Stream Energy expands into Maryland market

By Business Wire


NFPA 70e Training

Our customized live online or in‑person group training can be delivered to your staff at your location.

  • Live Online
  • 6 hours Instructor-led
  • Group Training Available
Regular Price:
$199
Coupon Price:
$149
Reserve Your Seat Today
Stream Energy, the worldÂ’s largest network marketer of energy, announced it is initiating operations in the Maryland electricity market, its fourth market in an ambitious expansion plan.

The announcement comes roughly four months after Stream Energy entered the Pennsylvania electric market.

Stream Energy will begin accepting residential customersÂ’ requests by late March for service in both the Pepco service area in central Maryland and the BGE service territory in the Baltimore market and surrounding 10 counties.

“We believe Maryland residents will appreciate our competitive rates and our business model of direct sales to customers,” said Stream Energy Chairman Rob Snyder. “Our wholly-owned marketing arm, Ignite, provides one-to-one education for consumers and has helped hundreds of thousands of Texans, Pennsylvanians and Georgians find answers to their questions about deregulation from the people they know and trust.”

“We also hope that many Marylanders will see an opportunity for their families to earn income with a retailer that has a proven income-generation model,” Rob Snyder added. The full-service network marketing approach utilized by the Ignite sales organization uses a “person-to-person” marketing methodology that has helped the firm’s army of thousands of independent associates earn residual income off the sale of deregulated power.

Dallas-based Stream Energy is the longest-tenured direct seller of energy in America. Moreover, Stream Energy’s business model, evoked by the catch phrase “It’s OK to switch. Really,” has helped promote the successful deregulation of retail energy within Texas, Pennsylvania and Georgia.

Stream Energy and Ignite now claim annual revenues exceeding $900 million, marketing electricity in Texas, electricity in Pennsylvania and natural gas in Georgia. Stream Energy has won several Awards of Excellence from the prestigious Platts Global Energy Awards, while Ignite is consistently ranked among the top Direct Selling Companies in the World.

This announcement concerning Stream EnergyÂ’s expansion into Maryland occurred at the annual Ignition convention put on by Ignite in Dallas, where thousands of Ignite independent associates reacted with thunderous enthusiasm.

Related News

Working From Home Will Drive Up Electricity Bills for Consumers

Remote Work Energy Costs are rising as home offices and telecommuting boost electricity bills; utilities, broadband usage, and COVID-19-driven stay-at-home policies affect productivity, consumption patterns, and household budgets across the U.K. and Europe.

 

Key Points

Remote Work Energy Costs are increased household electricity and utility expenses from telecommuting and home office use.

✅ WFH shifts energy load from offices to households.

✅ Higher device, lighting, and heating/cooling usage drives bills.

✅ Broadband access gaps limit remote work equity.

 

Household electricity bills are set to soar, with rising residential electricity use tied to the millions of people now working at home to avoid catching the coronavirus.

Running laptops and other home appliances will cost consumers an extra 52 million pounds ($60 million) each week in the U.K., according to a study from Uswitch, a website that helps consumers compare the energy prices that utilities charge.

For each home-bound household, the pain to the pocketbook may be about 195 pounds per year extra, even as some utilities pursue pandemic cost-cutting to manage financial pressures.

The rise in price for households comes even as overall demand is falling rapidly in Europe, with wide swaths of the economy shut down to keep workers from gathering in one place, and the U.S. grid overseer issuing warnings about potential pandemic impacts on operations.

People stuck at home will plug in computers, lights and appliances when they’d normally be at the office, increasing their consumption.

With the Canadian government declaring a state of emergency due to the coronavirus, companies are enabling work-from-home structures to keep business running and help employees follow social distancing guidelines, and some utilities have even considered housing critical staff on site to maintain operations. However, working remotely has been on the rise for a while.

“The coronavirus is going to be a tipping point. We plodded along at about 10% growth a year for the last 10 years, but I foresee that this is going to really accelerate the trend,” Kate Lister, president of Global Workplace Analytics.

Gallup’s State of the Workplace 2017 study found that 43% of employees work remotely with some frequency. Research indicates that in a five-day workweek, working remotely for two to three days is the most productive. That gives the employee two to three days of meetings, collaboration and interaction, with the opportunity to just focus on the work for the other half of the week.

