Town unruffled over wind farm

By Toronto Star


CSA Z462 Arc Flash Training - Electrical Safety Essentials

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$249
Coupon Price:
$199
Reserve Your Seat Today
As long as the wind blows, which is most of the time, all of the power feeding Rock Port in Missouri is green.

The community is the only one in the U.S. that gets its electricity entirely from wind, generated by four 1.25-megawatt turbines that sit on a bluff overlooking the town.

Together they generate 16 million kilowatt hours annually, enough to run this town of 1,400 – with its four-block main street and single traffic light – and sell 3 million kilowatt hours back to the grid.

Admittedly, it's a small town, said Mayor Jeff Seaman. "I can see from my house, on one end of town, to the other end of town and then out into the country."

Electricity from the wind farm is fed into town through a separate line, bypassing the main power grid, which brings in electricity from the Northwest Public Energy Pool and is used only on days when there is no breeze.

"It's almost like having a backup generator in your yard," said Seaman, who works at the Cooper Nuclear Station across the state line in Nebraska.

Eric Chamberlain, a former mortuary worker, put up a monitoring tower after seeing an Iowa wind farm and did his own studies to prove that the renewable energy was viable in Rock Port.

Chamberlain not only convinced John Deere Wind Energy and Wind Capital Group that the turbines could work, he talked his way into a job, and is now one of Capital's managers.

John Deere Wind Energy owns the turbines, which are managed by Capital. The only financial savings to the town itself is about $50,000 a year in wheeling charges, a fee levied by electricity companies to push more power through the lines.

In Ontario, it's difficult to speculate on what the savings would be, says Joyce McLean, Toronto Hydro's director of strategic issues.

Toronto Hydro buys its power from Ontario Power Authority, negotiating 20-year contracts. Any new electricity generation has to be sold back to the grid. It can't bypass it as they do in Rock Port.

But according to Ontario's new Green Energy Act, any company that can generate up to 10 megawatts of power from renewable energy sources is allowed to sell to Ontario Power Authority.

And in Missouri, wind farms don't seem to stir up much debate as in Ontario, where some Toronto residents oppose a Toronto Hydro plan to put a string of wind turbines in Lake Ontario about two kilometres offshore from Scarborough.

Just outside Rock Port's city limits, another 100 turbines sit on farmland and feed power to the rest of the state.

The towers have generated little opposition. They're no "different than a radio or cellphone tower. No one has said anything negative about the way they look," Seaman said.

"I think anything can detract from the landscape, but I don't think (the wind farm) is truly offensive."

Related News

Russian hackers accessed US electric utilities' control rooms

Russian Utility Grid Cyberattacks reveal DHS findings on Dragonfly/Energetic Bear breaching control rooms and ICS/SCADA via vendor supply-chain spear-phishing, threatening blackouts and critical infrastructure across U.S. power utilities through stolen credentials and reconnaissance.

 

Key Points

State-backed ops breaching utilities via vendors to reach ICS/SCADA, risking grid disruption and control-room access.

✅ Spear-phishing and watering-hole attacks on vendor networks

✅ Stolen credentials used to reach isolated ICS/SCADA

✅ Potential to trigger localized blackouts and service disruptions

 

Hackers working for Russia were able to gain access to the control rooms of US electric utilities last year, allowing them to cause blackouts, federal officials tell the Wall Street Journal.

The hackers -- working for a state-sponsored group previously identified as Dragonfly or Energetic Bear -- broke into utilities' isolated networks by hacking networks belonging to third-party vendors that had relationships with the power companies, the Department of Homeland Security said in a press briefing on Monday.

Officials said the campaign had claimed hundreds of victims and is likely continuing, the Journal reported.

"They got to the point where they could have thrown switches" to disrupt the flow power, Jonathan Homer, chief of industrial-control-system analysis for DHS, told the Journal.

"While hundreds of energy and non-energy companies were targeted, the incident where they gained access to the industrial control system was a very small generation asset that would not have had any impact on the larger grid if taken offline," the DHS said in a statement Tuesday. "Over the course of the past year as we continued to investigate the activity, we learned additional information which would be helpful to industry in defending against this threat."

Organizations running the nation's energy, nuclear and other critical infrastructure have become frequent targets for cyberattacks in recent years due to their ability to cause immediate chaos, whether it's starting a blackout or blocking traffic signals. These systems are often vulnerable because of antiquated software and the high costs of upgrading infrastructure.

