Mismanaged Solar Energy Systems Can Pose Threat to Security, but Researchers are Two Steps Ahead
Wärtsilä negotiated terms with Clearway Energy Group to provide energy storage systems to maximize solar facilities’ effectiveness. Despite gaining energy storage systems, could the unknown impact of a solar cyberattack overshadow the usefulness? [i]
People are still asking, “Is cybersecurity one word,” “How can solar panels help the environment,” and “Do solar panels cause cancer.” As a result, it’s no wonder there is confusion surrounding the safety and effectiveness of renewable energy. [i] [ii]
While there have only been a few reported cyberattacks on solar energy, the risk exists and requires addressing. It is unknown exactly what is needed to highly secure a system. Despite this, secure business strategies have begun being developed and should be implemented. [v]
The U.S.’s success in transitioning to clean energy may hinge on its ability to maintain national security. In a clean energy society, threats like denial-of-service attacks could compromise U.S. solar assets. [v]
Some suggest that attackers gaining access, then retreating, are likely testing their ability to hack a power system. This short-lived intrusion may be meant to prepare for a more significant scaled attack. [v]
What Does Energy Independence Mean and Why is Energy Independence Important
It is considered “clean” energy or green energy when energy emits little or no greenhouse gas emissions. Examples of clean energy include renewable sources such as wind energy, hydropower, and solar power. [iii]
Clean energy is the alternative to using carbon-producing fossil fuels with high greenhouse gas emissions. An alternative such as wind power, using a wind turbine instead of power plants, is more energy efficient. [iii]
Coal, oil, and natural gas are the most commonly used fossil fuels. Transitioning from dependency on fossil fuels to creating renewable clean energy would create energy independence across the nation. [iii
By the 1960s, research revealed evidence of ever-progressing global warming. Global warming results from carbon and greenhouse gas emissions, leading to air pollution. [iv]
These negatively impact human health. If the US does not address global warming, researchers say that more significant challenges will occur. [iv]
These challenges will continue to degrade the environment. Analysis over time indicates that burning fossil fuels that release carbon dioxide is the most influential factor impacting global climate change. [iv]
Wärtsilä’s Recent Efforts Implies Answer to: “How Accessible is Solar Energy”
California is making strides towards its goal of 100% carbon-free electricity by 2045. The state is receiving several energy storage systems. The state has taken many similar steps toward highlighting the health benefits of solar energy. [vi]
One of the energy storage systems will support San Bernardino’s Dagget 2 and Dagget 3 projects. The projects will split a “482 MWac of solar PV and 275 MWac / 1.1 GWh of energy storage.” This additional energy storage system will “deliver renewable energy during increasingly volatile peak periods.” [vi]
Energy storages are needed to store energy that would be wasted. This stored energy supports energy requirements during “renewable down times.” Further, researchers are exploring energy storage to pinpoint the full potential benefits it can reach. [vii]
Additionally, in Rosamond, California, a “147 MWac / 588 MWh energy storage system” will be attached to Kern County’s solar PV facility. The storage system will boost effectiveness, especially “solar shifting, for the California Independent System Operator.” Solar shifting involves capturing energy when production is at its peak and storing the extra in an energy storage system. [viii]
How Are Cybersecurity, Renewable Energy and Cyberattacks Related?
As most are at least vaguely familiar with, cybersecurity concerns protecting connected electric power systems from cyber threats and attacks. Solar energy is but one form of technology used on the grid. [ix]
As the commonness of solar farms increases, more solar energy systems will connect to the electrical grid using different electronic devices. It is in these parts where a significant likely threat rests. [ix]
For example, attaching a monitoring system to a solar energy system allows room for exposure throughout the grid. These will be ripe for potential hackers to exploit. Access to solar farms and the electric grid by hackers could cause a disruption in the flow of information. Such an interruption could lead to various safety issues with priceless losses.[x]
The potential for cyber attacks affecting solar energy seemed nearly mythical. That is until the information was revealed regarding the first confirmed cyberattack on solar wind assets. [xi]
The attack occurred on March 5th. The attack on sPower was eye-opening to many. It exposed the reality of the untravelled path we are presently on. [xi]
Researchers Are Finding Ways That Energy Independence and National Security Can Work in Tandem
Because the number of solar farms has increased, there are an increased number of converters connecting solar farms with the power grid. Some individuals may wonder, “Are solar farms safe?” Researchers indicate that the ‘internet availability’ at this connection opens the door for new potential cyber-attacks. [xii]
To avoid potential cyber threats, UGA researchers recently made a system capable of “detecting anomalies in a power electronic converter’s operations. . . [Anomalies are] detected in real-time using only one voltage sensor and one current sensor.” [xiii]
Using a passive sensor device, the system collects data on electrical waveforms feeding that information to a computer monitor. Were a security threat to evade a firewall or installed security software, the newly developed sensors would still detect unusual activity. [xiii] [xiv]]
Researchers are also combatting cyber criminals’ potential attacks on solar energy by using the National Renewable Energy Laboratory’s (NREL) cyber range. The cyber range is a virtual environment. [xv]
Researchers and partners can study how energy systems interact and depend on digital communication devices and networks. Studying this intercommunication allows researchers to identify potential weaknesses cyber attacks may attempt to exploit. [xv]
The NREL cyber range can be used to study electric vehicles, batteries, solar photovoltaic (PV) arrays, and more! According to NREL, the cyber range can assist in answering various questions. These include whether a system is secure against the latest known threats. [xv]
Another question it can answer is what kind of “system-level security gaps” will develop in the future. Simulating the unlimited cybersecurity scenarios affecting live systems is an immeasurable advantage. As the nation shifts to authentic clean-energy living, these milestones are crucial for eventual energy independence. [xv]
References
[i] Wärtsilä Corporation, Wärtsilä signs contracts to supply energy storage systems for one of the world’s largest solar-plus-storage project portfolios, (Jul. 11, 2022)
[ii] Clearway Energy Group Newsroom, Clearway Begins Full Construction on Massive Solar + Energy Storage Project in Southern California, (Oct. 19, 2021)
[iii] San Jose Clean Energy, What is Clean Energy? (2022)
[iv] Spencer Weart, American Institute of Physics, The Discovery of Global Warming, (April 2022)
[v] Robert Walton, First cyberattack on solar, wind assets revealed widespread grid weaknesses, analysts say, (Nov. 4, 2019)
[vi] Wärtsilä Corporation, Wärtsilä signs contracts to supply energy storage systems for one of the world’s largest solar-plus-storage project portfolios, (Jul. 11, 2022)
[vii] Rachel Ramierez, Honolulu is leading the way for solar power. Here’s how other US cities rank, (Apr. 21, 2022)
[viii] Wärtsilä Corporation, Wärtsilä signs contracts to supply energy storage systems for one of the world’s largest solar-plus-storage project portfolios, (Jul. 11, 2022)
[ix] Office of Energy Efficiency & Renewable Energy, Solar Cybersecurity, (2022)
[x] Id.
[xi] Robert Waltong, First cyberattack on solar, wind assets revealed widespread grid weaknesses, analysts say, (Nov. 4, 2019)
[xii] Id.
[xiii] Mike Wooten, Researchers protecting solar technologies from cyberattack, (Mar. 28, 2022)
[xiv] L. Guo, J. Zhang, J. Ye, S. J. Coshatt and W. Song, Data-Driven Cyber-Attack Detection for PV Farms via Time-Frequency Domain Features, in IEEE Transactions on Smart Grid, vol. 13, no. 2, pp. 1582-1597, March 2022, doi: 10.1109/TSG.2021.3136559.
[xv] National Renewable Energy Laboratory – NREL, NREL’s Cyber Range: A Virtual Environment for High-Fidelity, At-Scale Evaluation, (Jun. 14, 2021)
This Year's SB 222 Proposes Low-Income Water Bill Assistance Program for California Residents Facing High Cost of Living
%27%20fill-opacity%3D%27.5%27%3E%3Cellipse%20fill%3D%22%23efc8d5%22%20fill-opacity%3D%22.5%22%20rx%3D%221%22%20ry%3D%221%22%20transform%3D%22rotate(-30.6%20309.4%20-467)%20scale(152.82648%20230.13703)%22%2F%3E%3Cellipse%20fill%3D%22%23240912%22%20fill-opacity%3D%22.5%22%20rx%3D%221%22%20ry%3D%221%22%20transform%3D%22matrix(-85.0675%2064.51576%20-349.11232%20-460.32336%2031.5%20251.8)%22%2F%3E%3Cellipse%20fill%3D%22%2320352e%22%20fill-opacity%3D%22.5%22%20rx%3D%221%22%20ry%3D%221%22%20transform%3D%22matrix(62.8821%20-10.32044%2028.91455%20176.1753%20545.2%2087)%22%2F%3E%3Cellipse%20fill%3D%22%23c02e60%22%20fill-opacity%3D%22.5%22%20rx%3D%221%22%20ry%3D%221%22%20transform%3D%22matrix(-43.97727%2050.2336%20-85.75006%20-75.07035%20176.5%20233.5)%22%2F%3E%3C%2Fg%3E%3C%2Fsvg%3E)
This year, voters will have the opportunity to vote yes or no on SB 222. The bill would "establish a state Water Rate Assistance Program to provide water affordability assistance for both drinking and wastewater services o low-income ratepayers experiencing economic hardships." This program would be similar to the low-income assistance program already in place […]
US Army Canine "War Dog Program" Anniversary
%27%20fill-opacity%3D%27.5%27%3E%3Cellipse%20fill%3D%22%23373737%22%20fill-opacity%3D%22.5%22%20rx%3D%221%22%20ry%3D%221%22%20transform%3D%22matrix(-208.02412%20-90.75688%2056.87428%20-130.36171%20206.8%20479)%22%2F%3E%3Cellipse%20fill%3D%22%23f0f0f0%22%20fill-opacity%3D%22.5%22%20rx%3D%221%22%20ry%3D%221%22%20transform%3D%22rotate(72.6%2024.7%20393.4)%20scale(84.22873%20125.98317)%22%2F%3E%3Cellipse%20fill%3D%22silver%22%20fill-opacity%3D%22.5%22%20rx%3D%221%22%20ry%3D%221%22%20transform%3D%22rotate(45.4%20-31.6%20179.1)%20scale(111.62842%20391.875)%22%2F%3E%3Cellipse%20fill%3D%22%234d4d4d%22%20fill-opacity%3D%22.5%22%20rx%3D%221%22%20ry%3D%221%22%20transform%3D%22rotate(-64.3%20374%20105.6)%20scale(153.69577%2060.12421)%22%2F%3E%3C%2Fg%3E%3C%2Fsvg%3E)
Over a million dogs, like movie star Rin Tin Tin, served during World Wars I & II The US Army's War Dog Program, also known as the K-9 Corps, became officially recognized on March 13, 1942. Over the course of World War I, more than one […]
1 in 5 who survive CPR say they felt detached from their body- Study shows that our sense of self continues after death

Researchers at NYU Grossman School of Medicine conducted a study involving 567 men and women "whose hearts stopped beating while hospitalized and who received CPR…in the United States and United Kingdom." [i] Among those who survived, reports of "unique lucid experiences" included, The researchers concluded that the experiences of these individuals differed from "hallucinations, delusions,…
Sizable Corpse Of An Intentionally Drowned Helpless Dog Found Wrapped In Chains In A River

In a heartbreaking and shocking discovery, a magnet fisherman in Detroit, Michigan, stumbled upon the lifeless body of a drowned dog wrapped in chains. This disturbing find brings to the forefront the urgent need for stricter laws against animal cruelty. It serves as a rallying cry for nationwide action. The Grim Discovery He made […]
Based on Recent Research, Babies Practice How to Cry While in The Womb Before They Ever Make Sounds
%22%20transform%3D%22translate(1.3%201.3)%20scale(2.5625)%22%20fill-opacity%3D%22.5%22%3E%3Cellipse%20fill%3D%22%2362efff%22%20rx%3D%221%22%20ry%3D%221%22%20transform%3D%22rotate(-63.7%20161.1%20-66.7)%20scale(76.17582%2052.56975)%22%2F%3E%3Cellipse%20fill%3D%22%232d0000%22%20cy%3D%2293%22%20rx%3D%22108%22%20ry%3D%22108%22%2F%3E%3Cellipse%20fill%3D%22%231a0000%22%20rx%3D%221%22%20ry%3D%221%22%20transform%3D%22matrix(4.47842%2039.93086%20-223.59812%2025.07752%20128%20232.9)%22%2F%3E%3Cellipse%20fill%3D%22%235897ab%22%20cx%3D%22153%22%20cy%3D%22101%22%20rx%3D%2272%22%20ry%3D%2272%22%2F%3E%3C%2Fg%3E%3C%2Fsvg%3E)
New evidence from a study entitled Prenatal development of neonatal vocalizations focuses on the early vocalizations produced by human and non-human primates. The study zeroes in on those sounds made immediately upon their birth. Like human babies, newborn monkeys "cry and coo to get their caregiver's attention." [i] It has since been a mystery how these vocalizations […]













