Austin Energy Leverages World Energy Exchange to Procure Three-Year On-Call Electricity Supply

By PR Newswire


High Voltage Maintenance Training Online

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 12 hours Instructor-led
  • Group Training Available
Regular Price:
$599
Coupon Price:
$499
Reserve Your Seat Today
World Energy Solutions announces that Austin Energy has completed a power procurement using the World Energy Exchange to purchase 664.8 million kilowatt hours of on-call electricity supply. Austin Energy is a community-owned electric utility and a department of the city of Austin, TX. The utility plans to retire its 358 megawatt Holly gas-fired power plant in 2007 and used the World Energy Exchange to find replacement supply for 2008-2010.

Historically, Austin Energy has used a paper-based request-for-proposal process to purchase electricity supply, which often required several months to complete. The time delay in this process has a negative effect in achieving a lower price because suppliers build in "risk premiums" for potential changes in market conditions that can and do occur between the time a price offer for an energy commodity is made and subsequently contracted.

One of the utility's objectives in leveraging the World Energy Exchange was to streamline the bid to award process. Because the time between an auction's close and contract award is measured in minutes as opposed to days, World Energy believes the need for supplier risk premiums is reduced, thus resulting in lower prices.

Another factor in Austin Energy's decision to use the Exchange to purchase power was the unbiased and transparent audit trail provided by the online technology, which World Energy believes both increases the number of competing suppliers and ensures fair and open competition.

Austin Energy has now used the World Energy Exchange for two online energy auctions. In September of 2006, the utility conducted a series of eight auctions on the Exchange for up to 150 MW of 5x16 replacement supply for May through September weekdays in 2008-2010. In the latest round of auctions held in November, Austin Energy used the Exchange to run four bidding scenarios to determine which scenario would result in the lowest price. At auction close, the three-year contract period scenario generated the lowest price.

Phil Adams, World Energy COO, said, "Over the past few years, we have been watching the procurement trends at the wholesale level. Austin Energy is among a growing number of utilities that are leveraging auctions to buy supply. We see serving utilities and municipalities as a logical extension of our award-winning and commercially proven retail energy exchange. To serve our initial utility clients, we have optimized our World Energy Exchange for wholesale transactions - enabling both buying and selling of energy, creating a version clients can self-administer, and adding a whole cadre of new suppliers - both physical and financial.

"With our second wholesale auction success at Austin Energy, we are poised to roll out this solution to other utilities and municipalities interested in securing the better pricing in the market in a way that meets PUC and Sarbanes-Oxley compliance requirements."

Related News

Hydro One crews restore power to more than 277,000 customers following damaging storms in Ontario

Hydro One Power Restoration showcases outage recovery after a severe windstorm, with crews repairing downed power lines, broken poles and crossarms, partnering with utilities and contractors to boost grid resilience and promote emergency kit preparedness.

 

Key Points

A coordinated response by Hydro One and partners to repair storm damage, restore outages, strengthen grid resilience.

✅ Crews repaired downed lines, broken poles, and crossarms

✅ Partners and contractors aided rapid outage restoration

✅ Investments improve grid resilience and emergency readiness

 

Hydro One crews have restored power to more than 277,000 customers following back-to-back storms, with impacts felt in communities like Sudbury where local crews worked to reconnect service, including a damaging windstorm on that caused 57 broken poles, 27 broken crossarms, as well as downed power lines and fallen trees on lines. Hydro One crews restored power to more than 140,000 customers within 24 hours of Friday's windstorm, even as Toronto outages persisted for some customers elsewhere.

'We understand power outages bring life to a halt, which is why we are continuously improving our storm response, as employee COVID-19 support demonstrated, while making smart investments in a resilient, reliable and sustainable electricity system to energize life for families, businesses and communities for years to come,' said David Lebeter, Chief Operating Officer, Hydro One. 'We thank our customers for their patience as our crews worked tirelessly, alongside our utility partners and contractors, including Ontario crews in Florida, to restore power as quickly and as safely as possible.'

