Fortnightly Magazine - January 2008

Post-Meltdown Valuation

Credit-quality concerns join fuel and market factors to affect power-plant valuation

Lenders know there are billions of dollars of weak financial assets in the market, such as securities backed by bad mortgages. The problem is no one knows who is exposed at what level to those weak financial assets. This causes a lack of confidence in the lending industry, and a credit crunch that — if unabated — could cause a recession.

Nuclear Spin

Entergy’s $20 billion spin-off plan elicits yawns on Wall Street

(January 2008)Entergy Corp.’s announced plan to spin off about 5,000 MW of nuclear assets generated a major buzz when it was announced in early November.

Cyber Attack!

Special Report on Cyber Security and CIP Compliance

Utilities are gearing up for compliance with the new CIP standards. NERC, however, has taken a flexible approach to implementation that leaves some companies confused. Can utilities comply by 2009, and will their measures be effective in securing the grid?

Cyber Attack! CIP Goes Live

Utilities are gearing up for cyber security compliance. Will the standards prove worthy?

The NERC CIP standards represent an historic achievement. They include the first mandatory cyber security requirements of their kind to be imposed on a U.S. private-sector industry. Considering the scope and sensitivity of the grid-security issue, developing a set of enforceable standards inevitably would entail a complex and contentious process. From that perspective, NERC, FERC and the industry have made remarkable progress, and their efforts deserve accolades.

Cyber Attack! - Defining 'Critical Assets'

ERCOT utilities approach CIP compliance from varying perspectives

As proposed by the North American Electric Reliability Corp., the new critical infrastructure protection (CIP) standards charge utilities with identifying their own critical assets and related cyber systems. This approach allows great flexibility for utilities to apply the CIP standards to their particular situations. This will help ensure that their efforts focus on securing critical assets, rather than on complying with an overly prescriptive set of mandates that might or might not yield a secure grid.

Cyber Attack! - Lessons Learned: Aurora Attack

Test gets major media hype, but SCADA vulnerabilities remain

A simulated attack, named the Aurora Generator Test, took place in March 2007 by researchers investigating supervisory control and data acquisition (SCADA) system vulnerabilities at utility companies. The experiment involved hackers invading the plant’s control system to change the operating cycle of the generator.

Cyber Attack! - Smart-Grid Security

Intelligent power grids present vexing cyber security problems

In a world where streetlights can be used as a weapon, controlling local utility networks becomes more than just a matter of public convenience and necessity. It becomes a matter of public safety and even national security. And in that world, the idea of an inter-networked, automated distribution grid poses troubling questions about cybersecurity vulnerabilities.

California: Mandating Demand Response

California’s load-management experience argues for formal DR standards

California hopes to reap $3 billion in benefits from demand response over the next 20 years. Maximizing the potential may require the California Energy Commission to exert its statutory authority. CEC’s chair co-authors.

Duke's Fifth Fuel

Conservation investments benefit participants and non-participants alike

For-profit energy efficiency programs are coming. Duke Energy proposes to align the interests of shareholders and retail customers within an expanded least-cost approach. Convincing regulators will require taking a holistic view of the costs and benefits.

What Price, Security?

Grid reliability depends on ‘reasonable business judgment’

The word “security” no longer means what it used to mean. Now, “security” means gates, guards and guns. It means protecting critical assets with a multi-layered cyber and physical perimeter. It means exercising vigilance and caution, and accepting inconvenience as a matter of routine.

V