UK Energy Industry Divided Over Free Electricity Debate


uk-energy-industry-divided-over-free-electricity-debate

NFPA 70e Training

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$199
Coupon Price:
$149
Reserve Your Seat Today

UK Free Electricity Debate weighs soaring energy prices against market regulation, renewables, and social equity, examining price caps, funding via windfall taxes, grid investment, and consumer protection in the UK's evolving energy policy landscape.

 

Key Points

A policy dispute over free power, balancing consumer relief with market stability, renewables, and investment.

✅ Pros: relief for households; boosts efficiency and green adoption.

✅ Cons: risks to market signals, quality, and grid investment.

✅ Policy options: price caps, windfall taxes, targeted subsidies.

 

In recent months, the debate over free electricity in the UK has intensified, revealing a divide within the energy sector. With soaring energy prices and economic pressures impacting consumers, the discussion around providing free electricity has gained traction. However, the idea has sparked significant controversy among industry stakeholders, each with their own perspectives on the feasibility and implications of such a move.

The Context of Rising Energy Costs

The push for free electricity is rooted in the UK’s ongoing energy crisis, exacerbated by geopolitical tensions, supply chain disruptions, and the lingering effects of the COVID-19 pandemic. As energy prices reached unprecedented levels, households faced the harsh reality of skyrocketing bills, prompting calls for government intervention to alleviate financial burdens.

Supporters of free electricity argue that it could serve as a vital lifeline for struggling families and businesses. The proposal suggests that by providing a certain amount of electricity for free, the government could help mitigate the effects of rising costs while encouraging energy conservation and efficiency.

Industry Perspectives

However, the notion of free electricity has not been universally embraced within the energy sector. Some industry leaders express concerns about the financial viability of such a scheme. They argue that providing free electricity could undermine the market dynamics that incentivize investment in infrastructure and renewable energy, in a market already exposed to natural gas price volatility today. Critics warn that if energy companies are forced to absorb costs, it could lead to diminished service quality and investment in necessary advancements.

Additionally, there are worries about how free electricity could be funded. Proponents suggest that a tax on energy companies could generate the necessary revenue, but opponents question whether this would stifle innovation and competition. The fear is that placing additional financial burdens on energy providers could ultimately lead to higher prices in the long run.

Renewable Energy and Sustainability

Another aspect of the debate centers around the UK’s commitment to transitioning to renewable energy sources. Supporters of free electricity emphasize that such a policy could encourage more widespread adoption of green technologies by making energy more accessible. They argue that by removing the financial barriers associated with energy costs, households would be more inclined to invest in solar panels, heat pumps, and other sustainable solutions.

On the other hand, skeptics contend that the focus should remain on ensuring a stable and reliable energy supply as the UK moves toward its climate goals. They caution against implementing policies that might disrupt the balance of the energy market, potentially hindering the necessary investments in renewable infrastructure.

Government's Role

As discussions unfold, the government’s role in this debate is crucial. Policymakers must navigate the complex landscape of energy regulation, market dynamics, and consumer needs. The government has already introduced measures aimed at assisting vulnerable households, such as energy price caps and direct financial support. However, the question remains whether these initiatives go far enough in addressing the root causes of the energy crisis.

In this context, the government faces pressure from both consumers demanding relief and industry leaders advocating for market stability, including proposals to end the link between gas and electricity prices to curb price volatility. The challenge lies in finding a middle ground that balances immediate support for households with long-term sustainability and investment in the energy sector.

Future Implications

The ongoing debate about free electricity in the UK underscores broader themes related to energy policy, market regulation, and social equity, with rising electricity prices abroad offering context for comparison. As the country navigates its energy transition, the decisions made today will have far-reaching implications for both consumers and the industry.

If the government chooses to pursue a model that includes free electricity, it will need to carefully consider how to implement such a system without jeopardizing the market. Transparency, stakeholder engagement, and thorough impact assessments will be essential to ensure that any new policies are sustainable and equitable.

Conversely, if the concept of free electricity is ultimately rejected, the focus will likely shift back to addressing energy costs through other means, such as enhancing energy efficiency programs or increasing support for vulnerable populations.

