Go to Top

Telecommunications

Wireless Infrastructure Deployment Under Section 6409 – An Underutilized Tool?

Section 6409 of the Middle Class Tax Relief and Job Creation Act of 2012 addresses neither taxes nor job creation.  Instead, Section 6409 constitutes one of the Federal government’s latest significant efforts to streamline the approval process for deployment of wireless transmission equipment.  Generally, Section 6409 (along with an FCC Order from October 2014) provides that so long as the siting request is for a modification of an existing wireless …Read More

Power Outages Reignite Debate Over Buried Power Lines

After nearly every major storm event resulting in major power outages, utilities, public officials, and customers reexamine the existing electrical distribution infrastructure. And no exception, the most recent hurricanes, Harvey in Houston, Irma in Florida, and Maria in Puerto Rico, have reignited the debate over buried lines and whether the risks are worth the investment. When Harvey hit Texas, Houston had almost 24,000 circuit miles of underground distribution lines and …Read More

Streamlining Siting of Small Wireless Facilities Around the State

  House Bill 310 – Wireless Communications Infrastructure Siting – passed both the NC House and Senate overwhelmingly and was signed by the Governor on July 21, 2017 – Session Law 2017-159. Among the legislative findings was that, “[t]he design, engineering, permitting, construction, modification, maintenance, and operation of wireless facilities are instrumental to the provision of emergency services and to increasing access to advanced technology and information for the citizens …Read More

Protecting Utilities with a Practical, Cost-Effective Cybersecurity Program

Key takeaways Utilities are frequently targeted by cyber-attackers because they represent a critical component of infrastructure and are aggregating large quantities. Utilities of all sizes are a target, particularly in view of their increased reliance on data and proliferation of ransomware that can disable or disrupt services. “It is a technical issue, and we have good IT” is not an answer. Even the best IT is vulnerable. Technical assessments alone …Read More