Remote work seems like a logical precaution for many companies that employ people in the digital economy, even as some federal agencies sparked debate with an EPA telework policy during the pandemic. However, not all Americans have access to the internet at home, and many work in industries that require in-person work.

According to the Pew Research Center, roughly three-quarters of American adults have broadband internet service at home. However, the study found that racial minorities, older adults, rural residents and people with lower levels of education and income are less likely to have broadband service at home. In addition, 1 in 5 American adults access the internet only through their smartphone and do not have traditional broadband access. 

Full-time employees are four times more likely to have remote work options than part-time employees. A typical remote worker is college-educated, at least 45 years old and earns an annual salary of $58,000 while working for a company with more than 100 employees, according to Global Workplace Analytics, and in Canada there is growing interest in electricity-sector careers among younger workers. 

New York, California and other states have enacted strict policies for people to remain at home during the coronavirus pandemic, which could change the future of work, and Canadian provinces such as Saskatchewan have documented how the crisis has reshaped local economies across sectors.

“I don’t think we’ll go back to the same way we used to operate,” Jennifer Christie, chief HR officer at Twitter, told CNBC. “I really don’t.”

 

Related News

View more

Canadian gold mine cleans up its act with electricity

Electric mining equipment enables zero-emission, diesel-free operations at Goldcorp's Borden mine, using Sandvik battery-electric drills and LHD trucks to cut ventilation costs, noise, and maintenance while improving underground air quality.

 

Key Points

Battery-powered mining equipment replaces diesel, cutting emissions and ventilation costs in underground operations.

✅ Cuts diesel use, heat load, and noise in underground headings.

✅ Reduces ventilation infrastructure and operating expense.

✅ Improves air quality, worker health, and equipment uptime.

 

Mining operations get a lot of flack for creating environmental problems around the world. Yet they provide much of the basic material that keeps the global economy humming. Some mining companies are drilling down in their efforts to clean up their acts, exploring solutions such as recovering mine heat for power to reduce environmental impact.

As the world’s fourth-largest gold mining company Goldcorp has received its share of criticism about the impact it has on the environment.

In 2016, the Canadian company decided to do something about it. It partnered with mining-equipment company Sandvik and began to convert one of its mines into an all-electric operation, a process that is expected to take until 2021.

The efforts to build an all-electric mine began with the Sandvik DD422iE in Goldcorp’s Borden mine in Ontario, Canada.

Goldcorp's Borden mine in Borden, Ontario, CanadaGoldcorp's Borden mine in Borden, Ontario, Canada

The machine weighs 60,000 pounds and runs non-stop on a giant cord. It has a 75-kwh sodium nickel chloride battery to buffer power demands, a crucial consideration as power-hungry Bitcoin facilities can trigger curtailments during heat waves, and to move the drill from one part of the mine to another.

This electric rock-chewing machine removes the need for the immense ventilation systems needed to clean the emissions that diesel engines normally spew beneath the surface in a conventional mining operation, though the overall footprint depends on electricity sources, as regions with Clean B.C. power imports illustrate in practice.

These electric devices improve air quality, dramatically reduce noise pollution, and remove costly maintenance of internal combustion engines, Goldcorp says.

More importantly, when these electric boring machines are used across the board, it will eliminate the negative health effects those diesel drills have on miners.

“It would be a challenge to go back,” says big drill operator Adam Ladouceur.

Mining with electric equipment also removes second- or third-highest expenditure in mining, the diesel fuel used to power the drills, said Goldcorp spokesman Pierre Noel, even as industries pursue dedicated energy deals like Bitcoin mining in Medicine Hat to manage power costs. (The biggest expense is the cost of labor.)

Electric load, haul, dump machine at Goldcorp Borden mine in OntarioElectric load, haul, dump machine at Goldcorp Borden mine in Ontario

Aside from initial cost, the electric Borden mine will save approximately $7 million ($9 million Canadian) annually just on diesel, propane and electricity.

Along with various sizes of electric drills and excavating tools, Goldcorp has started using electric powered LHD (load, haul, dump) trucks to crush and remove the ore it extracts, and Sandvik is working to increase the charging speed for battery packs in the 40-ton electric trucks which transport the ore out of the mines, while utilities add capacity with new BC generating stations coming online.