The report comes amid heightened tension between Russia and the US over cybersecurity, alongside US condemnation of power grid hacking in recent months. Earlier this month, US special counsel Robert Mueller filed charges against 12 Russian hackers tied to cyberattacks on the Democratic National Committee.

Hackers compromised US power utility companies' corporate networks with conventional approaches, such as spear-phishing emails and watering-hole attacks as seen in breaches at power plants across the US that target a specific group of users by infecting websites they're known to visit, the newspaper reported. After gaining access to vendor networks, hackers turned their attention to stealing credentials for access to the utility networks and familiarizing themselves with facility operations, officials said, according to the Journal.

Homeland Security didn't identify the victims, the newspaper reports, adding that some companies may not know they had been compromised because the attacks used legitimate credentials to gain access to the networks.

Cyberattacks on electrical systems aren't an academic matter. In 2016, Ukraine's grid was disrupted by cyberattacks attributed to Russia, which is engaged in territorial disputes with the country over eastern Ukraine and the Crimean peninsula. Russia has denied any involvement in targeting critical infrastructure.

President Donald Trump signed an executive order in May designed to bolster the United States' cybersecurity by protecting federal networks, critical infrastructure and the public online. One section of the order focuses on protecting the grid like electricity and water, as well as financial, health care and telecommunications systems.

The Department of Homeland Security didn't respond to a request for comment.

 

Related News

View more

Washington State Ferries' Hybrid-Electric Upgrade

Washington State Hybrid-Electric Ferries advance green maritime transit with battery-diesel propulsion, lower emissions, and fleet modernization, integrating charging infrastructure and reliable operations across WSF routes to meet climate goals and reduce fuel consumption.

 

Key Points

New WSF vessels using diesel-battery propulsion to cut emissions, improve efficiency, and sustain reliable ferry service.

✅ Hybrid diesel-battery propulsion reduces fuel use and CO2

✅ Larger vessels with efficient batteries and charging upgrades

✅ Compatible with WSF docks, maintenance, and safety standards

 

Washington State is embarking on an ambitious update to its ferry fleet, introducing hybrid-electric boats that represent a significant leap toward greener and more sustainable transportation. The state’s updated plans reflect a commitment to reducing carbon emissions and enhancing environmental stewardship while maintaining the efficiency and reliability of its vital ferry services.

The Washington State Ferries (WSF) system, one of the largest in the world, has long been a critical component of the state’s transportation network, linking various islands and coastal communities with the mainland. Traditionally powered by diesel engines, the ferries are responsible for significant greenhouse gas emissions. In response to growing environmental concerns and legislative pressure, WSF is now turning to hybrid-electric technology similar to battery-electric high-speed ferries seen elsewhere to modernize its fleet and reduce its carbon footprint.

The updated plans for the hybrid-electric boats build on earlier efforts to introduce cleaner technologies into the ferry system. The new designs incorporate advanced hybrid-electric propulsion systems that combine traditional diesel engines with electric batteries. This hybrid approach allows the ferries to operate on electric power during certain segments of their routes, reducing reliance on diesel fuel and cutting emissions as electric ships on the B.C. coast have demonstrated during similar operations.

One of the key features of the updated plans is the inclusion of larger and more capable hybrid-electric ferries, echoing BC Ferries hybrid ships now entering service in the region. These vessels are designed to handle the demanding operational requirements of the Washington State Ferries system while significantly reducing environmental impact. The new boats will be equipped with state-of-the-art battery systems that can store and utilize electric power more efficiently, leading to improved fuel economy and lower overall emissions.

The transition to hybrid-electric ferries is driven by both environmental and economic considerations. On the environmental side, the move aligns with Washington State’s broader goals to combat climate change and reduce greenhouse gas emissions, including programs like electric vehicle rebate program that encourage cleaner travel across the state. The state has set ambitious targets for reducing carbon emissions across various sectors, and upgrading the ferry fleet is a crucial component of achieving these goals.

From an economic perspective, hybrid-electric ferries offer the potential for long-term cost savings. Although the initial investment in new technology can be substantial, with financing models like CIB support for B.C. electric ferries helping spur adoption and reduce barriers for agencies, the reduced fuel consumption and lower maintenance costs associated with hybrid-electric systems are expected to lead to significant savings over the lifespan of the vessels. Additionally, the introduction of greener technology aligns with public expectations for more sustainable transportation options.