Hydro One thanks all of its utility partners and contractors who assisted with restoration efforts following the windstorm (alongside similar Quebec outages that highlighted the broader impact), including Durham High Voltage, EPCOR, ERTH Power, K-Line Construction Ltd., Lakeland Power Distribution Ltd., North Bay Hydro, Sproule Powerline Construction Ltd. and Valard Construction.

Hydro One encourages customers to restock their emergency kits following these storms, which utilities such as BC Hydro have also characterized as atypical, and to be aware of support programs like our pandemic relief fund that can help during difficult periods, to ensure they're prepared for an emergency or extended power outage.

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Don't be taken in by scammers threatening to shut off electricity: Manitoba Hydro

Manitoba Hydro Phone Scam targets small businesses with disconnection threats, prepaid card payments, caller ID spoofing, phishing texts, and door-to-door fraud; hang up, verify your account directly, and never share banking information.

 

Key Points

A scam where callers threaten disconnection and demand prepaid cards; verify account status directly with Manitoba Hydro.

✅ Hang up and call Manitoba Hydro at 1-888-624-9376 to verify.

✅ Never pay by prepaid cards, gift cards, or crypto.

✅ Hydro will not cut power on one-hour notice.

 

Manitoba Hydro is warning customers, particularly small business owners, to be wary of high-pressure scammers, as Ontario utilities warn of scams in other provinces, threatening to shut off their electricity.

The callers demand the customer to make immediate payment by a prepaid card. Often, the calls are made in the middle of the day at a busy time, frightening the customer with aggressive threats about disconnection, as hydro disconnections have made headlines elsewhere, says hydro spokesman Bruce Owen.

"They tell them 'we have a truck on the way to cut off your power. If you don't pay in the next hour you're out of luck,'" he said.

"And because these folks have inventory in freezers and they have customers … they're willing to fork over several hundred or even several thousand dollars on a prepaid card to somebody they don't know to keep the lights on."

Maybe the business owners can't recall, with everything happening, including discussions about Hydro One peak rates in Ontario, if they've made their payments on time. They start second-guessing and believing the person on the other line, Owen says.

And they worry about losing thousands of dollars in business if they lose power. So they're more than willing to run out to a store, buy a prepaid debit card and provide the number to the caller.

"Their goal is to manipulate you into sending money before you figure out it's a scam," said Chris McColm, hydro's security and investigations supervisor. "These people are crooks and you should hang up on them."

For any customers that are in arrears, hydro will work with them to resolve the issue, Owen said.

"We do not have to take that extreme measure of cutting off or disconnecting anybody. That's not the business we're in — we don't strong arm people that way," he said.

"Anybody who's threatening to cut off your power with an hour or half-an-hour notice, well it's it's no better than someone waiting around the corner, waiting the club you over the head in the dark of night. That's what they are."

 

Fraud reports soar

The power utility has recorded a nearly-300 per cent jump in the number of fraud-related complaints this year over 2017. There have been 862 phone, text and e-mail scams and that could still go much higher.

The current statistics from 2018 have only calculated up to Oct. 31. In 2017, there were 221.

That jump in numbers doesn't necessarily mean there are more scammers out there.

It could simply mean people are finally getting wise to fraudsters and reporting it more, Owen says.

"At the same token, we don't hear of everybody who's been taking advantage of because once they've found out that they've been hoodwinked they don't want to tell anybody because they're so embarrassed," he said.

"These scammers can be very convincing and anyone can be victimized," McColm said.

If you are able to think clearly when some high-pressure caller gets you on the line, Owen suggests asking a few simple questions to challenge their legitimacy:

  • What street am I on?
  • What does my business look like? 
  • What's the weather outside right now?

Phone scammers can falsify their caller ID information to make it appear they're calling from a local number, but what you'll find is most of them aren't in Winnipeg or Manitoba and likely not even this country or continent, Owen says.