 

Related News

View more

EIA expects solar and wind to be larger sources of U.S. electricity generation this summer

US Summer Electricity Outlook 2022 projects rising renewable energy generation as utility-scale solar and wind capacity additions surge, while coal declines and natural gas shifts amid higher fuel prices and regional supply constraints.

 

Key Points

An EIA forecast of summer 2022 power: more solar and wind, less coal, and shifting gas use amid higher fuel prices.

✅ Solar +10 million MWh; wind +8 million MWh vs last summer

✅ Coal generation -20 million MWh amid supply constraints, retirements

✅ Gas prices near $9/MMBtu; slight national gen decline

 

In our Summer Electricity Outlook, a supplement to our May 2022 Short-Term Energy Outlook, we expect the largest increases in U.S. electric power sector generation this summer will come from renewable energy sources such as wind and solar generation. These increases are the result of new capacity additions. We forecast utility-scale solar generation between June and August 2022 will grow by 10 million megawatthours (MWh) compared with the same period last summer, and wind generation will grow by 8 million MWh. Forecast generation from coal and natural gas declines by 26 million MWh this summer, although natural gas generation could increase in some electricity markets where coal supplies are constrained.

For recent context, overall U.S. power generation in January rose 9.3% year over year, the EIA reports.

Wind and solar power electric-generating capacity has been growing steadily in recent years. By the start of June, we estimate the U.S. electric power sector will have 65 gigawatts (GW) of utility-scale solar-generating capacity, a 31% increase in solar capacity since June 2021. Almost one-third of this new solar capacity will be built in the Texas electricity market. The electric power sector will also have an estimated 138 GW of wind capacity online this June, which is a 12% increase from last June.

Along with growth in renewables capacity, we expect that an additional 6 GW of new natural gas combined-cycle generating capacity will come online by June 2022, an increase of 2% from last summer. Despite this increase in capacity, we expect natural gas-fired electricity generation at the national level will be slightly (1.3%) lower than last summer.

We forecast the price of natural gas delivered to electric generators will average nearly $9 per million British thermal units between June and August 2022, which would be more than double the average price last summer. The higher expected natural gas prices and growth in renewable generation will likely lead to less natural gas-fired generation in some regions of the country.

In contrast to renewables and natural gas, the electricity industry has been steadily retiring coal-fired power plants over the past decade. Between June 2021 and June 2022, the electric power sector will have retired 6 GW (2%) of U.S. coal-fired generating capacity.

In previous years, higher natural gas prices would have resulted in more coal-fired electricity generation across the fleet. However, coal-fired power plants have been limited in their ability to replenish their historically low inventories in recent months as a result of mine closures, rail capacity constraints, and labor market tightness. These coal supply constraints, along with continued retirement of generating capacity, contribute to our forecast that U.S. coal-fired generation will decline by 20 million MWh (7%) this summer. In some regions of the country, these coal supply constraints may lead to increased natural gas-fired electricity generation despite higher natural gas prices.
 

 

Related News

View more

Russia suspected as hackers breach systems at power plants across US

US Power Grid Cyberattacks target utilities and nuclear plants, probing SCADA, ICS, and business networks at sites like Wolf Creek; suspected Russian actors, malware, and spear-phishing trigger DHS and FBI alerts on critical infrastructure resilience.

 

Key Points

Intrusions on energy networks probing ICS and SCADA, seeking persistence and elevating risks to critical infrastructure.

✅ Wolf Creek nuclear plant targeted; no operational systems breached

✅ Attackers leveraged stolen credentials, malware, and spear-phishing

✅ DHS and FBI issued alerts; utilities enhance cyber resilience

 

Hackers working for a foreign government recently breached at least a dozen US power plants, including the Wolf Creek nuclear facility in Kansas, according to current and former US officials, sparking concerns the attackers were searching for vulnerabilities in the electrical grid.

The rivals could be positioning themselves to eventually disrupt the nation’s power supply, warned the officials, who noted that a general alert, prompting a renewed focus on protecting the U.S. power grid, was distributed to utilities a week ago. Adding to those concerns, hackers recently infiltrated an unidentified company that makes control systems for equipment used in the power industry, an attack that officials believe may be related.

The chief suspect is Russia, according to three people familiar with the continuing effort to eject the hackers from the computer networks. One of those networks belongs to an ageing nuclear generating facility known as Wolf Creek -- owned by Westar Energy Inc, Great Plains Energy Inc, and Kansas Electric Power Cooperative Inc -- on a lake shore near Burlington, Kansas.

The possibility of a Russia connection is particularly worrying, former and current official s say, because Russian hackers have previously taken down parts of the electrical grid in Ukraine and appear to be testing increasingly advanced tools, including cyber weapons to disrupt power grids, to disrupt power supplies.

The hacks come as international tensions have flared over US intelligence agencies’ conclusion that Russia tried to influence the 2016 presidential election, and amid U.S. government condemnation of Russian power-grid hacking in recent advisories. The US, which has several continuing investigations into Russia’s activities, is known to possess digital weapons capable of disrupting the electricity grids of rival nations.

“We don’t pay attention to such anonymous fakes,” Kremlin spokesman Dmitry Peskov said, in response to a request to comment on alleged Russian involvement.

It was unclear whether President Donald Trump was planning to address the cyber attacks at his meeting on Friday with Russian President Vladimir Putin. In an earlier speech in Warsaw, Trump called out Russia’s “destabilising activities” and urged the country to join “the community of responsible nations.”

The Department of Homeland Security and Federal Bureau of Investigation said they are aware of a potential intrusion in the energy sector. The alert issued to utilities cited activities by hackers since May.

“There is no indication of a threat to public safety, as any potential impact appears to be limited to administrative and business networks,” the government agencies said in a joint statement.

The Department of Energy also said the impact appears limited to administrative and business networks and said it was working with utilities and grid operators to enhance security and resilience.

“Regardless of whether malicious actors attempt to exploit business networks or operational systems, we take any reports of malicious cyber activity potentially targeting our nation’s energy infrastructure seriously and respond accordingly,” the department said in an emailed statement.

Representatives of the National Security Council, the Director of National Intelligence and the Nuclear Regulatory Commission declined to comment. While Bloomberg News was waiting for responses from the government, the New York Times reported that hacks were targeting nuclear power stations.

The North American Electric Reliability Corp, a nonprofit that works to ensure the reliability of the continent’s power system, said it was aware of the incident and was exchanging information with the industry through a secure portal.

“At this time, there has been no bulk power system impact in North America,” the corporation said in an emailed statement.

In addition, the operational controls at Wolf Creek were not pierced, according to government officials, even as attackers accessed utility control rooms elsewhere in the U.S., according to separate reports. “There was absolutely no operational impact to Wolf Creek,” Jenny Hageman, a spokeswoman for the nuclear plant, said in a statement to Bloomberg News.

“The reason that is true is because the operational computer systems are completely separate from the corporate network.”

Determining who is behind an attack can be tricky. Government officials look at the sophistication of the tools, among other key markers, when gauging whether a foreign government is sponsoring cyber activities.

Several private security firms, including Symantec researchers, are studying data on the attacks, but none has linked the work to a particular hacking team or country.

“We don’t tie this to any known group at this point,” said Sean McBride, a lead analyst for FireEye Inc, a global cyber security firm. “It’s not to say it’s not related, but we don’t have the evidence at this point.”

US intelligence officials have long been concerned about the security of the country’s electrical grid. The recent attack, striking almost simultaneously at multiple locations, is testing the government’s ability to coordinate an effective response among several private utilities, state and local officials, and industry regulators.

Specialised teams from Homeland Security and the FBI have been scrambled to help extricate the hackers from the power stations, in some cases without informing local and state officials. Meanwhile, the US National Security Agency is working to confirm the identity of the hackers, who are said to be using computer servers in Germany, Italy, Malaysia and Turkey to cover their tracks.

Many of the power plants are conventional, but the targeting of a nuclear facility adds to the pressure. While the core of a nuclear generator is heavily protected, a sudden shutdown of the turbine can trigger safety systems. These safety devices are designed to disperse excess heat while the nuclear reaction is halted, but the safety systems themselves may be vulnerable to attack.

Homeland Security and the FBI sent out a general warning about the cyber attack to utilities and related parties on June 28, though it contained few details or the number of plants affected. The government said it was most concerned about the “persistence” of the attacks on choke points of the US power supply. That language suggests hackers are trying to establish backdoors on the plants’ systems for later use, according to a former senior DHS official who asked not to be identified.

Those backdoors can be used to insert software specifically designed to penetrate a facility’s operational controls and disrupt critical systems, according to Galina Antova, co-founder of Claroty, a New York firm that specialises in securing industrial control systems.

“We’re moving to a point where a major attack like this is very, very possible,” Antova said. “Once you’re into the control systems -- and you can get into the control systems by hacking into the plant’s regular computer network -- then the basic security mechanisms you’d expect are simply not there.”

The situation is a little different at nuclear facilities. Backup power supplies and other safeguards at nuclear sites are meant to ensure that “you can’t really cause a nuclear plant to melt down just by taking out the secondary systems that are connected to the grid,” Edwin Lyman, a nuclear expert with the Union of Concerned Scientists, said in a phone interview.

The operating systems at nuclear plants also tend to be legacy controls built decades ago and don’t have digital control systems that can be exploited by hackers. Wolf Creek, for example, began operations in 1985. “They’re relatively impervious to that kind of attack,” Lyman said.

The alert sent out last week inadvertently identified Wolf Creek as one of the victims of the attack. An analysis of one of the tools used by the hackers had the stolen credentials of a plant employee, a senior engineer. A US official acknowledged the error was not caught until after the alert was distributed.

According to a security researcher who has seen the report, the malware that activated the engineer’s username and password was designed to be used once the hackers were already inside the plant’s computer systems.

The tool tries to connect to non-public computers, and may have been intended to identify systems related to Wolf Creek’s generation plant, a part of the facility typically more modern than the nuclear reactor control room, according to a security expert who asked to note be identified because the alert is not public.

Even if there is no indication that the hackers gained access to those control systems, the design of the malware suggests they may have at least been looking for ways to do so, the expert said.

Stan Luke, the mayor of Burlington, the largest community near Wolf Creek, which is surrounded by corn fields and cattle pastures, said he learned about a cyber threat at the plant only recently, and then only through golfing buddies.

With a population of just 2,700, Burlington boasts a community pool with three water slides and a high school football stadium that would be the envy of any junior college. Luke said those amenities lead back to the tax dollars poured into the community by Wolf Creek, Coffey County’s largest employer with some 1,000 workers, 600 of whom live in the county.

E&E News first reported on digital attacks targeting US nuclear plants, adding it was code-named Nuclear 17. A senior US official told Bloomberg that there was a bigger breach of conventional plants, which could affect multiple regions.

Industry experts and US officials say the attack is being taken seriously, in part because of recent events in Ukraine. Antova said that the Ukrainian power grid has been disrupted at least twice, first in 2015, and then in a more automated attack last year, suggesting the hackers are testing methods.

Scott Aaronson, executive director for security and business continuity at the Edison Electric Institute, an industry trade group, said utilities, grid operators and federal officials were already dissecting the attack on Ukraine’s electric sector to apply lessons in North America before the US government issued the latest warning to “energy and critical manufacturing sectors”. The current threat is unrelated to recently publicised ransomware incidents or the CrashOverride malware, Mr Aaronson said in an emailed statement.

Neither attack in Ukraine caused long-term damage. But with each escalation, the hackers may be gauging the world’s willingness to push back.

“If you think about a typical war, some of the acts that have been taken against critical infrastructure in Ukraine and even in the US, those would be considered crossing red lines,” Antova said.

 

Related News

View more

Costa Rica hits record electricity generation from 99% renewable sources

Costa Rica Renewable Energy Record highlights 99.99% clean power in May 2019, driven by hydropower, wind, solar, geothermal, and biomass, enabling ICE REM electricity exports and reduced rates from optimized generation totaling 984.19 GWh.

 

Key Points

May 2019 benchmark: Costa Rica generated 99.99% of 984.19 GWh from renewables, shifting from imports to regional exports.

✅ 99.99% renewable share across hydro, wind, solar, geothermal, biomass

✅ 984.19 GWh generated; ICE suspended imports and exported via REM

✅ Geothermal output increased to offset dry-season hydropower variability

 

During the whole month of May 2019, Costa Rica generated a total of 984.19 gigawatt hours of electricity, the highest in the country’s history. What makes this feat even more impressive is the fact that 99.99% of this energy came from a portfolio of renewable sources such as hydropower, wind, biomass, solar, and geothermal.

With such a high generation rate, the state power company Instituto Costariccense de Electricidad (ICE) were able to suspend energy imports from the first week of May and shifted to exports, while U.S. renewable electricity surpassed coal in 2022 domestically. To date, the power company continues to sell electricity to the Regional Electricity Market (REM) which generates revenues and is likely to reduce local electricity rates, a trend echoed in places like Idaho where a vast majority of electricity comes from renewables.

The record-breaking power generation was made possible by optimization of the country’s renewable sources, much as U.S. wind capacity surpassed hydro capacity at the end of 2016 to reshape portfolios. As the period coincided with the tail end of the dry season, the geothermal quota had to be increased.

Costa Rica remains a leader in renewable power generation, whereas U.S. wind generation has become the most-used renewable source in recent years. In 2015, more than 98% of the country’s electrical generation came from renewable sources, while U.S. renewables hit a record 28% in April in one recent benchmark. Through the years, this figure has remained fairly constant despite dry bouts caused by the El Niño phenomenon, and U.S. solar generation also continued to rise.

 

Related News

View more

Criminals posing as Toronto Hydro are sending out fraudulent messages

Toronto Hydro Scam Warning urges customers to spot phishing emails, fraudulent texts, fake bills, and door-to-door threats demanding bitcoin or prepaid cards, with disconnection threats; report scams to the Canadian Anti-Fraud Centre.

 

Key Points

Advisory on phishing, fake bills, and payment scams posing as Toronto Hydro, with steps to avoid fraud and report.

✅ Hang up suspicious calls; never pay via bitcoin or prepaid cards.

✅ Do not click links in emails or texts; compare bills and account numbers.

✅ Report fraud to the Canadian Anti-Fraud Centre: 1-888-495-8501.

 

Toronto Hydro has sent out a notice that criminals posing as Toronto Hydro are sending out fraudulent texts, letters and emails, similar to a recent BC Hydro scam reported in British Columbia.

The warning comes in a tweet, along with suggestions on how to protect yourself from fraud, especially as policy debates like an NDP public hydro plan can generate confusing messages.

According to Toronto Hydro, fraudsters are contacting people by phone, text, email, fake electricity bills, and even travelling door-to-door.

They threaten to disconnect the power unless an immediate payment is made, even though legitimate utilities must follow proper disconnection notices processes. The website states that in some cases, criminals request payment via pre-paid credit card or bitcoin.

It’s written on the website that Toronto Hydro does not accept these methods of payment, and they do not threaten to immediately disconnect power, a reminder that stories about power theft abroad are not a model for local billing.

If you suspect you are being targeted, you should immediately hang up any suspicious phone calls. Don’t click on any links in emails or texts asking you to accept electronic transfers, as scammers may impersonate well-known utilities during high-profile news such as Hydro One profit changes to appear credible.

Avoid sharing any personal information over the phone or in-person, and do not make any payments related to Smart Meter Deposits, as this fee does not exist and rate-setting is overseen by the Ontario Energy Board in Ontario.

And remember to always compare bills to previous ones, including the amount and account number, since major accounting decisions like a BC Hydro deferral report can fuel confusing narratives.

To report fraudulent activity, please contact:
Canadian Anti-Fraud Centre at 1-888-495-8501; quote file number 844396

 

Related News

View more

Sign Up for Electricity Forum’s Newsletter

Stay informed with our FREE Newsletter — get the latest news, breakthrough technologies, and expert insights, delivered straight to your inbox.

Electricity Today T&D Magazine Subscribe for FREE

Stay informed with the latest T&D policies and technologies.
  • Timely insights from industry experts
  • Practical solutions T&D engineers
  • Free access to every issue

Download the 2025 Electrical Training Catalog

Explore 50+ live, expert-led electrical training courses –

  • Interactive
  • Flexible
  • CEU-cerified