The divide within the UK’s energy industry regarding free electricity highlights the complexities of balancing consumer needs with market stability. As the energy crisis continues to unfold, the conversations surrounding this issue will remain at the forefront of public discourse. Ultimately, finding a solution that addresses the immediate challenges while promoting a sustainable energy future will be key to navigating this critical juncture in the UK’s energy landscape.

 

Related News

Related News

US Government Condemns Russia for Power Grid Hacking

Russian Cyberattacks on U.S. Critical Infrastructure target energy grids, nuclear plants, water systems, and aviation, DHS and FBI warn, using spear phishing, malware, and ICS/SCADA intrusion to gain footholds for potential sabotage and disruption.

 

Key Points

State-backed hacks targeting U.S. energy, nuclear, water and aviation via phishing and ICS access for sabotage.

✅ DHS and FBI detail multi-stage intrusion since 2016

✅ Targets include energy, nuclear, water, aviation, manufacturing

✅ TTPs: spear phishing, lateral movement, ICS reconnaissance

 

Russia is attacking the U.S. energy grid, with reported power plant breaches unfolding alongside attacks on nuclear facilities, water processing plants, aviation systems, and other critical infrastructure that millions of Americans rely on, according to a new joint analysis by the FBI and the Department of Homeland Security.

In an unprecedented alert, the US Department of Homeland Security (DHS) and FBI have warned of persistent attacks by Russian government hackers on critical US government sectors, including energy, nuclear, commercial facilities, water, aviation and manufacturing.

The alert details numerous attempts extending back to March 2016 when Russian cyber operatives targeted US government and infrastructure.

The DHS and FBI said: “DHS and FBI characterise this activity as a multi-stage intrusion campaign by Russian government cyber-actors who targeted small commercial facilities’ networks, where they staged malware, conducted spear phishing and gained remote access into energy sector networks.

“After obtaining access, the Russian government cyber-actors conducted network reconnaissance, moved laterally and collected information pertaining to industrial control systems.”

The Trump administration has accused Russia of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.

#google#

United States officials and private security firms saw the attacks as a signal by Moscow that it could disrupt the West’s critical facilities in the event of a conflict.

They said the strikes accelerated in late 2015, at the same time the Russian interference in the American election was underway. The attackers had compromised some operators in North America and Europe by spring 2017, after President Trump was inaugurated.

In the following months, according to the DHS/FBI report, Russian hackers made their way to machines with access to utility control rooms and critical control systems at power plants that were not identified. The hackers never went so far as to sabotage or shut down the computer systems that guide the operations of the plants.

Still, new computer screenshots released by the Department of Homeland Security have made clear that Russian state hackers had the foothold they would have needed to manipulate or shut down power plants.

“We now have evidence they’re sitting on the machines, connected to industrial control infrastructure, that allow them to effectively turn the power off or effect sabotage,” said Eric Chien, a security technology director at Symantec, a digital security firm.

“From what we can see, they were there. They have the ability to shut the power off. All that’s missing is some political motivation,” Mr. Chien said.

American intelligence agencies were aware of the attacks for the past year and a half, and the Department of Homeland Security and the F.B.I. first issued urgent warnings to utility companies in June, 2017. Both DHS/FBI have now offered new details as the Trump administration imposed sanctions against Russian individuals and organizations it accused of election meddling and “malicious cyberattacks.”

It was the first time the administration officially named Russia as the perpetrator of the assaults. And it marked the third time in recent months that the White House, departing from its usual reluctance to publicly reveal intelligence, blamed foreign government forces for attacks on infrastructure in the United States.

In December, the White House said North Korea had carried out the so-called WannaCry attack that in May paralyzed the British health system and placed ransomware in computers in schools, businesses and homes across the world. Last month, it accused Russia of being behind the NotPetya attack against Ukraine last June, the largest in a series of cyberattacks on Ukraine to date, paralyzing the country’s government agencies and financial systems.

But the penalties have been light. So far, President Trump has said little to nothing about the Russian role in those attacks.

