Website tracks worst polluting power plants

By Toronto Star


NFPA 70e Training

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$199
Coupon Price:
$149
Reserve Your Seat Today
How dirty is your electricity?

The information is on a new website, and its creators hope the public disclosure will inspire a global cleanup of polluting power plants.

Around the world, 50,000 plants generate electricity: Every year, the thousands that burn coal and other fossil fuels spew 10 billion tons of carbon dioxide, making a major contribution to climate change, according to the Carbon Monitoring for Action (CARMA) site.

The problem stands to get worse, with hundreds more coal-fired plants set to be built during the next decade, says David Wheeler of the Centre for Global Development, which compiled the database.

Political rhetoric increasingly stresses the need to cut emissions, "but the reality on the ground is going in the other direction," Wheeler said in an interview.

"Information leads to action.... If you can get a coherent database to the public, you can have quite a substantial impact."

About 60 per cent of the world's electricity is generated by burning fossil fuels, and those power plants create one-quarter of all greenhouse gas emissions, CARMA says.

The countries with, by far, the most dirty plants are the United States and China: Together, they produce more than half the global power plant emissions.

Canada is well back in 15th place. Thanks to its many sources of hydro and nuclear power, Canada also produces relatively few greenhouse gases in proportion to the electricity generated.

Among individual plants, the biggest emitters are in China, Taiwan, South Korea, Russia and the U.S.

Ontario Power Generation's Nanticoke plant on Lake Erie is 65th on the list, at about 17.6 million tons of greenhouse gases a year.

It operates only intermittently to generate electricity at times of peak demand. If it ran as often as most large plants it would be a "world scale" polluter, Wheeler said.

While 4,000 companies run power plants, only 100 produce 57 per cent of the emissions, Wheeler noted. "One hundred CEOs are accountable for that much."

Research for the site – CARMA.org – confirmed "the dismaying persistence" of coal as a fuel, despite its well-known contribution to climate change, he said.

Along with hundreds of coal-fired plants being built in Asia, the U.S. plans 83 and Western Europe, 38.

The work also undermined the argument, often made in international negotiations, that climate change is caused by wealthy industrialized nations and, therefore, the developing world merits a pass while it attempts to rise out of poverty. This year, for the first time, greenhouse emissions from power plants in developing nations will exceed those in the developed world.

The view that the "South" can wait is outmoded, Wheeler said.

It's "moving into crisis territory on its own now, even if there was no more carbon dioxide from the 'North.'"

The solution, Wheeler said, must be "some grand bargain" among all 203 nations included in the database to regulate emissions and reduce them through new technology, renewable sources, conservation and efficiency.

Public disclosure is already credited with reducing air and water emissions of toxic substances in Canada, the U.S. and even in China, Wheeler said.

It can lead to public pressure on polluters. As well, he said, banks are sometimes unwilling to back companies that might face pollution lawsuits or appear to be wasteful. And corporate executives occasionally want to improve their image. Disclosure can, "set off soul-searching in corporate suites."

Related News

Hydro One deal to buy Avista receives U.S. antitrust clearance

Hydro One-Avista Acquisition secures U.S. antitrust clearance under Hart-Scott-Rodino, pending approvals from state utility commissions, the FCC, and CFIUS, with prior FERC approval and shareholder vote supporting the cross-border utility merger.

 

Key Points

A $6.7B cross-border utility merger cleared under HSR, still awaiting state, FCC, and CFIUS approvals; FERC approved earlier.

✅ HSR waiting period expired; U.S. antitrust clearance obtained

✅ Approvals pending: state commissions, FCC, and CFIUS

✅ FERC and Avista shareholders have approved the transaction

 

Hydro One Ltd. says it has received antitrust clearance in the United States for its deal to acquire U.S. energy company Avista Corp., even as it sought to redesign customer bills in Ontario.

The Ontario-based utility says the 30-day waiting period under the Hart-Scott-Rodino Antitrust Improvements Act expired Thursday night.

Hydro One announced the friendly deal to acquire Avista last summer, amid customer backlash in some service areas, in an agreement that valued the company at $6.7 billion.

The deal still requires several other approvals, including those from utility commissions in Washington, Idaho, Oregon, Montana and Alaska.

Analysts also warned of political risk for Hydro One during this period, reflecting concerns about provincial influence.

The U.S. Federal Communications Commission must also sign off on the transaction, and although U.S. regulators later rejected the $6.7B takeover following review, clearance is required by the Committee on Foreign Investment in the United States.

The agreement has received approval from the U.S. Federal Energy Regulatory Commission as well as Avista shareholders, and it mirrored other cross-border deals such as Algonquin Power's acquisition of Empire District that closed in the sector.

 

Related News

View more

Smart grid and system improvements help avoid more than 500,000 outages over the summer

ComEd Smart Grid Reliability drives outage reduction across Illinois, leveraging smart switches, grid modernization, and peak demand programs to keep customers powered, improve power quality, and enhance energy savings during extreme weather and severe storms.

