FINAL SUPPORTING STATEMENT
FOR
SUSPICIOUS ACTIVITY REPORTING
USING THE PROTECTED WEB SERVER (PWS)
(3150-0219)
EXTENSION
Description of the Information Collection
The Protected Web Server (PWS) enables the United States (U.S.) Nuclear Regulatory Commission (NRC) to fulfill its mission of communicating sensitive information to licensees and developing more formal, long-term relationships with Federal, State, and local organizations with shared responsibilities for protecting nuclear facilities and activities and responding to incidents.
Under this program, licensees voluntarily provide security reports as a result of advisories that the NRC issues. Nuclear power reactor licensees provide the majority of reports, but other entities that may voluntarily send reports include fuel facilities, independent spent fuel storage installations, decommissioned power reactors, power reactors under construction, research and test reactors, agreement states, non-agreement states, as well as users of byproduct material (e.g., departments of health, medical centers, universities, steel mills, well loggers, and radiographers.) Each report that the NRC receives provides details about a specific security incident that has occurred (e.g., suspicious person, suspicious activity, flyovers) and the actions that the reporting organization is taking to address the incident.
JUSTIFICATION
Need For and Practical Utility of the Collection of Information
The mission of the NRC is to regulate nuclear reactors, materials, and waste facilities in a manner that protects the health and safety of the public, promotes the common defense and security, and protects the environment. Security at nuclear facilities across the country has long been the subject of NRC regulatory oversight, dating back to the 1970s.
The terrorist attacks on the U.S. on September 11, 2001, brought to light a new and more immediate threat to our country. All custodians of the Nation’s critical infrastructure needed to reconsider decisions made earlier about the adequacy of security at the facilities under their charge. To cope with these changes in the threat environment, the NRC undertook a reassessment of its safeguards and security programs to identify prompt actions and long-term enhancements that would raise the level of security at the nuclear facilities across the country.
The PWS fulfills a valuable need in relation to the Nationwide Suspicious Activity Reporting (SAR) Initiative which began in 2008. PWS is the NRC’s contribution to this important national initiative to centralize suspicious activity reporting in the interest of assessing national trends across industries and critical infrastructure.
NRC licensees are encouraged to report suspicious activity, as outlined in the 2005 Department of Homeland Security (DHS)/Federal Bureau of Investigation (FBI) suspicious activity reporting guide[1] and the 2009 DHS cyber-security recommended practice guide[2]. The NRC has also issued two information advisories (IAs) providing guidance on suspicious activity reporting: IA-04-08[3] and IA-13-01[4].
These reports are considered sensitive information and are handled accordingly. This information is added to PWS and shared with authorized nuclear industry officials and Federal, State, and local government agencies.
Agency Use of Information
Analysts in the NRC’s Office of Nuclear Security and Incident Response (NSIR) review threat-related information to evaluate and assess potential threats to the NRC and its licensees. Analysts coordinate threat-related information with the FBI, DHS, and other national-level intelligence agencies to assess the level of threat. PWS is also used as a vehicle to communicate threat-related information to NRC licensees.
Reduction of Burden Through Information Technology
There are no legal obstacles to reducing the burden associated with this information collection. The NRC encourages respondents to use information technology when it would be beneficial to them. The NRC issued a regulation on October 10, 2003 (68 FR 58791), consistent with the Government Paperwork Elimination Act, which allows its licensees, vendors, applicants, and members of the public the option to make submissions electronically via CD-ROM, e-mail, special Web-based interface, or other means. It is estimated that approximately five percent of the potential responses are filed electronically. The majority of submissions are received telephonically.
Effort to Identify Duplication and Use Similar Information
No sources of similar information are available. There is no duplication of requirements.
Effort to Reduce Small Business Burden
One of the main purposes of this effort is to gather information needed without putting significant additional burden on small businesses. Reporting suspicious incidents is voluntary for all respondents and the number of questions on the information collection will be kept to a minimum. However, small businesses, as well as the agency, will benefit by the government’s increased responsiveness to their needs.
Consequences to Federal Program or Policy Activities if the Collection is Not Conducted or is Conducted Less Frequently
Nuclear licensees report this information voluntarily on an ad-hoc basis, as suspicious incidents occur. This immediate reporting is necessary to allow the NRC to provide timely intelligence assessment to prevent or mitigate potential threats to the NRC or its licensees.
If suspicious incident information was not collected, it would negatively affect the NRC’s ability to analyze threats to its licensees. It would also create a void in threat‑related information pertaining to the nuclear sector in the National Security Environment/SAR Program.
Circumstances Which Justify Variation from Office of Management and Budget Guidelines
There exists no requirement for licensees to report suspicious incidents on a routine reporting schedule. Rather, licensees are encouraged to voluntarily report suspicious incidents on an as-needed basis as security incidents occur and/or as security incidents are identified, which may lead to reporting more often than quarterly. This immediate reporting is necessary to allow the NRC to provide timely intelligence assessment to prevent or mitigate potential threats to the NRC or its licensees.
Consultations Outside the NRC
Opportunity
for public comment on the information collection requirements for
this clearance package was published In the Federal
Register
on September 8, 2016
(81 FR 62179). While the information
collection was out for comment, the NRC’s Office of Nuclear
Security and Incident Response contacted 9 potential respondents to
request feedback on four specific questions about the information
collection. The potential respondents were contacted via e-mail on
November 2, 2016, as part of the public consultation process. The
potential respondents were selected from the group of licensee
personnel with active accounts in the PWS. The potential respondents
contacted as part of the information collection included
representatives from the following: Constellation Energy Nuclear
Group, Exelon Nuclear, Entergy, Southern Nuclear Operating Company,
Duke Energy, and Florida Power and Light Company/NextEra Energy. No
comments were received as part of the public consultation process.
Payment or Gift to Respondents
Not applicable.
Confidentiality of Information
Confidential and proprietary information is protected in accordance with NRC regulations at Title 10 of the Code of Federal Regulations (10 CFR) 9.17(a) and 10 CFR 2.390(b). Suspicious incident reports may contain Personally Identifiable Information (PII) or other sensitive but unclassified information about the facility, security posture, security counter-measures, and other potential vulnerabilities. For example, information may relate to identifying an individual or vehicle involved in a suspicious incident, such as: name, address, date of birth, vehicle make and model, license plate, Vehicle Identification Number, etc. Access to PII and other sensitive but unclassified information is limited to select individuals within the NRC and FBI, and is redacted for all other PWS users.
PWS administrators used the principle of least privilege when assigning access rights to PWS users. All users, to include NRC staff; authorized nuclear industry officials; and Federal, State, and local government agencies, are assigned role‑based access rights in PWS based on their need-to-know. PWS users are also required to accept terms of service before being granted an account in PWS. The NRC will not be able to ensure proper use of information by external users beyond limiting access based on need-to-know. FBI representatives are the only users outside of the NRC that will have access to any PII.
To date, the NRC has approximately 20 representatives from the FBI who have access to the PWS. These individuals are not from a specific office within the FBI; rather, they represent a variety of FBI offices, task forces, and directorates related to weapons of mass destruction, critical infrastructure, and nuclear and radiological issues. All requests from the FBI for accounts in the PWS are reviewed and approved by NSIR before being created. The NRC has the legal authority to share this information with the FBI under Section 221.b. of the Atomic Energy Act, codified at 42 U.S. Code 2271.
A Privacy Impact Assessment was performed by the agency for the system in August 2011. A System of Records Notice is not required for this system because it is not searchable by PII. The only searchable fields for Suspicious Incidents are as follows: incident ID, date, region, reporting organization, site/licensee name, report category, current phase, status, and last updated (date). In order to avoid any potential issues with searching on PII, the full-text search feature is limited to the Communication Documents and Cyber Related Documents Views.
Justification
for Sensitive Questions
No
questions of a sensitive nature are contained in any of the
associated information collection requirements.
Estimated Burden and Burden Hour Cost
The NRC staff estimates that 62 licensees will annually submit 124 reports through PWS, and that each report will require 2 hours to prepare and submit. The total licensee burden for this information collection is 248 hours at a cost of $65,720 (248 hours x $265/hour) (see Table 1).
Estimate of Other Additional Costs
There are no additional costs.
Estimated Annualized Cost to the Federal Government
The annual costs to the NRC include staff hours and contractual support:
Staff Hours = 1,000 hours per year @ $265/hour = $265,000
Contractual Support = $140,000 per year = prior year cost (beginning with $126,435
+ approximately 5% for the costs of inflation and information technology modernization per year)
TOTAL COST = $405,000
Reasons for Change in Burden or Cost
The burden estimate for respondents has decreased from 678 hours to 248 hours per year, thus resulting in a reduction in cost from $184,416 to $65,720 per year for respondents. The decrease is attributed to a change in the estimated number of responses per respondent. Historically, the NRC staff estimated that 50 licensees will annually submit 339 reports through PWS, equating to an average of 6.78 responses per respondent. However, in calendar year 2015, 62 licensees submitted approximately 124 reports through the PWS. The NRC does not anticipate the number of respondents to significantly increase in the near future nor does the NRC anticipate that the number of responses per respondent will significantly increase in the near future and, as a result, the NRC estimates that a similar number of reports will be received in the next 3 years. In addition, the respondent cost decreased due to the decrease in the fee rate from $272 to $265/hour.
Despite the decrease in fee rate from $272 to $265/hour, the annualized cost to the Federal government increased as a result of the increased annual costs associated with contractual support for the PWS. The NRC estimates that the annual costs associated with contractual support for the PWS will continue to increase in the next 3 years as the information technology equipment supporting the PWS will require ongoing maintenance and modernization.
Publication for Statistical Use
Due to the sensitivity of the information contained in PWS, all information is considered OFFICIAL USE ONLY and not to be shared publicly.
Reason for Not Displaying the Expiration Date
Not Applicable.
Exceptions to the Certification Statement
None.
COLLECTIONS OF INFORMATION EMPLOYING STATISTICAL METHODS
Not applicable.
TABLE 1
ANNUALIZED REPORTING BURDEN (Voluntary)
Section |
No. of Respondents |
Responses per Respondent |
Total No. of Responses |
Burden Hours per Response |
Total Annual Reporting Burden (Hrs) |
Voluntary Suspicious Incident Reporting for CY 2015 |
62 |
2 |
124 |
2 |
248 |
TOTAL BURDEN HOURS: 248 hours (248 hours reporting + 0 hours third party notification + 0 hours recordkeeping)
TOTAL BURDEN HOUR COST: $65,720 (248 hours x $265/hour)
ANNUAL RESPONDENTS: 62 respondents (none required)
RESPONSES: 124 responses (124 reporting responses + 0 third party
responses + 0 record keepers)
[1][1] “Terrorist Threats to the U.S. Homeland: Reporting Guide for Critical Infrastructure and Key Resource Owners and Operators,” DHS/FBI, January 2005.
[2][2] “Recommended Practice: Developing an Industrial Control Systems Cyber-security Incident Response Capability,” DHS, October 2009.
[3][3] “Reporting Suspicious Activity Criteria,” NRC, October 2004.
[4][4] “Updated Criteria to Reporting Suspicious Activity Associated with Cyber Security Incidents,” NRC, January 2013.
File Type | application/vnd.openxmlformats-officedocument.wordprocessingml.document |
File Title | FINAL SUPPORTING STATEMENT |
Author | keb1 |
File Modified | 0000-00-00 |
File Created | 2021-01-23 |