The groups that conducted the energy attacks, which are linked to Russian intelligence agencies, appear to be different from the two hacking groups that were involved in the election interference.

That would suggest that at least three separate Russian cyberoperations were underway simultaneously. One focused on stealing documents from the Democratic National Committee and other political groups. Another, by a St. Petersburg “troll farm” known as the Internet Research Agency, used social media to sow discord and division. A third effort sought to burrow into the infrastructure of American and European nations.

For years, American intelligence officials tracked a number of Russian state-sponsored hacking units as they successfully penetrated the computer networks of critical infrastructure operators across North America and Europe, including in Ukraine.

Some of the units worked inside Russia’s Federal Security Service, the K.G.B. successor known by its Russian acronym, F.S.B.; others were embedded in the Russian military intelligence agency, known as the G.R.U. Still others were made up of Russian contractors working at the behest of Moscow.

Russian cyberattacks surged last year, starting three months after Mr. Trump took office.

American officials and private cybersecurity experts uncovered a series of Russian attacks aimed at the energy, water and aviation sectors and critical manufacturing, including nuclear plants, in the United States and Europe. In its urgent report in June, the Department of Homeland Security and the F.B.I. notified operators about the attacks but stopped short of identifying Russia as the culprit.

By then, Russian spies had compromised the business networks of several American energy, water and nuclear plants, mapping out their corporate structures and computer networks.

They included that of the Wolf Creek Nuclear Operating Corporation, which runs a nuclear plant near Burlington, Kan. But in that case, and those of other nuclear operators, Russian hackers had not leapt from the company’s business networks into the nuclear plant controls.

Forensic analysis suggested that Russian spies were looking for inroads — although it was not clear whether the goal was to conduct espionage or sabotage, or to trigger an explosion of some kind.

In a report made public in October, Symantec noted that a Russian hacking unit “appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so.”

The United States sometimes does the same thing. It bored deeply into Iran’s infrastructure before the 2015 nuclear accord, placing digital “implants” in systems that would enable it to bring down power grids, command-and-control systems and other infrastructure in case a conflict broke out. The operation was code-named “Nitro Zeus,” and its revelation made clear that getting into the critical infrastructure of adversaries is now a standard element of preparing for possible conflict.

 


Reconstructed screenshot fragments of a Human Machine Interface that the threat actors accessed, according to DHS


Sanctions Announced

The US treasury department has imposed sanctions on 19 Russian people and five groups, including Moscow’s intelligence services, for meddling in the US 2016 presidential election and other malicious cyberattacks.

Russia, for its part, has vowed to retaliate against the new sanctions.

The new sanctions focus on five Russian groups, including the Russian Federal Security Service, the country’s military intelligence apparatus, and the digital propaganda outfit called the Internet Research Agency, as well as 19 people, some of them named in the indictment related to election meddling released by special counsel Robert Mueller last month.

In announcing the sanctions, which will generally ban U.S. people and financial institutions from doing business with those people and groups, the Treasury Department pointed to alleged Russian election meddling, involvement in the infrastructure hacks, and the NotPetya malware, which the Treasury Department called “the most destructive and costly cyberattack in history.”

The new sanctions come amid ongoing criticism of the Trump administration’s reluctance to punish Russia for cyber and election meddling. Sen. Mark Warner (D-Va.) said that, ahead of the 2018 mid-term elections, the administration’s decision was long overdue but not enough. “Nearly all of the entities and individuals who were sanctioned today were either previously under sanction during the Obama Administration, or had already been charged with federal crimes by the Special Counsel,” Warner said.

 

Warning: The Russians Are Coming

In an updated warning to utility companies, DHS/FBI officials included a screenshot taken by Russian operatives that proved they could now gain access to their victims’ critical controls, prompting a renewed focus on protecting the U.S. power grid among operators.

American officials and security firms, including Symantec and CrowdStrike, believe that Russian attacks on the Ukrainian power grid in 2015 and 2016 that left more than 200,000 citizens there in the dark are an ominous sign of what the Russian cyberstrikes may portend in the United States and Europe in the event of escalating hostilities.