The updated plans also emphasize the importance of integrating hybrid-electric technology with existing infrastructure. Washington State Ferries is working to ensure that the new vessels are compatible with current docking facilities and maintenance practices. This involves updating docking systems, as seen with Kootenay Lake electric-ready ferry preparations, to accommodate the specific needs of hybrid-electric ferries and training personnel to handle the new technology.

Public response to the hybrid-electric ferry initiative has been largely positive, with many residents and environmental advocates expressing support for the move towards greener transportation. The new boats are seen as a tangible step toward reducing the environmental impact of one of the state’s most iconic transportation services. The project also highlights Washington State’s commitment to innovation and leadership in sustainable transportation, alongside global examples like Berlin's electric flying ferry that push the envelope in maritime transit.

However, the transition to hybrid-electric ferries is not without its challenges. Implementing new technology requires careful planning and coordination, including addressing potential technical issues and ensuring that the vessels meet all safety and operational standards. Additionally, there may be logistical challenges associated with integrating the new ferries into the existing fleet and managing the transition without disrupting service.

Despite these challenges, the updated plans for hybrid-electric boats represent a significant advancement in Washington State’s efforts to modernize its transportation system. The initiative reflects a growing trend among transportation agencies to embrace sustainable technologies and address the environmental impact of traditional transportation methods.

In summary, Washington State’s updated plans for hybrid-electric ferries mark a crucial step towards a more sustainable and environmentally friendly transportation network. By incorporating advanced hybrid-electric technology, the state aims to reduce carbon emissions, improve fuel efficiency, and align with its broader climate goals. While challenges remain, the initiative demonstrates a commitment to innovation and underscores the importance of transitioning to greener technologies in the quest for a more sustainable future.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

US looks to decommission Alaskan military reactor

SM-1A Nuclear Plant Decommissioning details the US Army Corps of Engineers' removal of the Fort Greely reactor, Cold War facility dismantling, environmental monitoring, remote-site power history, and timeline to 2026 under a deactivated nuclear program.

 

Key Points

Army Corps plan to dismantle Fort Greely's SM-1A reactor and complete decommissioning of remaining systems by 2026.

✅ Built for remote Arctic radar support during the Cold War

✅ High costs beat diesel; program later deemed impractical

✅ Reactor parts removed; residuals monitored; removal by 2026

 

The US Army Corps of Engineers has begun decommissioning Alaska’s only nuclear power plant, SM-1A, which is located at Fort Greely, even as new US reactors continue to take shape nationwide. The $17m plant closed in 1972 after ten years of sporadic operation. It was out of commission from 1967 to 1969 for extensive repairs. Much of has already been dismantled and sent for disposal, and the rest, which is encased in concrete, is now to be removed.

The plant was built as part of an experimental programme to determine whether nuclear facilities, akin to next-generation nuclear concepts, could be built and operated at remote sites more cheaply than diesel-fuelled plants.

"The main approach was to reduce significant fuel-transportation costs by having a nuclear reactor that could operate for long terms, a concept echoed in the NuScale SMR safety evaluation process, with just one nuclear core," Brian Hearty said. Hearty manages the Army Corps of Engineers’ Deactivated Nuclear Power Plant Program.

#google#

He said the Army built SM-1A in 1962 hoping to provide power reliably at remote Arctic radar sites, where in similarly isolated regions today new US coal plants may still be considered, intended to detect incoming missiles from the Soviet Union at the height of the Cold War. He added that the programme worked but not as well as Pentagon officials had hoped. While SM-1A could be built and operated in a cold and remote location, its upfront costs were much higher than anticipated, and it costs more to maintain than a diesel power plant. Moreover, the programme became irrelevant because of advances in Soviet rocket science and the development of intercontinental ballistic missiles.

Hearty said the reactor was partially dismantled soon after it was shut down. “All of the fuel in the reactor core was removed and shipped back to the Atomic Energy Commission (AEC) for them to either reprocess or dispose of,” he noted. “The highly activated control and absorber rods were also removed and shipped back to the AEC.”

The SM-1A plant produced 1.8MWe and 20MWt, including steam, which was used to heat the post. Because that part of the system was still needed, Army officials removed most of the nuclear-power system and linked the heat and steam components to a diesel-fired boiler. However, several parts of the nuclear system remained, including the reactor pressure vessel and reactor coolant pumps. “Those were either kept in place, or they were cut off and laid down in the tall vapour-containment building there,” Hearty said. “And then they were grouted and concreted in place.” The Corps of Engineers wants to remove all that remains of the plant, but it is as yet unclear whether that will be feasible.

Meanwhile, monitoring for radioactivity around the facility shows that it remains at acceptable levels. “It would be safe to say there’s no threat to human health in the environment,” said Brenda Barber, project manager for the decommissioning. Work is still in its early stages and is due to be completed in 2026 at the earliest. Barber said the Corps awarded the $4.6m contract in December to a Virginia-based firm to develop a long-range plan for the project, similar in scope to large reactor refurbishment efforts elsewhere. Among other things, this will help officials determine how much of the SM-1A will remain after it’s decommissioned. “There will still be buildings there,” she said. “There will still be components of some of the old structure there that may likely remain.”

 

Related News

View more

Gaza electricity crisis:

Gaza Electricity Crisis drives severe power cuts in the Gaza Strip, as Hamas-PA tensions and Mahmoud Abbas's supply reductions under blockade spur fuel shortages, hospital strain, and soaring demand for batteries, LED lights, and generators.

 

Key Points

A prolonged Gaza power shortage from politics, blockade, and fuel cuts, disrupting daily life, hospitals, and water.

✅ Demand surges for batteries, LED lights, and generators

✅ PA cuts to Israel-supplied power deepen shortages

✅ Hospitals, water, and sanitation face critical strain

 

In Imad Shlayl’s electronics shop in Gaza City, the customers crowding his store are interested in only two products: LED lights and the batteries to power them.

In the already impoverished Gaza Strip, residents have learned to adapt to the fact that electricity is only available for between two and four hours a day.

But fresh anger was sparked when availability was cut further last month, at the request of the Palestinian president, Mahmoud Abbas, in an escalation of his conflict with Hamas, the Islamist group.

The shortages have defined how people live their lives, echoing Europe’s energy crisis in other regions: getting up in the middle of the night, if there is power, to run washing machines or turn on water pumps.

Only the wealthy few have frequent, long-lasting access to electricity, even as U.S. brownout risks highlight grid fragility, to power lights and fans and fridges, televisions and wifi routers, in Gaza’s stifling summer heat.

“We used to sell all sorts of things,” says Shlayl. “But it’s different these days. All we sell is batteries and chargers. Because the crisis is so deep we are selling 100 batteries a day when normally we would sell 20.”

Gaza requires 430 megawatts of power to meet daily demand, but receives only half that. Sixty megawatts are supplied by its solitary power station, now short on fuel, while the rest is provided through the Israel’s power sector and funded by Abbas’s West Bank-based Palestinian Authority (PA).

Abbas’s move to cut supplies to Gaza, which is already under a joint Israeli and Egyptian blockade – now in its 11th year – has quickly made him a hate figure among many Gazans, who question why he is punishing 2 million fellow Palestinians in what appears to be an attempt to force Hamas to relinquish control of the territory.

Though business is good for Shlayl, he is angry at the fresh shortages faced by Gazans which, as pandemic power shut-offs elsewhere have shown, affect all areas of life, from hospital emergency wards to clean water supplies.

“I’ve not done anything to be punished by anyone. It is the worst I can remember but we are expecting it to get worse and worse,” he said. “Not just electricity, but other things as well. We are in a very deep descent.”

As well as cutting electricity, the PA has cut salaries for its employees in Gaza by upwards of 30% , prompting thousands to protest on the streets of Gaza city.

Residents also blame Abbas for a backlog in processing the medical referral process for those needing to travel out of Gaza for treatment, although who is at fault in that issue is less clear cut.

The problems facing Gaza – where high levels of unemployment are endemic – is most obvious in the poorest areas.

In Gaza City’s al-Shati refugee camp, home to the head of Hamas’s political bureau, Ismail Haniyeh, whole housing blocks were dark, while in others only a handful of windows were weakly illuminated.

In the one-room kiosk selling pigeons and chickens that he manages, just off the camp’s main market, Ayman Nasser, 32, is sitting on the street with his friends in search of a sea breeze.

His face is illuminated by the light of his mobile phone. He has one battery-powered light burning in his shop.

“Part of the problem is that we don’t have any news. Who should we blame for this? Hamas, Israelis, Abbas?” he said.

 A Palestinian girl reads by candle light due to power cut at the Jabalia Camp in Gaza City
Facebook Twitter Pinterest
 A Palestinian girl reads by candlelight due to a power cut at the Jabalia camp in Gaza City. Photograph: Anadolu Agency/Getty Images
His friend, Ashraf Kashqin, interrupts: “It is all connected to politics, but it is us who is getting played by the two sides.”

If there is a question that all the Palestinians in Gaza are asking, it is what the ageing and remote Abbas hopes to achieve, a dynamic also seen in Lebanon’s electricity disputes, not least whether he hopes the cuts will lead to an insurrection against Hamas following demonstrations linked to the power supply in January.

While a senior official in the Fatah-led government on the West Bank said last month that the aim behind the move by the PA – which has been paying $12m (£9m) a month for the electricity Israel supplies to Gaza – was to “dry up Hamas’s financial resources”, others are dubious about the timing, the motive and the real impact.

Among them are human rights groups, such as Amnesty International, who have warned it could turn Gaza’s long-running crisis into a major disaster already hitting hospitals and waste treatment plants.

“For 10 years the siege has unlawfully deprived Palestinians in Gaza of their most basic rights and necessities. Under the burden of the illegal blockade and three armed conflicts, the economy has sharply declined and humanitarian conditions have deteriorated severely. The latest power cuts risk turning an already dire situation into a full-blown humanitarian catastrophe,” said Magdalena Mughrabi, of the group.

Then there is the question of timing. “Abbas is probably the only one who knows why he is doing this to Gaza,” adds Mohameir Abu Sa’da, a political science professor at Al Azhar University and analyst.

“I honestly don’t buy what he has been saying for the last three months: that he will take exceptional measures against Hamas to put pressure on it to give up control of the Gaza Strip.

 

Related News

View more

Rio Tinto seeking solutions that transform heat from underground mines into electricity

Rio Tinto waste heat-to-electricity initiative captures underground mining thermal energy at Resolution Copper, Arizona, converting it to renewable power for cooling systems and microgrids, advancing decarbonization, energy efficiency, and the miner's 2050 carbon-neutral goal.

 

Key Points

A program converting underground thermal energy into on-site electricity to cut emissions and support mine cooling.

✅ Captures low-grade heat from rock and geothermal water.

✅ Generates electricity for ventilation, refrigeration, microgrids.

✅ Scalable, safe, and grid- or storage-ready for peak demand.

 

The world’s second-largest miner, Rio Tinto announced that it is accepting proposals for solutions that transform waste heat into electricity for reuse from its underground operations.

In a press release, the company said this initiative is aimed at drastically reducing greenhouse gas emissions, even as energy-intensive projects like bitcoin mining operations expand, so that it can achieve its goal of becoming carbon neutral by 2050.

Initially, the project would be implemented at the Resolution copper mine in Arizona, which Rio owns together with BHP (ASX, LON: BHP). At this site, massive electrically-driven refrigeration and ventilation systems, aligned with broader electrified mining practices, are in charge of cooling the work environment because of the latent heat from the underground rock and groundwater. 

THE INITIATIVE IS AIMED AT REDUCING GREENHOUSE GAS EMISSIONS SO THAT RIO CAN ACHIEVE ITS GOAL OF BECOMING CARBON NEUTRAL BY 2050

“When operating, the Resolution copper mine will be a deep underground block cave mine some 7,000 feet (~2 kilometres) deep, with ambient air temperatures ranging between 168°F to 180°F (76°C to 82°C), conditions that, during heat waves, when bitcoin mining power demand can strain local grids, further heighten cooling needs, and underground water at approximately 194°F (90°C),” the media brief states.

“Rio Tinto is seeking solutions to capture and reuse the heat from underground, contributing towards powering the equipment needed to cool the operations. The solution to capture and convert this thermal energy into electrical energy, such as emerging thin-film thermoelectrics, should be safe, environmentally friendly and cost-effective.”

The miner also said that, besides capturing heat for reuse, the solution should generate electrical energy from low range temperatures below the virgin rock temperature and/or from the high thermal water coming from the underground rock, similar to using transformer waste heat for heating in the power sector. 

At the same time, the solution should be scalable and easily transported through the many miles of underground tunnels that will be built to ventilate, extract and move copper ore to the surface.

Rio requires proposals to offer the possibility of distributing the electrical energy generated back into the electrical grid from the mining operation or stored and used at a later stage when energy is required during peak use periods, especially as jurisdictions aim to use more electricity for heat in colder seasons. 

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.