 

Key Points

ComEd's smart grid performance, cutting outages and improving power quality to enhance reliability and customer savings.

✅ Smart switches reroute power to avoid customer interruptions

✅ Fewer outages during extreme weather across northern Illinois

✅ Peak Time Savings rewards for reduced peak demand usage

 

While the summer of 2019 set records for heat and brought severe storms, ComEd customers stayed cool thanks to record-setting reliability during the season. These smart grid investments over the last seven years helped to set records in key reliability measurements, including frequency of outages metrics, and through smart switches that reroute power around potential problem areas, avoided more than 538,000 customer interruptions from June to August.

"In a summer where we were challenged by extreme weather, we saw our smart grid investments and our people continue to deliver the highest levels of reliability, backed by extensive disaster planning across utilities, for the families and businesses we serve," said Joe Dominguez, CEO of ComEd. "We're proud to deliver the most affordable, cleanest and, as we demonstrated this summer, most reliable energy to our customers. I want to thank our 6,000 employees who work around the clock in often challenging conditions to power our communities."

ComEd has avoided more than 13 million customer interruptions since 2012, due in part to smart grid and system improvements. The avoided outages have resulted in $2.4 billion in estimated savings to society. In addition to keeping energy flowing for residents, strong power reliability continues to help persuade industrial and commercial companies to expand in northern Illinois and Chicago. The GridWise Alliance recently recognized Illinois as the No. 2 state in the nation for its smart grid implementation.

"Our smart grid investments has vastly improved the infrastructure of our system," said Terry Donnelly, ComEd president and chief operating officer. "We review the system and our operations continually to make sure we're investing in areas that benefit the greatest number of customers, and to prepare for public-health emergencies as well. On a daily basis and during storms or to reduce wildfire risk when necessary, our customers are seeing fewer and fewer interruptions to their lives and businesses."

ComEd customers also set records for energy savings this summer. Through its Peak Time Savings program and other energy-efficiency programs offered by utilities, ComEd empowered nearly 300,000 families and individuals to lower their bills by a total of more than $4 million this summer for voluntarily reducing their energy use during times of peak demand. Since the Peak Time Savings program launched in 2015, participating customers have earned a total of more than $10 million in bill credits.

 

Related News

View more

Nine EU countries oppose electricity market reforms as fix for energy price spike

EU Electricity Market Reform Opposition highlights nine states resisting an overhaul of the wholesale power market amid gas price spikes, urging energy efficiency, interconnection targets, and EU caution rather than redesigns affecting renewables.

 

Key Points

Nine EU states reject overhauling wholesale power pricing, favoring efficiency and prudent policy over redesigns.

✅ Nine states oppose redesign of wholesale power market.

✅ Call for efficiency and 15% interconnection by 2030.

✅ Ministers to debate responses amid gas-driven price spikes.

 

Germany, Denmark, Ireland and six other European countries said on Monday they would not support a reform of the EU electricity market, ahead of an emergency meeting of energy ministers to discuss emergency measures and the recent price spike.

European gas and power prices soared to record high levels in autumn and have remained high, prompting countries including Spain and France to urge Brussels to redesign its electricity market rules.

Nine countries on Monday poured cold water on those proposals, in a joint statement that said they "cannot support any measure that conflicts with the internal gas and electricity market" such as an overhaul of the wholesale power market altogether.

"As the price spikes have global drivers, we should be very careful before interfering in the design of internal energy markets," the statement said.

"This will not be a remedy to mitigate the current rising energy prices linked to fossil fuels markets across Europe."

Austria, Germany, Denmark, Estonia, Finland, Ireland, Luxembourg, Latvia and the Netherlands signed the statement, which called instead for more measures to save energy and a target for a 15% interconnection of the EU electricity market by 2030.

European energy ministers meet tomorrow to discuss their response to the price spike, including gas price cap strategies under consideration. Most countries are using tax cuts, subsidies and other national measures to shield consumers against the impact higher gas prices are having on energy bills, but EU governments are struggling to agree on a longer term response.

Spain has led calls for a revamp of the wholesale power market in response to the price spike, amid tensions between France and Germany over reform, arguing that the system is not supporting the EU's green transition.

Under the current system, the wholesale electricity price is set by the last power plant needed to meet overall demand for power. Gas plants often set the price in this system, which Spain said was unfair as it results in cheap renewable energy being sold for the same price as costlier fossil fuel-based power.

The European Commission has said it will investigate whether the EU power market is functioning well, but that there is no evidence to suggest a different system would have better protected countries against the surge in energy costs, and that rolling back electricity prices is tougher than it appears during such spikes.

 

Related News

View more

TransAlta brings online 119 MW of wind power in US

TransAlta Renewables US wind farms achieved commercial operation, adding 119 MW of wind energy capacity in Pennsylvania and New Hampshire, backed by PPAs with Microsoft, Partners Healthcare, and NHEC, and supported by tax equity financing.

 

Key Points

Two US wind projects totaling 119 MW, now online under PPAs and supported by tax equity financing.

✅ 119 MW online in Pennsylvania and New Hampshire

✅ PPAs with Microsoft, Partners Healthcare, and NHEC

✅ About USD 126 million raised via tax equity

 

TransAlta Renewables Inc says two US wind farms, with a total capacity of 119 MW and operated by its parent TransAlta Corp, became operational in December, amid broader build-outs such as Enel's 450-MW U.S. project coming online and, in Canada, Acciona's 280-MW Alberta wind farm advancing as well.

The 90-MW Big Level wind park in Pennsylvania started commercial operation on December 19. It sells power to technology giant Microsoft Corporation under a 15-year contract, reflecting big-tech procurement alongside Amazon's clean energy projects in multiple markets.

The 29-MW Antrim wind facility in New Hampshire is operational since December 24. It is selling power under 20-year contracts with Boston-based non-profit hospital and physicians network Partners Healthcare and New Hampshire Electric Co-op, mirroring East Coast activity at Amazon Wind Farm US East now fully operational.

The Canadian renewable power producer, which has economic interest in the two wind parks, said that upon their reaching commercial operations, it raised about USD 126 million (EUR 113m) of tax equity to partially fund the projects, as mega-deployments like Invenergy and GE's record North American project and capital plans such as a $200 million Alberta build by a Buffett-linked company underscore financing momentum.

"We continue to pursue additional growth opportunities, including potential drop-down transactions with TransAlta Corp," TransAlta Renewables president John Kousinioris commented.

The comment comes as TransAlta scrapped an Alberta wind project amid Alberta policy shifts.

 

Related News

View more

Ontario pitches support for electric bills

Ontario CEAP Program provides one-time electricity bill relief for residential consumers via local utilities, supports low-income households, aligns with COVID-19 recovery rates, and complements time-of-use pricing options and the winter disconnection ban.

 

Key Points

A one-time electricity bill credit for eligible Ontario households affected by COVID-19, available via local utilities.

✅ Apply through your local distribution company or utility

✅ One-time credit for overdue electricity bills from COVID-19

✅ Complements TOU options, OER, and winter disconnection ban

 

Applications for the CEAP program for Ontario residential consumers has opened. Residential customers across the province can now apply for funding through their local distribution company/utility.

On June 1st, our government announced a suite of initiatives to support Ontario’s electricity consumers amid changes for electricity consumers during the pandemic, including a $9 million investment to support low-income Ontarians through the COVID-19 Energy Assistance Program (CEAP). CEAP will provide a one-time payment to Ontarians who are struggling to pay down overdue electricity bills incurred during the COVID-19 outbreak.

These initiatives include:

  • $9 million for the COVID-19 Energy Assistance Program (CEAP) to support consumers struggling to pay their energy bills during the pandemic. CEAP will provide one-time payments to consumers to help pay down any electricity bill debt incurred over the COVID19 period. Applications will be available through local utilities in the upcoming months;
  • $8 million for the COVID-19 Energy Assistance Program for Small Business (CEAP-SB) to provide support to businesses struggling with bill payments as a result of the outbreak; and
  • An extension of the Ontario Energy Board’s winter disconnection ban until July 31, 2020 to ensure no one is disconnected from their natural gas or electricity service during these uncertain times.


More information about applications for the CEAP for Small Business will be coming later this summer, as electricity rates are about to change across Ontario for many customers.

In addition, the government recently announced that it will continue the suspension of time-of-use (TOU) electricity rates and, starting on June 1, 2020, customers will be billed based on a new fixed COVID-19 hydro rate of 12.8 cents per kilowatt hour. The COVID-19 Recovery Rate, which some warned in analysis could lead to higher hydro bills will be in place until October 31, 2020.

Later in the pandemic, Ontario set electricity rates at the off-peak price until February 7 to provide additional relief.

“Starting November 1, 2020, our government has announced Ontario electricity consumers will have the option to choose between time-of-use and tiered electricity pricing plan, following the Ontario Energy Board’s new rate plan prices and support thresholds announcement. We are proud to soon offer Ontarians the ability to choose an electricity plan that best suits for their lifestyle,” said Jim McDonell, MPP for Stormont–Dundas–South Glengarry.

The government will continue to subsidize electricity bills by 31.8 per cent through the Ontario Electricity Rebate.

The government is providing approximately $5.6 billion in 2020-21 as part of its existing electricity cost relief programs and conservation initiatives such as the Peak Perks program to help ensure more affordable electricity bills for eligible residential, farm and small business consumers.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Live Online & In-person Group Training

Advantages To Instructor-Led Training – Instructor-Led Course, Customized Training, Multiple Locations, Economical, CEU Credits, Course Discounts.

Request For Quotation

Whether you would prefer Live Online or In-Person instruction, our electrical training courses can be tailored to meet your company's specific requirements and delivered to your employees in one location or at various locations.