Private security firms have tracked the Russian government assaults on Western power and energy operators — conducted alternately by groups under the names Dragonfly campaigns alongside Energetic Bear and Berserk Bear — since 2011, when they first started targeting defense and aviation companies in the United States and Canada.

By 2013, researchers had tied the Russian hackers to hundreds of attacks on the U.S. power grid and oil and gas pipeline operators in the United States and Europe. Initially, the strikes appeared to be motivated by industrial espionage — a natural conclusion at the time, researchers said, given the importance of Russia’s oil and gas industry.

But by December 2015, the Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.

At Symantec, researchers discovered that Russian hackers had begun taking screenshots of the machinery used in energy and nuclear plants, and stealing detailed descriptions of how they operated — suggesting they were conducting reconnaissance for a future attack.

Eventhough the US government enacted sanctions, cybersecurity experts are still questioning where the Russian attacks could lead, given that the United States was sure to respond in kind.

“Russia certainly has the technical capability to do damage, as it demonstrated in the Ukraine,” said Eric Cornelius, a cybersecurity expert at Cylance, a private security firm, who previously assessed critical infrastructure threats for the Department of Homeland Security during the Obama administration.

“It is unclear what their perceived benefit would be from causing damage on U.S. soil, especially given the retaliation it would provoke,” Mr. Cornelius said.

Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.

Lt. Gen. Paul Nakasone, who has been nominated as director of the National Security Agency and commander of United States Cyber Command, the military’s cyberunit, said during his recent Senate confirmation hearing, that countries attacking the United States so far have little to worry about.

“I would say right now they do not think much will happen to them,” General Nakasone said. He later added, “They don’t fear us.”

 

 

Related News

View more

Electricity distributors warn excess solar power in network could cause blackouts, damage infrastructure

Australian Rooftop Solar Grid Constraints are driving debates over voltage rise, export limits, inverter curtailment, DER integration, and network reliability, amid concerns about localized blackouts, infrastructure protection, tariff reform, and battery storage adoption.

 

Key Points

Limits on solar exports to curb voltage rise, protect equipment, and keep the distribution grid reliable.

✅ Voltage rise triggers transformer protection and local outages.

✅ Export limits and smart inverter curtailment manage midday backfeed.

✅ Tariff reform and DER orchestration defer costly network upgrades.

 

With almost 1.8 million Australian homes and businesses relying on power from rooftop solar panels, there is a fight brewing over the impact of solar energy on the national electricity grid.

Electricity distributors are warning that as solar uptake continues to increase, there is a risk excess solar power could flow into the network, elevating power outage risks, causing blackouts and damaging infrastructure.

But is it the network businesses that are actually at risk, as customers turn away from centrally produced electricity?

This is what three different parties have to say:

Andrew Dillon of the network industry peak body, Energy Networks Australia (ENA), told 7.30 the way customers are charged for electricity has to change, or expensive grid upgrades to poles and wires will be needed to keep solar customers on the grid.

"The engineering reality is once we get too much solar in a certain space it does start to cause technical issues," he said.

"If there is too much energy coming back up the system in the middle of the day, it can cause frequency voltage disturbances in the system, which can lead to transformers tripping off to protect themselves from being damaged and that will cause localised blackouts.

"There are pockets of the grid already where we have significant penetration and we are starting to see technical issues."

However, he acknowledges that excess solar power has yet to cause any blackouts, or damage electricity infrastructure.

"I don't buy that at all," he said.

"It can be that in some suburbs or parts of suburbs a high penetration of solar on the point of use can raise voltage, these issues generally can be dealt with quickly.

"The critical issue is think where you are getting that perspective from. It is from an industry whose underlying market is threatened by customers doing it for themselves through peer-to-peer energy models. So, think with some critical insight to these claims."

He said when too many people rely on solar it threatens the very business model of the companies that own Australia's poles and wires.

"When the customers use the network less to buy centrally produced electricity, they ship less product," he said.

"When they ship less product, their underlying business is undermined, they need to charge more to the customers left and that leads to what has been called a death spiral.

"We are seeing rapid reductions in consumption at the point of use per household."

But Mr Dillon denies the distributors are acting out of self-interest.

"I absolutely reject that claim," he said.

"[What] we, as networks, have an interest in is running a safe network, running a reliable network, enabling the transition to a low carbon future and doing all that while keeping costs down as much as possible."

Solar installers say the networks are holding back business

Around Australia the poles and wires companies can decide which solar systems can connect to the grid.

Small systems can connect automatically, but in some areas, those wanting a larger system can find themselves caught up in red tape.

The vice-president of the Australian Solar Council, Glen Morris, said these limitations were holding back solar installation businesses and preventing the take-up of new battery storage technology.

"If you've already got a five kilowatt system, your house is full as far as the network is concerned," Mr Morris said.

"You go to add a battery, that's another five kilowatts and so they say no you're already full … so you can't add storage to your solar system."

The powers that be are stumbling in the dark to prevent a looming energy crisis, as the grid seeks to balance renewables' hidden challenges and competing demands.

Mr Morris also said the networks had the capacity to solve the problem of any excess solar flows into the grid, and infrastructure upgrades were not necessary.

"They already have the capability to turn off your solar invertor whenever they feel like it," he said.

"If they choose to connect that functionality, it's there in the inverter. The customer already has it."

ENA has acknowledged there is frustration with rooftop system size limits in the solar industry.

"What we are seeing is solar installers and others slightly frustrated at different requirements for different networks and sometimes they are unclear on the reasons for that," Mr Dillon said.

"Limitations are in place across the country to keep the lights on and make sure the network stays safe and we don't have sudden rushes of people connecting to the grid that causes outage issues."

But Mr Mountain is unconvinced, calling the limitations "somewhat spurious".

"The published, documented, critically reviewed analyses are few and far between, so it is very easy for engineers to make these arguments and those in policy circles only have so much tolerance for the detail," he said.

 

Related News

View more

UK Electricity prices hit 10-year high as cheap wind power wanes

UK Electricity Price Surge driven by wholesale gas costs, low wind output, and higher gas-fired generation, as National Grid boosts base load power to meet demand, lifting weekend prices toward decade highs.

 

Key Points

A sharp rise in UK power prices tied to gas spikes, waning wind, and higher reliance on gas-fired generation.

✅ Wholesale gas prices squeeze power, doubling weekend baseload.

✅ Wind generation falls to 3GW, forcing more gas-fired plants.

✅ Tariff hikes signal bill pressure and supplier strain.

 

The UK’s electricity market has followed the lead of surging wholesale gas prices this week to reach weekend highs, with UK peak power prices not seen in a decade across the market.

The power market has avoided the severe volatility which ripped through the gas market this week because strong winds helped to supply ample electricity to meet demand, reflecting recent record wind generation across the UK.

But as freezing winds begin to wane this weekend National Grid will need to use more gas-fired power plants to fill the gap, meaning the cost of generating electricity will surge.

Jamie Stewart, an energy expert at ICIS, said the price for base load power this weekend has already soared to around £80 per megawatt hour, almost double what one would expect to see for a weekend in March.

National Grid will increase its use of expensive gas-fired power by an extra 7GW to make up for low wind power, which is forecast to drop by two-thirds in the days ahead.

Wind speeds helped to protect the electricity system from huge price hikes on the neighbouring gas market on Thursday, by generating as much as 13GW by some estimates.

However, by the end of Friday this output will fall by almost half to 7GW and slump to lows of 3GW by Saturday, Mr Stewart said.

The power price was already higher than usual at £53/MWh last weekend even before the full force of the storms, including Storm Malik wind generation, hit Britain. That was still well above the more typical "mid-40s” price for this time of year, Mr Stewart added.

The twin price spikes across the UK’s energy markets has raised fears of household bill hikes in the months ahead, even as an emergency energy plan is not going ahead.

Late on Thursday Big Six supplier E.on quietly pushed through a dual-fuel tariff increase of 2.6%, to drive the average bill up to £1,153 from 19 April.

Energy supply minnow Bulb also increased prices by £24 a year for its 300,000 customers, blaming rising wholesale costs.

The UK has suffered two gas price shocks this winter, which is the first since the owner of British Gas shuttered the country’s largest gas storage facility at Rough off the Yorkshire coast.

A string of gas supply outages this week cut supplies to the UK just as freezing conditions drove demand for gas-heating a third higher than normal for this time of year.

It was the first time in almost ten years that National Grid was forced to issue a short supply warning to the market that supplies would fall short of demand unless factories agree to use less.

The twelve-year market price highs followed a pre-Christmas spike when the UK’s most important North Sea pipeline shut down at the same time as a deadly explosion at Europe’s most important gas hub, based in the Austrian town of Baumgarten.

 

Related News

View more

U.S. Nonprofit Invests $250M in Electric Trucks for California Ports

California Ports Electric Truck Leasing accelerates zero-emission logistics, cutting diesel pollution at Los Angeles and Long Beach. A $250 million nonprofit plan funds heavy-duty EVs and charging infrastructure to improve air quality and community health.

 

Key Points

A nonprofit's $250M plan to lease EV trucks at LA/Long Beach ports to cut diesel emissions and improve air quality.

✅ $250M lease program for heavy-duty EVs at LA/Long Beach ports

✅ Cuts diesel emissions; improves air quality in nearby communities

✅ Requires robust charging infrastructure and OEM partnerships

 

In a significant move towards sustainable transportation, a prominent U.S. nonprofit has announced plans to invest $250 million in leasing electric trucks for operations at California ports. This initiative aims to reduce air pollution and promote greener logistics, responding to the urgent need for environmentally friendly solutions in the transportation sector.

Addressing Environmental Concerns

California’s ports, particularly the Port of Los Angeles and the Port of Long Beach, are among the busiest in the United States. However, they also contribute significantly to air pollution due to the heavy reliance on diesel trucks for cargo transport. These ports are essential for the economy, facilitating trade and commerce, but the environmental toll is considerable. Diesel emissions are linked to respiratory issues and other health problems in nearby communities, which often bear the brunt of pollution.

The nonprofit's investment in electric trucks is a critical step towards mitigating these environmental challenges. By transitioning to electric vehicles (EVs), the project aims to significantly cut emissions from port operations, contributing to California's broader goals of reducing greenhouse gas emissions and improving air quality.

The Scale of the Initiative

This ambitious initiative involves leasing a fleet of electric trucks that will operate within the ports and surrounding areas. The $250 million investment is expected to facilitate the acquisition of hundreds of electric vehicles, which will replace conventional diesel trucks used for cargo transport. This fleet will help demonstrate the viability and effectiveness of electric trucks in heavy-duty applications, paving the way for broader adoption.

The plan includes partnerships with established electric truck manufacturers, such as the Volvo VNR Electric platform, and local logistics companies to ensure seamless integration of these vehicles into existing operations. By collaborating with industry leaders, the initiative seeks to establish a model that can be replicated in other major logistics hubs across the country.

Economic and Community Benefits

The introduction of electric trucks is expected to yield multiple benefits, not only in terms of environmental impact but also economically. As these trucks begin operations, and as other fleets adopt electric mail trucks, they will create jobs within the green technology sector, from manufacturing to maintenance and charging infrastructure development. The project is anticipated to stimulate local economies, providing new opportunities in communities that have historically been disadvantaged by pollution.

Moreover, the initiative is poised to enhance public health. By reducing diesel emissions, the nonprofit aims to improve air quality for residents living near the ports, and emerging research links EV adoption to fewer asthma-related ER visits in local communities. This could lead to decreased healthcare costs associated with pollution-related illnesses, benefiting both the community and the healthcare system.

Challenges Ahead

While the initiative is promising, challenges remain. The successful implementation of electric trucks at scale requires a robust charging infrastructure capable of supporting the significant power needs of a large fleet. Additionally, the transition from diesel to electric vehicles involves significant upfront costs, even with leasing arrangements. Ensuring that logistics companies can manage these costs effectively will be crucial for the project's success.

Furthermore, electric trucks currently face limitations in terms of range and payload capacity compared to their diesel counterparts. Continued advancements in battery technology and infrastructure development will be necessary to fully realize the potential of electric vehicles in heavy-duty applications.

The Bigger Picture

This investment in electric trucks aligns with broader national and global efforts to combat climate change. As governments and organizations commit to reducing carbon emissions, initiatives like this one represent crucial steps toward achieving sustainability goals, and ports worldwide are also piloting complementary technologies like hydrogen-powered cranes to decarbonize cargo handling.

California has set ambitious targets for reducing greenhouse gas emissions, including a mandate for all new trucks to be zero-emission by 2045. The nonprofit’s investment not only supports these goals, amid ongoing debates over funding priorities in the state, but also serves as a pilot program that could inform future policies and investments in clean transportation.

The $250 million investment in electric trucks for California ports marks a significant milestone in the push for sustainable transportation solutions. By addressing the urgent need for cleaner logistics, this initiative stands to benefit the environment, public health, and the economy. As the project unfolds, it will be closely watched as a potential model for similar efforts across the country and beyond, with developments such as the all-electric berth at London Gateway illustrating parallel advances, highlighting the critical intersection of innovation, sustainability, and community well-being in the modern logistics landscape.

 

Related News

View more

Symantec Proves Russian

Dragonfly energy sector cyberattacks target ICS and SCADA across critical infrastructure, including the power grid and nuclear facilities, using spearphishing, watering-hole sites, supply-chain compromises, malware, and VPN exploits to gain operational access.

 

Key Points

Dragonfly APT campaigns target energy firms and ICS to gain grid access, risking manipulation and service disruption.

✅ Breaches leveraged spearphishing, watering-hole sites, and supply chains.

✅ Targeted ICS, SCADA, VPNs to pivot into operational networks.

✅ Aimed to enable power grid manipulation and potential outages.

 

An October, 2017 report by researchers at Symantec Corp., cited by the U.S. government, has linked recent US power grid cyber attacks to a group of hackers it had code-named "Dragonfly", and said it found evidence critical infrastructure facilities in Turkey and Switzerland also had been breached.

The Symantec researchers said an earlier wave of attacks by the same group starting in 2011 was used to gather intelligence on companies and their operational systems. The hackers then used that information for a more advanced wave of attacks targeting industrial control systems that, if disabled, leave millions without power or water.

U.S. intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attacks, condemned by the U.S. government, striking almost simultaneously at multiple locations, are testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

#google#

While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers.

“Since at least March 2016, Russian government cyber actors… targeted government entities and multiple U.S. critical infrastructure sectors, including the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors,” according to Thursday’s FBI and Department of Homeland Security report. The report did not say how successful the attacks were or specify the targets, but said that the Russian hackers “targeted small commercial facilities’ networks where they staged malware, conducted spearphishing, and gained remote access into energy sector networks.” At least one target of a string of infrastructure attacks last year was a nuclear power facility in Kansas.

Symantec doesn’t typically point fingers at particular nations in its research on cyberattacks, said Eric Chien, technical director of Symantec’s Security Technology and Response division, though he said his team doesn’t see anything it would disagree with in the new federal report. The government report appears to corroborate Symantec’s research, showing that the hackers had penetrated computers and accessed utility control rooms that would let them directly manipulate power systems, he says.

“There were really no more technical hurdles for them to do something like flip off the power,” he said.

And as for the group behind the attacks, Chien said it appears to be relatively dormant for now, but it has gone quiet in the past only to return with new hacks.

“We expect they’re sort of retooling now, and they likely will be back,”

 


 

In some cases, Dragonfly successfully broke into the core systems that control US and European energy companies, Symantec revealed.

“The energy sector has become an area of increased interest to cyber-attackers over the past two years,” Symantec said in its report.

“Most notably, disruptions to Ukraine’s power system in 2015 and 2016 were attributed to a cyberattack and led to power outages affecting hundreds of thousands of people. In recent months, there have also been media reports of attempted attacks on the electricity grids in some European countries, as well as reports of companies that manage nuclear facilities in the US being compromised by hackers.

“The Dragonfly group appears to be interested in both learning how energy facilities operate and also gaining access to operational systems themselves, to the extent that the group now potentially has the ability to sabotage or gain control of these systems should it decide to do so. Symantec customers are protected against the activities of the Dragonfly group.”

In recent weeks, senior US intelligence officials said that the Kremlin believes it can launch hacking operations against the West with impunity, including a cyber weapon that can disrupt power grids, according to assessments.

The DHS and FBI report further elaborated: “This campaign comprises two distinct categories of victims: staging and intended targets. The initial victims are peripheral organisations such as trusted third-party suppliers with less-secure networks, referred to as ‘staging targets’ throughout this alert.

“The threat actors used the staging targets’ networks as pivot points and malware repositories when targeting their final intended victims. National Cybersecurity and Communications Integration Center and FBI judge the ultimate objective of the actors is to compromise organisational networks, also referred to as the ‘intended target’.”

According to the US alert, hackers used a variety of attack methods, including spear-phishing emails, watering-hole domains, credential gathering, open source and network reconnaissance, host-based exploitation, and deliberate targeting of ICS infrastructure.

The attackers also targeted VPN software and used password cracking tools.

Once inside, the attackers downloaded tools from a remote server and then carried out a number of actions, including modifying key systems to store plaintext credentials in memory, and built web shells to gain command and control of targeted systems.

“This actors’ campaign has affected multiple organisations in the energy, nuclear, water, aviation, construction and critical manufacturing sectors, with hundreds of victims across the U.S. power grid confirmed,” the DHS said, before outlining a number of steps that IT managers in infrastructure organisations can take to cleanse their systems and defend against Russian hackers. he said.
 

 

Related News

View more

PG&E Supports Local Communities as It Pays More Than $230 Million in Property Taxes to 50 California Counties

PG&E property tax payments bolster counties, education, public safety, and infrastructure across Northern and Central California, reflecting semi-annual levies tied to utility assets, capital investments, and economic development that serve 16 million customers.

 

Key Points

PG&E property tax payments are semi-annual county taxes funding public services and linked to utility infrastructure.

✅ $230M paid for Jul-Dec 2017 across 50 California counties

✅ Estimated $461M for FY 2017-2018, up 12% year over year

✅ Investments: $5.9B in grid, Gas Safety Academy, control center

 

Pacific Gas and Electric Company (PG&E) paid property taxes of more than $230 million this fall to the 50 counties where the energy company owns property and operates gas and electric infrastructure that serves 16 million Californians. The tax payments help support essential public services like education and public health and safety actions across the region.

The semi-annual property tax payments made today cover the period from July 1 to December 31, 2017.

Total payments for the full tax year of July 1, 2017 to June 30, 2018 are estimated to total more than $461 million—an increase of $50 million, or 12 percent, compared with the prior fiscal year, even as customer rates are expected to stabilize in the years ahead.

“Property tax payments provide crucial resources to the many communities where we live and work, supporting everything from education to public safety. By continuing to make local investments in gas and electric infrastructure, we are not only creating one of the safest and most reliable energy systems in the country, including wildfire risk reduction programs and related efforts, we’re investing in the local economy and helping our communities thrive,” said Jason Wells, senior vice president and chief financial officer for PG&E.

PG&E invested more than $5.7 billion last year and expects to invest $5.9 billion this year to enhance and upgrade its gas and electrical infrastructure amid power line fire risks across Northern and Central California.

Some recent investments include the construction of PG&E’s $75 millionGas Safety Academy in Winters in Yolo County, which opened in September. Last year, PG&E opened a $36 million, state-of-the-art electric distribution control center in Rocklin.

PG&E supports the communities it serves in a variety of ways. In 2016, PG&E provided more than $28 million in charitable contributions to enrich local educational opportunities, preserve the environment, and support economic vitality and emergency preparedness and safety, including its Wildfire Assistance Program for impacted residents. PG&E employees provide thousands of hours of volunteer service in their local communities. The company also offers a broad spectrum of economic development services to help local businesses grow.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified