|
---|
Category:E-Mail
MONTHYEARML24011A2332024-01-11011 January 2024 Request for Additional Information - License Amendment Request (ML23058A064) (EPID L-2023-LLA-0026 - Three Mile Island, U2: Amendment Historic and Cultural Resources) ML23187A0202023-06-29029 June 2023 TMI Unit 2 RAI Related to the Amended Post-Shutdown Decommissioning Activities Report ML23135A3992023-05-12012 May 2023 (External_Sender) Section 106 Consultation - NRC NHPA for Three Mile Island Unit 2 ML23159A1642023-05-11011 May 2023 Email TMI-2 Pol Am. 67 SE Minor Discrepancies ML23107A2232023-04-14014 April 2023 Response Re State Consultation-TMI-2 Solutions - Draft EA Fonsi Criticality Exemption Request ML23094A1482023-03-30030 March 2023 TMI-2 TS 6.0 Draft Wording Agreement ML23090A2142023-03-30030 March 2023 Asnyder, NRC Email from Tdevik, Energysolutions, Three Mile Island, Unit 2 -Response Regarding MC&A TS Change, Modification ML23094A0602023-03-30030 March 2023 TMI-2 Response on Draft TS Wording ML23068A4682023-03-0909 March 2023 Response Re State Consultation - License Amendment Request TMI-2 Solutions - Update Technical Specifications and Remove Certain License Conditions Applicable to Pdms ML23057A0062023-02-24024 February 2023 State Consultation - License Amendment Request TMI-2 Solutions - Update Technical Specifications and Remove Certain License Conditions Applicable to Pdms ML23051A0412023-02-15015 February 2023 Email from TMI-2 Solutions Regarding Commitment Date, Dated 02/15/2023 ML22364A1942022-12-30030 December 2022 Email Mitigation for Hydrogen Concerns Commitment, Dated December 30, 2022 ML22357A0142022-12-22022 December 2022 NRC Request for Additional Information Related to the TMI-2 Pdms Transition License Amendment Request ML22321A0072022-11-16016 November 2022 Material Control and Accounting RAI Response Clarification Call Docket No 50-320 ML23069A1582022-09-22022 September 2022 NRC Response TMI-2 Solutions Exemption Question ML22214A0482022-08-0101 August 2022 TMI-2 Response: License Amendment Request TMI-2 Solutions Physical Materials Security Plan - Revised Modified License Condition 2.C(2) ML22208A0492022-07-21021 July 2022 State Consultation Response: License Amendment Request TMI-2 Solutions Physical Materials Security Plan ML22199A2762022-07-18018 July 2022 E-mail from A. Snyder, NRC, to B. Werner, PDEP, Regarding State Consultation Proposed Conforming Amendment Related to Proposed Exemption Request from Certain Record Retention Requirements ML22199A2772022-07-15015 July 2022 E-mail Attachment: Federal Register Notice - Volume 87 ML22189A2032022-07-0808 July 2022 E-mail from A. Snyder, NRC, to B. Werner, PA Department of Environment Protection - Three Mile Island, Unit 2 - State Consultation - License Amendment Request TMI-2 Solutions Physical Materials Security Plan ML22189A2042022-06-28028 June 2022 NRC-2022-0131-0001_Content - Federal Register Vol. 87, No. 123 ML22143A8902022-05-23023 May 2022 Request for Additional information- TMI-1 ISFSI Only Physical Security License Amendment Request ML22131A1382022-05-10010 May 2022 E-mail from T. Devik, Energysolutions TMI-2, to A. Snyder, NRC, Physical Security Plan May 9 Submittal Typo Correction ML22125A0162022-05-0303 May 2022 Email from T Devik to a Snyder: Three Mile Island 2 - Security Plan Proposed Revision License Condition 2.C.(2) (EPID: L-2021-LLA-0103) Proposed License Condition - May 3, 2022 Response Courtesy Copy ML22125A0102022-05-0303 May 2022 Proposed Action- Proposed Fonsi for TMI-1 Exemption Request from 10 CFR 50.82(a)(8)(i)(A) and 10 CFR 50.75(h)(1)(iv) Notification of Commonwealth of Pennsylvania Response ML22125A0092022-05-0303 May 2022 Proposed Action- Proposed Fonsi for TMI-1 Exemption Request from 10 CFR 50.82(a)(8)(i)(A) and 10 CFR 50.75(h)(1)(iv) Notification of Commonwealth of Pennsylvania ML22125A0132022-04-28028 April 2022 Security Plan Proposed Revision License Condition 2.C.(2) (EPID: L-2021-LLA-0103) Proposed License Condition - Partial Response ML22125A0122022-04-28028 April 2022 Clarification RAI Partial Response Email from C Smith to a Snyder ML22110A0212022-04-19019 April 2022 Security Plan Proposed Revision License Condition 2.C.(2) (EPID: L-2021-LLA-0103) Proposed License Condition ML22110A0202022-04-19019 April 2022 Unit 1 Request for Additional Information ML22108A1762022-04-14014 April 2022 E-mail: Proposed Order Conditions for In-Direct Transfer of Licenses Held by Energysolutions, LLC (Zion, TMI Unit-2, La Crosse Boiling Water Reactor, Kewaunee, Energysolutions Radioactive Materials License, and Energysolutions Export Licens ML22102A3062022-03-31031 March 2022 Email from T. Divik, Energy Solutions, to A. Snyder Clarification of Security License Condition Amendment Request ML22094A1812022-03-22022 March 2022 Licensee High Confidence Dates for Submittals ML22108A1022022-03-18018 March 2022 Email from A. Snyder, NRC to G. Van Noordennen, Energy Solutions, Clarification Request - September 21, 2021 Supplement- TMI-2 Physical Security Plan LAR ML22090A0142022-03-17017 March 2022 TMI, Unit 1 - Commonwealth of PA Response to Request for Consultation on the Proposed Revision to the License and the Permanently Defueled Technical Specifications to Align to the Requirements for Permanent Removal of Spent Fuel from the Sp ML22070A1202022-03-10010 March 2022 E-mail from S. Acker, PADEP, to A. Snyder, NRC - Three Mile Island Unit 1, State Consultation - License Amendment Request TMI-1 in Support of the ISFSI Only Security Plan License Amendment Request ML22068A1792022-03-0909 March 2022 Email from a Snyder to Acker State Consultation- License Amendment Request TMI-1 in Support of the ISFSI Only Emergency Plan and Emergency Action Level Scheme ML22068A1672022-03-0909 March 2022 Email from a Snyder to Acker State Consultation - License Amendment Request TMI-1 in Support of the ISFSI Only Security Plan License ML22068A1462022-03-0909 March 2022 Email from a Snyder to Acker Three Mile Island Unit 1, State Consultation- License Amendment Request TMI-1 in Support of the ISFSI Only Tech Spec License Amendment Request ML22090A0232022-03-0909 March 2022 Email from A. Snyder, NRC to Craig Smith, Constellation Energy Generation, License Amendment Request - Proposed ISFSI-Only Technical Specifications, Dated March 9, 2022 ML22047A2392022-02-16016 February 2022 E-mail from D. Kenney to A. Snyder Dated 2/16/2022 TMI Unit 1 Typo Correction to February 8, 2022 Submittal ML22038A9352022-02-0707 February 2022 TMI-2 Pdms LAR Email Dated 2/7/2022 from T. Smith, NRC to G. Van Noordennen ML22034A6702022-02-0303 February 2022 LTR-22-0020 Eric Epstein, E-mail Follow-up on Decommissioning and Tax Question from December 8, 2021 on TMI Cleanup Funding, Docket Id NRC-2021-0230 - Region I Response ML22343A1612021-11-0909 November 2021 Shpo Email 11-9-2021 Alowery to Gvannoordennen and Hpell ML21256A1902021-09-10010 September 2021 NRR E-mail Capture - Exelon Generation Company, LLC - Request for Additional Information Regarding License Transfer Application ML21230A3812021-08-18018 August 2021 TMI-1 ISFSI-Only Security Plan License Amendment Request ML21154A0132021-05-28028 May 2021 NRR E-mail Capture - Extension of Comment Period for the Exelon Generation Company, LLC License Transfer Application ML21154A0142021-05-28028 May 2021 NRR E-mail Capture - Extension of Comment Period for the Exelon Generation Company, LLC License Transfer Application ML21154A0112021-05-28028 May 2021 NRR E-mail Capture - Extension of Comment Period for the Exelon Generation Company, LLC License Transfer Application ML21144A2132021-05-24024 May 2021 NRR E-mail Capture - Exelon Generation Company, LLC - Request for Additional Information Regarding License Transfer Application 2024-01-11
[Table view] Category:General FR Notice Comment Letter
MONTHYEARML20119A5392020-04-27027 April 2020 Comment from Anonymous Individual on the Three Mile Island Nuclear Station, Unit 2; Consideration of Approval of Transfer of License and Conforming Amendment 1 ML20119A5372020-04-26026 April 2020 Comment from Anonymous Individual on the Three Mile Island Nuclear Station, Unit 2; Consideration of Approval of Transfer of License and Conforming Amendment ML15124A0252015-04-21021 April 2015 Comment (34) of Daniel A. Kavanaugh Opposing NUREG-2176, Renewal of Facilities at Turkey Point ML13028A0352013-01-0202 January 2013 Comment (324) of Johanna Anderson on Consideration of Environmental Impacts of Temporary Storage of Spent Fuel After Cessation of Reactor Operation ML0922405782009-08-0303 August 2009 Comment (1) of Kevin Magerr on Behalf of the U. S. Environmental Protection Agency (Epa), Region 3 Re Final Generic Environmental Impact Statement for License Renewal of Nuclear Plants Supplement 37 Regarding Three Mile Island Nuclear Stati ML0907501802009-03-0404 March 2009 Comment (4) of Kevin Magerr on Behalf of Us Environmental Protection Agency, on Generic Draft Environmental Impact Statement for License Renewal of Nuclear Plants Supplement 37 Regarding Three Mile Island Nuclear Station, Unit 1 December 20 ML0906807662009-02-27027 February 2009 Comment (2) of Mary Osborn Opposing Nrc'S Draft Environmental Report for Three Mile Island License Renewal Application ML0906803882009-02-24024 February 2009 Comment (1) of Eric Joseph Epstein on Behalf of Three Mile Island Alert, Inc., on Nrc'S Draft Environmental Report for Three Mile Island License Renewal Application ML0900801632008-08-21021 August 2008 Comment (12) of David Lochbaum on Behalf of Union of Concerned Scientists on Operator Working Hour Limits at Multiple-Unit Nuclear Plant Site with at Least One Reactor Operating and Other(S) Not ML0822000512008-07-0909 July 2008 Comment (2) of David P. Helker, on Behalf of Exelon and Amergen, Concerning Draft Regulatory Guide DG-1195, Availability of Electric Power Sources. ML0816906792008-05-30030 May 2008 Comment (2) of Michael G. Browne on Three Mile Island Nuclear Station, Unit 1, License Renewal Environmental Impact Statement ML0816906782008-05-29029 May 2008 Comment (1) of Mary Osborn Onassiai on Three Mile Island Nuclear Station, Unit 1, License Renewal Environmental Impact Statement ML0815001582008-05-13013 May 2008 Comment (1) of Linda Braasch on Behalf of Citizens of Pennsylvania, Opposing Re-Licensing of Three Mile Island Unit 1 ML0808604892008-03-13013 March 2008 Comment (4) of David P. Helker on Behalf of Exelon Generation and Amergen Supporting Draft Regulatory Guide DG-5015, Training and Qualification of Security Personnel at Nuclear Power Reactor Facilities. ML0725304822007-08-31031 August 2007 Comment (2) of Scott Portzline, on Draft Regulatory Guide DG-5019 ML0706600592007-02-27027 February 2007 Comment (17) of Mary Osborn Opposing Relicensing of Pilgrim Nuclear Power Plant (NUREG-1437, Suppl. 29) ML0704301462007-02-0606 February 2007 Comment (11) of Katie Sirk, Opposing Nrc'S Report on the Issue of Putting in an Irradiation Facility in Honolulu ML0507001082005-03-0101 March 2005 Comment (1) of Yeonsub Jung, KHNP Comments on NRC Documents, NUREG-0800, Chapter 18 (Revised 2004) 2020-04-27
[Table view] |
Text
Page 1 of 1 NRCREP - comment for DRAFT REGULATORY GUIDE DG-5019 From: "sdportzline@netzero.com" <sdportzline@netzero.com>
To: <NRCREP@nrc.gov> 7/116107 Date: 09/02/2007 2:17:49 PM
Subject:
comment for DRAFT REGULATORY GUIDE DG-5019 CC: <sdportzline@netzero.net>
PLease add this to the public comment record for DRAFT REGULATORY GUIDE DG-5019 There has been some troubles with the NRC's web pages for petition and comment submissions.
Scott Portzline (F-)
for TMI Alert -
file atached 7 r-1 Fr C:)
0-g,~2s~ ~.9~,cL1273 file://C:\temp\GW}O0001 .HTM 09/04/2007
I c:\temp\GW)00009.TMP Page 1'Ii Lc:\temp\GW}00009.TMP Page 1 Mail Envelope Properties (46DAFE40.131 : 18 : 33073)
Subject:
comment for DRAFT REGULATORY GUIDE DG-5019 Creation Date Sun, Sep 2, 2007 2:16 PM From: "sdportzline @ netzero.com" <sdportzline @ netzero.com>
L Created By: sdportzline@netzero.com Recipients nrc.gov TWGWPO01 .HQGWDOO1 NRCREP netzero.net sdportzline CC Post Office Route TWGWPO01 .HQGWDOOI nrc.gov netzero.net Files Size Date & Time MESSAGE 216 Sunday, September 2, 2007 2:16 PM TEXT.htm 290 TMIALert comment DG-5019.pdf 44229 Mime.822 63365 Options Expiration Date: None Priority: Standard ReplyRequested: No Return Notification: None Concealed
Subject:
No Security: Standard Junk Mail Handling Evaluation Results Message is eligible for Junk Mail handling This message was not classified as Junk Mail Junk Mail settings when this message was delivered Junk Mail handling disabled by User Junk Mail handling disabled by Administrator Junk List is not enabled Junk Mail using personal address books is not enabled
August 31, 2007 Scott D. Portzline 3715 N 3rd Street Harrisburg PA 17110 Rulemaking, Directives, and Editing Branch Office of Administration U.S. Nuclear Regulatory Commission Washington, DC 20555-0001 RE: DRAFT REGULATORY GUIDE DG-5019 (Proposed Revision 2 of Regulatory Guide 5.62, dated December 2006)
REPORTING OF SAFEGUARDS EVENTS Secretary of the Commission Annette L. Vietti-Cook, Please add these comments to record on behalf of Three Mile Island alert:
- 1. Concerning section 2.4 Examples of Security Events to be Reported Within 1 Hour
"(3) The following are examples for interruption of normal operation of any NRC-licensed power reactor through unauthorized use of or tampering with its components, controls, or security systems:
0 tampering with plant equipment or physical security equipment that is either confirmed to be suspicious or malevolent in origin or is determined not to be reasonable mechanical failure or human error (Events which are suspicious in nature and for which no general assessment can be made within 1 hour1.157407e-5 days <br />2.777778e-4 hours <br />1.653439e-6 weeks <br />3.805e-7 months <br />, should be reported) 9 confirmed cyber attacks on or failures of computer systems that may adversely impact safety, security, and emergency preparedness
- an actual or imminent strike by the security force" We believe that licensees should report any "data storm" or network slowdown, whether it is understood, or whether the cause is undetermined, within 30 minutes of its
commencement. This would allow the NRC (and then in turn other federal law enforcement agencies and the Department of Homeland Security) to assess if there is a concerted cyber attack occurring at multiple reactor sites. Without such notification, a rapidly occurring trend may be overlooked and delay proper responses. Additionally, unaffected reactor sites could take additional temporary actions to secure their cyber systems until the threat is resolved.
The wording of the draft guide is too vague in its description of cyber system failures. For example: a slow down may not be considered a failure or even a safety concern. It may be considered normal. However, system attackers have created data storms as an opportunity to open portals to gain control of the system and issue commands.
Humans tend to delay conclusions that a serious computer problem exits. It is likely that systems managers will take remedial actions to recover control; including --
rebooting, replacing computer components, dumping data, seclusion, and simply "waiting it out." Because these responses could take hours, the licensee should be required to report that a cyber problem of unknown origin is occurring.
It is too easy for licensees to create a "general assessment" (as per the draft guide) of an intermittent yet ordinary network slowdown.
Therefore, the wording for what conditions requiring cyber reporting must be clarified. The draft guide comes close but leaves too much "wiggle-room."
- 2. Although this following statement is not part of the proposed guide for reporting, we cannot understand why it is not already a safeguards requirement.
"Licensee should consider obtaining access to NRC's Protected Webserver (PWS) in order to obtain routine threat bulletins and analyses from the Federal Bureau of Investigation (FBI) and U.S. Department of
Homeland Security (DHS). Licensee should contact region and headquarters staff for further information on obtaining access to PWS."
cyber crimes backgound:
- "In November 2006, the U.S.-China Economic and Security Review Commission reported that China is actively improving its nontraditional military capabilities.1 According to the study, Chinese military strategists write openly about exploiting the vulnerabilities created by the U.S.
military's reliance on advanced technologies and the extensive infrastructure used to conduct operations. Chinese military writings also refer to attacking key civilian targets such as financial systems. In addition, the report stated that Chinese intelligence services are capable of compromising the security of computer systems. The commission also provided instances of computer network penetrations coming from China. For example, in August and September 2006, attacks on computer systems of the Department of Commerce's Bureau of Industry and Security forced the bureau to replace hundreds of computers and lock down Internet access for one month."
- "In August 2006, a California man was convicted for conspiracy to intentionally cause damage to a protected computer and commit computer fraud. Between 2004 and 2005, he created and operated a botnet that was configured to constantly scan for and infect new computers. For example, in two weeks in February of 2005, the defendant's bots reported more than 2 million infections of more than 629,000 unique addresses (some infected repeatedly). It damaged hundreds of DOD computers worldwide. The DOD reported a total of $172,000 of damage due to a string of computer intrusions at numerous military installations in the United States (including Colorado, Florida, Hawaii, Maryland, South Carolina, and Texas) and around the world (including Germany and Italy). In addition, the botnet compromised computer systems at a Seattle hospital, including patient systems, and damaged more than 1,000 computers in a California school district over the course of several months in 2005. Officials from the California school district reported damages between $50,000 and $75,000 to repair its computers after the botnet struck in February 2005." 2
- "The Central Intelligence Agency has identified two known terrorist organizations with the capability and greatest likelihood to use cyber attacks against our infrastructures." 3
- "In March 2005, security consultants within the electric industry reported that hackers were targeting the U.S. electric power grid and had gained access to U.S. utilities' electronic control systems. Computer security specialists reported that, in a few cases, these intrusions had "caused an impact." While officials stated that hackers had not caused serious damage to the systems that
feed the nation's power grid, the constant threat of intrusion has heightened concerns that electric companies may not have adequately fortified their defenses against a potential catastrophic strike." 4 U.S.-China Economic and Security Review Commission, 2006 Report to Congress of the U.S. -China Economic and Securiti,Review Commission (Washington, D.C.: November 2006).
2 DOJ, United States Attorney for the Western District of Washington, Press Release, CaliforniaMan Sentenced for "Botnet'"Attack that Implicated Millions: Network of Robot Computers Damaged Military Installations, Northwest Hospital, and CaliforniaSchool District(Seattle, WA: Aug. 25, 2006).
3 Statement for the Record, Information Operations Issue Manager, Central Intelligence Agency, before the Congressional Joint Economic Committee (Feb. 23, 2000). Page 21 GAO-07-705 4 GAO, CriticalInfrastructureProtection:Department of Homeland Security Faces Challengesin Fulfilling Cybersecurity Responsibilities,GAO-05-434 (Washington, D.C.: May 26, 2005).
Scott D. Portzline Security Consultant to Three Mile Island Alert