Foreign Firm Funding U.S. Green Groups Tied to State-Owned Russian Oil Company

Ever wonder who’s behind the drive to sabotage oil independence in America under the guise of radical environmentalism? Look no further than Russia — and they’ve been doing it for decades. It didn’t just start with fracking.

Read the full article only if you can stomach seeing how strong of an undetected stranglehold Russia has on America.

 

https://i0.wp.com/s3.freebeacon.com/up/2015/01/Rosneft.jpg

 

A shadowy Bermudan company that has funneled tens of millions of dollars to anti-fracking environmentalist groups in the United States is run by executives with deep ties to Russian oil interests and offshore money laundering schemes involving members of President Vladimir Putin’s inner circle.One of those executives, Nicholas Hoskins, is a director at a hedge fund management firm that has invested heavily in Russian oil and gas. He is also senior counsel at the Bermudan law firm Wakefield Quin and the vice president of a London-based investment firm whose president until recently chaired the board of the state-owned Russian oil company Rosneft.

In addition to those roles, Hoskins is a director at a company called Klein Ltd. No one knows where that firm’s money comes from. Its only publicly documented activities have been transfers of $23 million to U.S. environmentalist groups that push policies that would hamstring surging American oil and gas production, which has hurt Russia’s energy-reliant economy. Continue reading

‘Dragonfly’ virus strikes U.S. power plants

WASHINGTON – U.S. and European energy companies have become the target of a “Dragonfly” virus out of Eastern Europe that goes after energy grids, major electricity generation firms, petroleum pipelines operators and energy industrial equipment providers.

Unearthed by the cyber security firm Symantec, Dragonfly has been in operation since at least 2011. Its malware software allows its operators to not only monitor in real time, but also disrupt and even sabotage wind turbines, gas pipelines and power plants – all with the click of a computer mouse.

The attacks have disrupted industrial control system equipment providers by installing the malware during downloaded updates for computers running the ICS equipment. Continue reading