The key to being safe is simply to never give out banking information, Owen says. It's a message that has been stressed for years and 80-90 per cent of people understand it, but it's that other 10-20 per cent that are still being victimized.And it's not just phone calls. Many other fraud-related complaints to Manitoba Hydro this year concerned unsolicited text messages to customers saying they had been overbilled, or faced retroactive charges elsewhere, and were eligible for a refund.

This scam is also aimed at getting a customer's personal banking information, under the guise of having money put back into their account.

Also, many people, especially seniors living alone, continue to be targeted by aggressive door-to-door fraudsters, and cases like the electricity theft ring in Montreal underscore the risks, McColm says. However, he adds, hydro employees always display photo ID and will never demand to come into a home. 

If you're unsure whether a phone call, text or email is real or a scam, contact Manitoba Hydro at 1-888-624-9376.

 

Related News

View more

Ontario Energy Board prohibiting electricity shutoffs during latest stay-at-home order

OEB Disconnection Ban shields Ontario residential customers under the stay-at-home order, pausing electricity distributor shutoffs for non-payment and linking COVID-19 Energy Assistance Program credits for small businesses, charities, and overdue utility bills.

 

Key Points

A pause on electricity shutoff notices during Ontario's stay-at-home order, with COVID-19 bill credits for customers.

✅ Distributors cannot issue residential disconnection notices.

✅ Applies through the stay-at-home order timeline.

✅ CEAP credits: $750 residential; $1,500 small biz and charities.

 

With Ontario now into the third province-wide lockdown, the Ontario Energy Board (OEB) has promised residents won't have to worry about their power being shut off.

On April 8, the Province issued the third stay-at-home order in the last 13 months which is scheduled to last for 28 days until at least May 6, as electricity rates and policies continue to shift.

On April 30, the annual winter disconnection ban is set to expire, meaning electricity distributors like Hydro One would normally be permitted to issue disconnection notices for non-payment as early as 14 days before the end of the ban.

However, the OEB has announced changes for electricity consumers that prohibit electricity distributors from issuing disconnection notices to residential customers for the entirety of the stay-at-home order.

Additionally, the COVID-19 Energy Assistance Program is available for residential, small business, and registered charity customers who have overdue amounts on their electricity or gas bills as a result of the pandemic, complementing support for electric bills introduced during COVID-19, and the fixed COVID-19 hydro rate that helped stabilize costs.

Those who meet these criteria are eligible for credits up to a maximum of $750 for residential customers and $1,500 for small businesses and charities, alongside earlier moves to set an off-peak price to ease costs.

 

Related News

View more

Solar Becomes #3 Renewable Electricity Source In USA

U.S. Solar Generation 2017 surpassed biomass, delivering 77 million MWh versus 64 million MWh, trailing only hydro and wind; driven by PV expansion, capacity additions, and utility-scale and small-scale growth, per EIA.

 

Key Points

It was the year U.S. solar electricity exceeded biomass, hitting 77 million MWh and trailing only hydro and wind.

✅ Solar: 77 million MWh; Biomass: 64 million MWh (2017, EIA)

✅ PV expansion; late-year capacity additions dampen annual generation

✅ Hydro: 300 and wind: 254 million MWh; solar thermal ~3 million MWh

 

Electricity generation from solar resources in the United States reached 77 million megawatthours (MWh) in 2017, surpassing for the first time annual generation from biomass resources, which generated 64 million MWh in 2017. Among renewable sources, only hydro and wind generated more electricity in 2017, at 300 million MWh and 254 million MWh, respectively. Biomass generating capacity has remained relatively unchanged in recent years, while solar generating capacity has consistently grown.

Annual growth in solar generation often lags annual capacity additions because generating capacity tends to be added late in the year. For example, in 2016, 29% of total utility-scale solar generating capacity additions occurred in December, leaving few days for an installed project to contribute to total annual generation despite being counted in annual generating capacity additions. In 2017, December solar additions accounted for 21% of the annual total. Overall, solar technologies operate at lower annual capacity factors and experience more seasonal variation than biomass technologies.

Biomass electricity generation comes from multiple fuel sources, such as wood solids (68% of total biomass electricity generation in 2017), landfill gas (17%), municipal solid waste (11%), and other biogenic and nonbiogenic materials (4%).These shares of biomass generation have remained relatively constant in recent years, even as renewables' rise in 2020 across the grid.

Solar can be divided into three types: solar thermal, which converts sunlight to steam to produce power; large-scale solar photovoltaic (PV), which uses PV cells to directly produce electricity from sunlight; and small-scale solar, which are PV installations of 1 megawatt or smaller. Generation from solar thermal sources has remained relatively flat in recent years, at about 3 million MWh, even as renewables surpassed coal in 2022 nationwide. The most recent addition of solar thermal capacity was the Crescent Dunes Solar Energy plant installed in Nevada in 2015, and currently no solar thermal generators are under construction in the United States.

Solar photovoltaic systems, however, have consistently grown in recent years, as indicated by 2022 U.S. solar growth metrics across the sector. In 2014, large-scale solar PV systems generated 15 million MWh, and small-scale PV systems generated 11 million MWh. By 2017, annual electricity from those sources had increased to 50 million MWh and 24 million MWh, respectively, with projections that solar could reach 20% by 2050 in the U.S. mix. By the end of 2018, EIA expects an additional 5,067 MW of large-scale PV to come online, according to EIA’s Preliminary Monthly Electric Generator Inventory, with solar and storage momentum expected to accelerate. Information about planned small-scale PV systems (one megawatt and below) is not collected in that survey.

 

Related News

View more

Manchin Calls For Stronger U.S. Canada Energy And Mineral Partnership

U.S.-Canada Energy and Minerals Partnership strengthens energy security, critical minerals supply chains, and climate objectives with clean oil and gas, EV batteries, methane reductions, cross-border grid reliability, and allied trade, countering Russia and China dependencies.

 

Key Points

A North American alliance to secure energy, refine critical minerals, cut emissions, and fortify supply chains.

✅ Integrates oil, gas, and electricity trade for reliability

✅ Builds EV battery and critical minerals processing capacity

✅ Reduces methane, diversifies away from Russia and China

 

Today, U.S. Senator Joe Manchin (D-WV), Chairman of the Senate Energy and Natural Resources Committee, delivered the following remarks during a full committee hearing to examine ways to strengthen the energy and mineral partnership between the U.S. and Canada to address energy security and climate objectives.

The hearing also featured testimony from the Honorable Jason Kenney (Premier, Alberta, Canada), the Honorable Nathalie Camden (Associate Deputy Minister of Mines, Ministry of Energy and Natural Resource, Québec, Canada), the Honorable Jonathan Wilkinson (Minister, Natural Resources Canada) and Mr. Francis Bradley (President and CEO, Electricity Canada). Click here to read their testimony.

Chairman Manchin’s remarks can be viewed as prepared here or read below:

Today we’re welcoming our friends from the North, from Canada, to continue this committee’s very important conversation about how we pursue two critical goals – ensuring energy security and addressing climate change.

These two goals aren’t mutually exclusive, and it’s imperative that we address both.

We all agree that Putin has used Russia’s oil and gas resources as a weapon to inflict terrible pain on the Ukrainian people and on Europe.

And other energy-rich autocracies are taking note. We’d be fools to think Xi Jinping won’t consider using a similar playbook, leveraging China’s control over global critical minerals supply chains.

But Putin’s aggression is bringing the free world closer together, setting the stage for a new alliance around energy, minerals, and climate.
Building this alliance should start here in North America. And that’s why I’m excited to hear today about how we can strengthen the energy and minerals partnership between the U.S. and Canada.

I recently had the privilege of being hosted in Alberta by Premier Kenney, where I spent two days getting a better understanding of our energy, minerals, and manufacturing partnership through meetings with representatives from Alberta, Saskatchewan, the Northwest Territories, the federal government, and tribal and industry partners.

Canadians and Americans share a deep history and are natural partners, sharing the longest land border on the planet.

Our people fought side-by-side in two world wars. In fact, some of the uranium used by the Manhattan Project and broader nuclear innovation was mined in Canada’s Northwest Territories and refined in Ontario.

We have cultivated a strong manufacturing partnership, particularly in the automotive industry, with Canada today being our biggest export market for vehicles. Cars assembled in Canada contain, on average, more than 50% of U.S. value and parts.

Today we also trade over 58 terawatt hours of electricity, including green power from Canada across the border, 2.4 billion barrels of petroleum products, and 3.6 trillion cubic feet of natural gas each year.

In fact, energy alone represents $120 billion of the annual trade between our countries. Across all sectors the U.S. and Canada trade more than $2 billion per day.
There is no better symbol of our energy relationship than our interconnected power grid and evolving clean grids that are seamless and integral for the reliable and affordable electricity citizens and industries in both our countries depend on.

And we’re here for each other during times of need. Electricity workers from both the U.S. and Canada regularly cross the border after extreme weather events to help get the power back on.

Canada has ramped up oil exports to the U.S. to offset Russian crude after members of our committee led legislation to cut off the energy purchases fueling Putin’s war machine.

Canada is also a leading supplier of uranium and critical minerals to the U.S., including those used in advanced batteries—such as cobalt, graphite, and nickel.
The U.S-Canada energy partnership is strong, but also not without its challenges, including tariff threats that affect projects on both sides. I’ve not been shy in expressing my frustration that the Biden administration cancelled the Keystone XL pipeline.

In light of Putin’s war in Ukraine and the global energy price surge, I think a lot of us wish that project had moved forward.

But to be clear, I’m not holding this hearing to re-litigate the past. We are here to advance a stronger and cleaner U.S.-Canada energy partnership for the future.
Our allies and trading partners in Europe are begging for North American oil and gas to offset their reliance on Russia.

There is no reason whatsoever we shouldn’t be able to fill that void, and do it cleaner than the alternatives.

That’s because American oil and gas is cleaner than what is produced in Russia – and certainly in Iran and Venezuela. We can do better, and learn from our Canadian neighbors.

On average, Canada produces oil with 37% lower methane emissions than the U.S., and the Canadian federal government has set even more aggressive methane reduction targets.

That’s what I mean by climate and security not being mutually exclusive – replacing Russian product has the added benefit of reducing the emissions profile of the energy Europe needs today.

According to the International Energy Agency, stationary and electric vehicle batteries will account for about half of the mineral demand growth from clean energy technologies over the next twenty years.

Unfortunately, China controls 80% of the world’s battery material processing, 60% of the world’s cathode production, 80% of the world’s anode production, and 75% of the world’s lithium ion battery cell production. They’ve cornered the market.

I also strongly believe we need to be taking national energy security into account as we invest in climate solutions.

It makes no sense whatsoever for us to so heavily invest in electric vehicles as a climate solution when that means increasing our reliance on China, because right now we’re not simultaneously increasing our mining, processing, and recycling capacity at the same rate in the United States.

The Canadians are ahead of us on critical minerals refining and processing, and we have much to learn from them about how they’re able to responsibly permit these activities in timelines that blow ours out of the water.

I’m sure our Canadian friends are happy to export minerals to us, but let me be clear, the United States also needs to contribute our part to a North American minerals alliance.

So I’m interested in discussing how we can create an integrated network for raw minerals to move across our borders for processing and manufacturing in both of our countries, and how B.C. critical minerals decisions may affect that.

I believe there is much we can collaborate on with Canada to create a powerful North American critical minerals supply chain instead of increasing China’s geopolitical leverage.

During this time when the U.S., Canada, and our allies and friends are threatened both by dictators weaponizing energy and by intense politicization over climate issues, we must work together to chart a responsible path forward that will ensure security and unlock prosperity for our nations.

We are the superpower of the world, and blessed with abundant energy and minerals resources. We cannot just sit back and let other countries fill the void and find ourselves in a more dire situation in the years ahead.

We must be leaning into the responsible production of all the energy sources we’re going to need, and strengthening strategic partnerships – building a North American Energy Alliance.

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified