Kill Switches Secretly Installed In Solar Panels

Chinese “kill switches” have been discovered hidden in American solar farms, triggering urgent warnings over US national energy security and prompting calls to suspend the deployment of renewable energy generation in the UK.

The kill switches, identified as cellular radios, are embedded within power inverters manufactured by Chinese companies and sold to US power generators

Power inverters are critical components in solar and wind energy systems. They act as the vital link between renewable energy sources and the wider electricity grid, converting the generated power into a usable form.

The presence of these remotely cyber controlled devices raises the possibility of potential vulnerabilities within the power grid. 

Power inverters play a critical role in solar and wind farms by converting energy into a form compatible with the national grid, making them a key point of vulnerability if compromised.Tampering with this type of equipment allows China the power to trigger blackouts across the West, and could be a way of destroying the grid.

China has dismissed the allegations as a smear campaign, but the discovery has triggered alarm within the US government and is expected to prompt a similar UK security checks.

Net Zero Implementation & Fears Of Chinese Control of Energy Infrastructure

There have benn serious requests for a pause in the UK’s green energy expansion have intensified following reports that Chinese-made components capable of remote shutdown, dubbed “kill switches”, were found in US solar farms.

Indeed, concerns are mounting as Chinese companies dominate the global supply of power inverters, batteries, and solar panels, key components used widely across Western energy systems. Chinese firms apparently supply around 50% of the world’s solar inverters and in 2023, two companies, Huawei and Sungrow, controlled more than 50% of the global market.

Huawwei has previously fallen under suspicion of covertly embedded devices in its 5G telecommunications technology, prompting its removal from telecoms infrastructure in the UK and numerous other Western jurisdictions.

The European Solar Manufacturing Council estimates that over 200GW of Europe’s solar capacity, which is equivalent to the output of 200 nuclear power stations, relies on Chinese-manufactured inverters. Recent blackouts in Spain and Portugal are believed to have been triggered by the sudden loss of only 2GW of generation, highlighting the system’s vulnerability.

Telegraph   |     Daily Mail   |     Reuters     |   Tech Digest  |  Reddit   |     Facebook     |   Share Talk

Image: Aldward Castillo

You Might Also Read: 

Present Danger: Cyber Attacks On Power Grids:


If you like this website and use the comprehensive 8,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Crypto Company Hit For $400m
Dior’s Client Data Has Been Breached »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

CybSafe

CybSafe

CybSafe is a cloud-based platform focussed on addressing the human component of cyber security - an intelligent approach to awareness training.

Consult Hyperion

Consult Hyperion

Consult Hyperion is an independent strategic and technical consultancy specialising in digital identity and secure electronic transactions.

Cyjax

Cyjax

Cyjax monitors the Internet to identify the digital risks to your organisation, including cyber threats, reputational risks and the Darknet.

Cyber Discovery

Cyber Discovery

Cyber Discovery, the UK Government's Cyber Schools Programme, is a learning programme designed to give young people the opportunity to learn the skills needed to enter the cyber security profession.

EMnify

EMnify

EMnify is a Software-as-a-Service (SaaS) company, revolutionizing cellular Internet of Things (IoT).

Kontron

Kontron

Kontron offers a combined portfolio of secure hardware, middleware and services for Internet of Things (IoT) and Industry 4.0 applications.

Motiv ICT Security

Motiv ICT Security

Motiv is the ICT security specialist that provides public and private sector organisations with IT security solutions and services to prevent cybercrime, data theft and data breaches.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

Scholarly Networks Security Initiative (SNSI)

Scholarly Networks Security Initiative (SNSI)

SNSI brings together publishers and institutions to solve cyber-challenges threatening the integrity of the scientific record, scholarly systems and the safety of personal data.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

D.med Software

D.med Software

D.med Software is a company with a focus on cybersecurity for embedded software and cloud applications for the medical industry.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.

CallCabinet

CallCabinet

CallCabinet is the premier cross-platform SaaS provider for end-to-end compliant call recording, AI-driven conversation analytics, call QA, and custom business intelligence reporting.

Supersecure

Supersecure

Supersecure is a Managed Security Service Provider (MSSP) offering a wide range of information security solutions.