TechAdvantage - Power System Engineering, Inc. · PDF file2013 Power System Engineering, Inc....
Transcript of TechAdvantage - Power System Engineering, Inc. · PDF file2013 Power System Engineering, Inc....
Rick Schmidt
Power System Engineering, Inc. www.powersystem.org
February 21, 2013
Steps to Reducing Power Theft Overview: State of the Industry
TechAdvantage
© 2013 Power System Engineering, Inc. 2
Rick A. Schmidt Vice President – Utility Automation and Communications
Phone: (608) 268-3502 Email: [email protected]
Power System Engineering, Inc.
1532 W. Broadway Madison, WI 53713
www.powersystem.org About the Presenter: Rick leads the Utility Automation and Communications Department at Power System Engineering. Rick and his staff provide automation and communication consulting to utilities including: Technology Work Plans, strategic communications plans, procurement, design, and project management. Rick will most often work on projects involving communications infrastructure for DSM, SCADA, DA, and AMI. Rick has over 30 years of professional experience and has an MBA from Cardinal Stritch University in Milwaukee, WI.
© 2013 Power System Engineering, Inc.
Session Topics 1. Power Theft Defined and Examples 2. Technology to Combat Power Theft 3. Approaches in Developing a Power Theft Program 4. CRN Report on Power Theft Coming Spring/Early
Summer 2013
© 2013 Power System Engineering, Inc.
How Much Power Theft Exists? • No one really knows. We could not find a single study in
the entire industry that conducted an extensive audit using the proper tools with a non-bias sampling method.
• Various written and phone surveys of US utilities provided a range of 1% to 4% of the total potential revenue that was not billed due to power theft.
• A written survey was sent to the co-ops asking how much theft occurs at their utilities – – About 50% of 67 survey responses indicated that about
0.1% of their revenues are lost due to theft – About half of the co-ops have about 10 fraud cases per
year – About 10% have more than 50 cases per year
4
© 2013 Power System Engineering, Inc.
Types of Power Theft Type Description
Meter Tampering Slow the meter or disconnect the meter
Meter Bypass Route around the meter and connect directly to the secondary line. Or partially route around the meter but connect some load to the meter.
Employee/Contractor Dishonesty Fraud
Billing fraud, purposefully mis-reading the meter.
Technical Line Loss
System losses caused by an older line, poorly performing transformers, and other causes.
Non-Technical Line Loss
Losses caused by meter bypass, meter tampering, and fraud.
5
© 2013 Power System Engineering, Inc.
Power Theft Defined – Meter Tampering
6
• Altering the normal operation of the meter, can work for solid state as well. Visible on the outside.
• Slowing the meter with pins or other devices
Photos courtesy of Landis+Gyr
© 2013 Power System Engineering, Inc.
Power Theft Defined – Meter Tampering
7
• Insert sugar and salt through a hole in meter. • Sugar attracts bugs, salt kills them.
© 2013 Power System Engineering, Inc.
Power Theft Defined – Meter Bypass • Bypass occurs behind the meter faceplate
8
© 2013 Power System Engineering, Inc.
Power Theft Defined: Meter Bypass
A jumpered connection from the LINE side to the LOAD side at the meter socket with a conducting type material (nails, scrap wire, etc.).
9
© 2013 Power System Engineering, Inc.
Power Theft Defined: Meter Bypass
A tapped connection ahead of the meter at the secondary service conductors before they enter the building.
10
© 2013 Power System Engineering, Inc.
Power Theft Defined: Meter Bypass: Excavated Diversion
11
© 2013 Power System Engineering, Inc.
Power Theft Defined: Meter Bypass
A tapped connection ahead of the service secondary conductors to a separate load inside the building
12
Photo courtesy of dTechs
© 2013 Power System Engineering, Inc.
Meter Bypass: Sophisticated Wiring
Rather sophisticated: The meter box looks like a normal meter socket with no detectable wires, until you remove the cover and expose the jumper wires.
13
Photo courtesy of dTechs
© 2013 Power System Engineering, Inc.
Crude Wiring Not all crime is highly organized; some crude approaches still work!
14
© 2013 Power System Engineering, Inc.
Meter Bypass Related to Marijuana Grow Operations
• A high percentage of power theft occurs from marijuana
grow operations. • May use metal detecting equipment to locate the
secondary distribution line into the house (often underground).
• Use heavy construction equipment to bore through the concrete foundation of the house, splice directly into the underground secondary line, and install a circuit panel.
• It was reported in Canada that over 90% of the power theft incidences were houses growing marijuana plants.
• From organized and sophisticated to inelegant or crude theft techniques.
15
© 2013 Power System Engineering, Inc.
Suburban Homes: Meter Bypass • Sophisticated
underground wiring
• Major grow operations
16
© 2013 Power System Engineering, Inc.
Marijuana Grow Operations
17
© 2013 Power System Engineering, Inc.
Who Steals?
18
Courtesy of Landis+Gyr
© 2013 Power System Engineering, Inc.
Why Do They Steal?
19
Courtesy of Landis + Gyr
© 2013 Power System Engineering, Inc.
Session Topics 1. Power Theft Defined and Examples 2. Technology to Combat Power Theft 3. Approaches in Developing a Power Theft Program. 4. CRN Report on Power Theft Coming Spring/Early
Summer 2013
© 2013 Power System Engineering, Inc.
Theft Detection Functionality
21
Functionality AMI
AMI via Service
Transformer Metering
MDMS Line Load Analyzers
Detect meter bypass x (When used with
AMI and MDMS)
x
Detect abnormally high line loss
x
Detect tilted meter x x Detect inverted meter x x x Normalize load data x x x Detect a zero reading event x x x x Detect unusual customer behavior (tampering)
x
Detect invalid hardware access to the meter
x
© 2013 Power System Engineering, Inc.
What Does AMI Do To Help? • Outage flags • Reverse energy flow • Unauthorized
configuration change • Meter placed into test
mode • Event log cleared • The meter can be
configured to immediately transmit an exception message
22
• Count of the number of invalid optical port access attempts (access attempts with an invalid password)
• Exception messages • Invalid Local Area
Network (LAN) access attempts
• Change of optical port password
• Change of LAN encryption key
© 2013 Power System Engineering, Inc.
What Does MDM Do To Help? • Takes the AMI metering data and proactively evaluates
and assesses the results for patterns of theft: – Trend analysis. – Aggregates meters kWh on a feeder and forecasts
losses from comparing SCADA data. AMI, and other sources.
– Evaluates line loss by time of day and different load periods when integrated with engineering modeling software.
23
© 2013 Power System Engineering, Inc.
Transformer Metering • Fault Current Waveforms • Ambient and conductor temperature • Real-time current and ampacity • Momentary outages • Equipment-related disturbances • Load profile • Power factor • Line status and condition • Power quality (sags, swells, harmonics)
24
© 2013 Power System Engineering, Inc.
Transformer Meters and Sensors • Sentient: http://www.sentient-energy.com • GridSense Line IQ: http://www.gridsense.com • GridSentry Smart Grid Sensor: http://www.gridsentry.us • Tollgrade Lighthouse: http://www.tollgrade.com
25
Some AMI vendors have partnered with these vendors to add AMI as the transport. Some use cellular.
© 2013 Power System Engineering, Inc.
Feeder Sensors: Measure the Load Sub-Feeder • Three vendors in this space. • Vendors are relatively new to the
market but have promise. • Sensors can measure voltage and
current on the distribution lines and can determine the kWh running through a segment of line.
• When integrated with AMI and MDM, the software can calculate the delta between metered kWh and transported kWh.
• This determines areas with greatest line loss.
26
© 2013 Power System Engineering, Inc.
Sensor Vendors: Awesense Wireless Inc. • Awesense
Wireless Inc. • Vancouver, BC • Website:
www.awesense.com
• Three pilots completed
• Working with a few co-ops now
27
• Business model involves installing the sensors in a given area for several days
• Capture the load, then compare it to metering records
• Address the line loss issue, whether technical loss or non-technical
• Then, move sensors to the next area of need
© 2013 Power System Engineering, Inc.
Sensor Vendors: dTechs • dTechs web site: www.dtechsepm.com • Resides in Calgary, AB, and Toronto, ON • Early deployments: Southern Ontario and Alberta Utilities. • The firm’s roots are in law enforcement; its founder worked for a
Canadian Police Service as the Primary Lab Investigator for energy fraud.
• Provides software and hardware. • Hardware is manufactured by Cooper Power Systems. • Created and owns most of the process patents in this sector. • Various communication alternatives, mostly cellular but AMI
partnerships in the future. • Their solution is long-term: sensors can remain in place for 10 to 15
years. 28
© 2013 Power System Engineering, Inc.
dTechs Sensor Architecture
29
© 2013 Power System Engineering, Inc.
Feeder Sensors: Measure the Load Sub-Feeder
30
Underground or Aerial
© 2013 Power System Engineering, Inc.
Sample Report: dTechs
31
© 2013 Power System Engineering, Inc.
Starting a Theft Reduction Program 1. Combine technical line loss and non-technical loss
(theft) into a single program. 2. Assign a department to lead this effort. Assign a project
manager and create a cross-departmental project team. 3. Create a project plan and capital budget to conduct a line
loss reduction program. 4. One of the first key initiatives is to create an appropriate
set of power theft rules to be included in the Member Service Rules and Regulations or Policies document.
5. Work out a plan with local public safety organizations.
32
© 2013 Power System Engineering, Inc.
Starting a Theft Reduction Program 6. Create press release for local newspapers, bill inserts that
bring attention to theft and define the laws and consequences. 7. Set up AMI and/or MDM to provide proactive investigation
of possible theft. 8. Determine line loss by substation and by feeder using
existing SCADA, metering, and engineering modeling tools that may already exist. Determine the feeders that appear to have the greatest amount of line loss.
9. Complete sensor line loss technology assessment. 10. Trial some of the new sensor or transformer metering
software and hardware. 11. Identify proactive projects.
33
© 2013 Power System Engineering, Inc.
CRN Report on Power Theft
34
• Extensive power theft report coming spring or early summer.
• The report describes: – The types of power theft – The amount of theft – How to use new tools to investigate– AMI, MDM,
transformer metering, feeder kWh sensors – Cost/benefit – Techniques to combat power theft – Prosecution of the crime – Case studies
© 2013 Power System Engineering, Inc. 35
Rick Schmidt Power System Engineering, Inc. VP Utility Automation and Communications Direct: 608-268-3502 Mobile: 608-358-5661 Email: [email protected] www.powersystem.org
Questions?
PSE can assist utilities in developing a power theft reduction program