demand much lower. More complex needs are putting a heavy strain on the aging infrastructure, which is why we need to innovate and update our grid with investments in a smarter electricity infrastructure so it’s ready for the demands of today.

That’s where synchrophasors come in.

A synchrophasor is a sophisticated monitoring device that can measure the instantaneous voltage, current and frequency at specific locations on the grid. This gives operators a near-real-time picture of what is happening on the system, including insights into power grid vulnerabilities that allow them to make decisions to prevent power outages.

Just yesterday I attended the dedication of the New York Independent System Operator's smart grid control center, a $75 million project that will use these devices to locate grid problems at an early stage and share these data with their regional partners. This should mean fewer blackouts for the State of New York. I would like to congratulate NYISO for being a technology leader.

And not only will these synchrophasors help prevent outages, but they also save money. By providing more accurate and timely data on system limits, synchrophasors make the grid more reliable and efficient, thereby reducing planning and operations costs and addressing grid modernization affordability concerns for utilities.

The Department has worked with utilities across the country to increase the number of synchrophasors five-fold -- from less than 200 in 2009 to over 1,700 today. And this is just a part of our commitment to making a smarter, more resilient grid a reality, reinforced by grid improvement funding from DOE.

In September 2013, the US Department of Energy announced up to $9 million in funding to facilitate rapid response to unusual grid conditions. As a result, utilities will be able to better detect and head off potential blackouts, while improving day-to-day grid reliability and helping with the integration of solar into the grid and other clean renewable sources.

If you’d like to learn more about our investments in the smart grid and how they are improving our electrical infrastructure, please visit the Office of Electricity Delivery and Energy Reliability’s www.smartgrid.gov.

Patricia Hoffman is Assistant Secretary, Office of Electricity Delivery & Energy Reliability

 

Related News

View more

EU Smart Meters Spur Growth in the Customer Analytics Market

EU Smart Meter Analytics integrates AMI data with grid edge platforms, enabling back-office efficiency, revenue assurance, and customer insights via cloud and PaaS solutions, while system integration cuts costs and improves utility performance.

 

Key Points

EU smart meter analytics uses AMI data and cloud to improve utility performance, revenue assurance, and outcomes.

✅ AMI underpins grid edge analytics and utility IT/OT integration

✅ Cloud and PaaS reduce costs and scale data-driven applications

✅ Focus shifts from meter rollout to back-office and revenue analytics

 

Europe's investment in smart meters has begun to open up the market for analytics that benefit both utilities and customers.

Two new reports from GTM Research demonstrate the substantial investment in both advanced metering infrastructure (AMI) and specific customer analytics segments -- the first report analyzes the progress of AMI deployment in Europe, while the second is a comprehensive assessment of analytics use cases, including AI in utility operations, enabled by or interacting with AMI.

The Third Energy Package mandated EU member states to perform a cost-benefit analysis to evaluate the economic viability of deploying smart meters and broader grid modernization costs across member states. Two-thirds of the member states found there was a net positive result, while seven members found negative or inconclusive results.

“The mandate spurred AMI deployment in the EU, but all member states are deploying some AMI. Even without an overall positive cost-benefit outcome, utilities found pockets of customers where there is a positive business case for AMI,” said Paulina Tarrant, research associate at GTM Research and lead author of “Racing to 2020: European Policy, Deployment and Market Share Primer.”

Annual AMI contracting peaked in 2013 -- two years after the mandate -- with 29 million contracted that year. Today, 100 million meters have been contracted overall. As member states reach their respective targets, the AMI market will cool in Europe and spending on analytics and applications will continue to ramp up, aligning with efforts to invest in smarter infrastructure across the sector, Tarrant noted.

Between 2017 and 2021, more than $30 billion will be spent on utility back-office and revenue-assurance analytics in the EU, reflecting the shift toward the digital grid architecture, according to GTM Research’s Grid Edge Customer Utility Analytics Ecosystems: Competitive Analysis, Forecasts and Case Studies.

The report examines the broad landscape of customer analytics showing how AMI interacts with the larger IT/OT environment of a utility.

“The benefits of AMI expand beyond revenue assurance -- in fact, AMI represents the backbone of many customer utility analytics and grid edge solutions,” said Timotej Gavrilovic, author of the Grid Edge Customer Utility Ecosystems report.

Integration is key, according to the report.

“Technology providers are integrating data sets, solutions and systems and partnering with others to provide a one-stop shop serving broad utility needs, increasing efficiencies and reducing costs,” Gavrilovic said. “Cloud-based deployments and platform-as-a-service offerings are becoming commonplace, creating an opportunity for utilities to balance the cost versus performance tradeoff to optimize their analytics systems and applications.”

A diverse array of customer analytics applications is a critical foundation for demonstrating the positive cost-benefit of AMI.

“Advanced analytics and applications are key to ensuring that AMI investments provide a positive return after smart meters are initiated,” said Tarrant. “Improved billing and revenue assurance was not enough everywhere to show customer benefit -- these analytics packages will leverage the distributed network infrastructure, including advanced inverters used with distributed energy resources, and subsequent increased data access, uniting the electricity markets of the EU.”

 

Related News

View more

Symantec Proves Russian

Dragonfly energy sector cyberattacks target ICS and SCADA across critical infrastructure, including the power grid and nuclear facilities, using spearphishing, watering-hole sites, supply-chain compromises, malware, and VPN exploits to gain operational access.

 

Key Points

Dragonfly APT campaigns target energy firms and ICS to gain grid access, risking manipulation and service disruption.

✅ Breaches leveraged spearphishing, watering-hole sites, and supply chains.

✅ Targeted ICS, SCADA, VPNs to pivot into operational networks.

✅ Aimed to enable power grid manipulation and potential outages.

 

An October, 2017 report by researchers at Symantec Corp., cited by the U.S. government, has linked recent US power grid cyber attacks to a group of hackers it had code-named "Dragonfly", and said it found evidence critical infrastructure facilities in Turkey and Switzerland also had been breached.

The Symantec researchers said an earlier wave of attacks by the same group starting in 2011 was used to gather intelligence on companies and their operational systems. The hackers then used that information for a more advanced wave of attacks targeting industrial control systems that, if disabled, leave millions without power or water.

U.S. intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attacks, condemned by the U.S. government, striking almost simultaneously at multiple locations, are testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

#google#

While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers.

“Since at least March 2016, Russian government cyber actors… targeted government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors,” according to Thursday’s FBI and Department of Homeland Security report. The report did not say how successful the attacks were or specify the targets, but said that the Russian hackers “targeted small commercial facilities’ networks where they staged malware, conducted spearphishing, and gained remote access into energy sector networks.” At least one target of a string of infrastructure attacks last year was a nuclear power facility in Kansas.

Symantec doesn’t typically point fingers at particular nations in its research on cyberattacks, said Eric Chien, technical director of Symantec’s Security Technology and Response division, though he said his team doesn’t see anything it would disagree with in the new federal report. The government report appears to corroborate Symantec’s research, showing that the hackers had penetrated computers and accessed utility control rooms that would let them directly manipulate power systems, he says.

“There were really no more technical hurdles for them to do something like flip off the power,” he said.

And as for the group behind the attacks, Chien said it appears to be relatively dormant for now, but it has gone quiet in the past only to return with new hacks.

“We expect they’re sort of retooling now, and they likely will be back,”

 


 

In some cases, Dragonfly successfully broke into the core systems that control US and European energy companies, Symantec revealed.

“The energy sector has become an area of increased interest to cyber-attackers over the past two years,” Symantec said in its report.

“Most notably, disruptions to Ukraine’s power system in 2015 and 2016 were attributed to a cyberattack and led to power outages affecting hundreds of thousands of people. In recent months, there have also been media reports of attempted attacks on the electricity grids in some European countries, as well as reports of companies that manage nuclear facilities in the US being compromised by hackers.

“The Dragonfly group appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so. Symantec customers are protected against the activities of the Dragonfly group.”

In recent weeks, senior US intelligence officials said that the Kremlin believes it can launch hacking operations against the West with impunity, including a cyber weapon that can disrupt power grids, according to assessments.

The DHS and FBI report further elaborated: “This campaign comprises two distinct categories of victims: staging and intended targets. The initial victims are peripheral organisations such as trusted third-party suppliers with less-secure networks, referred to as ‘staging targets’ throughout this alert.

“The threat actors used the staging targets’ networks as pivot points and malware repositories when targeting their final intended victims. National Cybersecurity and Communications Integration Center and FBI judge the ultimate objective of the actors is to compromise organisational networks, also referred to as the ‘intended target’.”

According to the US alert, hackers used a variety of attack methods, including spear-phishing emails, watering-hole domains, credential gathering, open source and network reconnaissance, host-based exploitation, and deliberate targeting of ICS infrastructure.

The attackers also targeted VPN software and used password cracking tools.

Once inside, the attackers downloaded tools from a remote server and then carried out a number of actions, including modifying key systems to store plaintext credentials in memory, and built web shells to gain command and control of targeted systems.

“This actors’ campaign has affected multiple organisations in the energy, nuclear, water, aviation, construction and critical manufacturing sectors, with hundreds of victims across the U.S. power grid confirmed,” the DHS said, before outlining a number of steps that IT managers in infrastructure organisations can take to cleanse their systems and defend against Russian hackers. he said.
 

 

Related News

View more

The Implications of Decarbonizing Canada's Electricity Grid

Canada Electricity Grid Decarbonization advances net-zero goals by expanding renewable energy (wind, solar, hydro), boosting grid reliability with battery storage, and aligning policy, efficiency, and investment to cut emissions and strengthen energy security.

 

Key Points

Canada's shift to low-carbon power using renewables and storage to cut emissions and improve grid reliability.

✅ Invest in wind, solar, hydro, and transmission upgrades

✅ Deploy battery storage to balance intermittent generation

✅ Support just transition, jobs, and energy efficiency

 

As Canada moves towards a more sustainable future, decarbonizing its electricity grid has emerged as a pivotal goal. The transition aims to reduce greenhouse gas emissions, promote renewable energy sources, and ultimately support global climate targets, with cleaning up Canada's electricity widely viewed as critical to meeting those pledges. However, the implications of this transition are multifaceted, impacting the economy, energy reliability, and the lives of Canadians.

Understanding Decarbonization

Decarbonization refers to the process of reducing carbon emissions produced from various sources, primarily fossil fuels. In Canada, the electricity grid is heavily reliant on natural gas, coal, and oil, which contribute significantly to carbon emissions. The Canadian government has committed to achieving net-zero by 2050 through federal and provincial collaboration, with the electricity sector playing a crucial role in this initiative. The strategy includes increasing the use of renewable energy sources such as wind, solar, and hydroelectric power.

Economic Considerations

Transitioning to a decarbonized electricity grid presents both challenges and opportunities for Canada’s economy. On one hand, the initial costs of investing in renewable energy infrastructure can be substantial. This includes not only the construction of renewable energy plants but also the necessary upgrades to the grid to accommodate new technologies. According to the Fraser Institute analysis, these investments could lead to increased electricity prices, impacting consumers and businesses alike.

However, the shift to a decarbonized grid can also stimulate economic growth. The renewable energy sector is a rapidly growing industry that, as Canada’s race to net-zero accelerates, promises job creation in manufacturing, installation, and maintenance of renewable technologies. Moreover, as technological advancements reduce the cost of renewable energy, the long-term savings on fuel costs can benefit both consumers and businesses. The challenge lies in balancing these economic factors to ensure a smooth transition.

Reliability and Energy Security

A significant concern regarding the decarbonization of the electricity grid is maintaining reliability and energy security, especially as an IEA report indicates Canada will need substantially more electricity to achieve net-zero goals, requiring careful system planning.

To address this challenge, the implementation of energy storage solutions and grid enhancements will be essential. Advances in battery technology and energy storage systems can help manage supply and demand effectively, ensuring that energy remains available even during periods of low renewable output. Additionally, integrating a diverse mix of energy sources, including hydroelectric power, can enhance the reliability of the grid.

Social Impacts

The decarbonization process also carries significant social implications. Communities that currently depend on fossil fuel industries may face economic challenges as the transition progresses, and the Canadian Gas Association has warned of potential economy-wide costs for switching to electricity, underscoring the need for a just transition.

Furthermore, there is a need for public engagement and education on the benefits and challenges of decarbonization. Canadians must understand how changes in energy policy will affect their daily lives, from electricity prices to job opportunities. Fostering a sense of community involvement can help build support for renewable energy initiatives and ensure that diverse voices are heard in the planning process.

Policy Recommendations

For Canada to successfully decarbonize its electricity grid, and building on recent electricity progress across provinces nationwide, robust and forward-thinking policies must be implemented. This includes investment in research and development to advance renewable technologies and improve energy storage solutions. Additionally, policies should encourage public-private partnerships to share the financial burden of infrastructure investments.

Governments at all levels should also promote energy efficiency measures to reduce overall demand, making the transition more manageable. Incentives for consumers to adopt renewable energy solutions, such as solar panels, can further accelerate the shift towards a decarbonized grid.

Decarbonizing Canada's electricity grid presents a complex yet necessary challenge. While there are economic, reliability, and social considerations to navigate, the potential benefits of a cleaner, more sustainable energy future are substantial. By implementing thoughtful policies and fostering community engagement, Canada can lead the way in creating an electricity grid that not only meets the needs of its citizens but also contributes to global efforts in combating climate change.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified