Monday, April 05, 2021

Beaufort Gyre, Ice Age Triggers, Solar Forcing | S0 News Apr.4.2021

REMOTE / In-Person-Or-Not WFH > Mesa City Council Study Session Mon 04.05.2021

Let the fun - and oversight - begin > it's time to start the process of Budget Hearings
What is A BUDGET HEARING?
A meeting that is usually open to the general public to discuss a business or government budget.
People can ask questions and get answers from elected or salaried city employees.
You have the right-to-know and the duty to study what dollar amounts are in the individual city department planning documents that have been prepared - and judge for yourselves if the City of Mesa Government - all the hired and salaried (some for a long time) city officials and the seven people you elected as your representatives on the City Council - are doing their jobs earning their salaries paid by residents and taxpayers - to represent your interests.
If you don't communicate with your district member, they can always listen to "special-interest" groups that might not be the same as  the public interest . Your government has the duty and responsibility to be open, transparent and accountable.
The official description from the city's webpage:
"Each year, the city's budget is developed in conjunction with residents, the Mayor and City Council, City Manager and City Employees. The result is a budget that closely matches the community's highest priorities each fiscal year."
__________________________________________________________________
Council Study Session Notice: To decrease COVID-19 exposure, the City Council Chambers is closed, but public viewing and input on the items are available electronically. Members of the City Council will appear electronically for this meeting, via a video conferencing platform, and the live meeting will be accessible via broadcast and telephonically. 
Because of the current public health emergency, the City Council Chambers is closed for Council study sessions. However, the live meeting may be watched on local cable Mesa channel 11, online at Mesa11.com/live, www.youtube.com/user/cityofmesa11/live, or https://www.facebook.com/CityofMesa, or listened to by calling 888-788-0099 or 877-853-5247 (toll free) using meeting ID 5301232921 and following the prompts. 
For any difficulties accessing this meeting, please call 480-644-2099.
-----------------------------------------------------------------------------------------------------------------------------------------------------------
Monday, April 5, 2021 4:45 PM 
Lower Council Chambers 
Roll Call (City Council members participate in person or via electronic means.) 

1 Review and discuss items on the agenda for the April 5, 2021 regular Council meeting 

2 Presentations/Action Items: 
21-0352 Hear a presentation, discuss, and provide direction on the Police Department budget
2-a 
File #:21-0352   
Type:PresentationStatus:Agenda Ready
In control:City Council Study Session
On agenda:4/5/2021
Title:Hear a presentation, discuss, and provide direction on the Police Department budget.
Attachments:1. Presentation
637321535572830000 (3).jpg
MEETING DETAILS:
MESA POLICE DEPARTMENT 
FY 2021-2022 BUDGET PRESENTATION 
(18 PowerPoint slides)
OVERVIEW
• Strategic Allocations • Public Safety by the Numbers • Addressing Homelessness • Recruiting • HQ
Do+Stuff+Escape+Games+Investigate.gif
EXPENDITURES BY SERVICE LEVEL
STRATEGIC ALLOCATIONS • 3rdYear Enhanced Training Academy • Citywide CCTV & C-Cure On-going Costs •Traffic Analyst • Digital Forensics • Rekeying of Holding Facility • Outsourcing of Order of Protection Service • Photo Safety Cameras – Schools & Other
> BUDGETED POSITION GROWTH FY21/22 
Sworn Position Additions: Patrol Officers (8) Patrol Sergeants (2) Special Operations Detective 
Professional Staff Position Additions: Police Service Officer for Patrol Operations (1) Crime Prevention Officer (1) 911 Operators (2) Police Dispatchers (2) Crime Scene Specialists (1) Police Investigator III (1) IT Engineer (1)
RESPONSE 
• Operation Off the Streets 
• Encampment Clean Up Efforts 
• Homeless Response as Standard Patrol Operations 
• Remote Observation Platform
MENTAL HEALTH CRISIS & RESPONSE
HEADQUARTER RENOVATIONS
Building for the Future: 
Law enforcement policies are making headlines, but many jurisdictions have been revising their law enforcement approaches for years. 
These changes often involve embracing new technologies, government reinvention and alternate enforcement methods with the goal of improving policing effectiveness, resource efficiency and public trust. 
Design Themes: 
• Community Integration 
• Technological Adoption 
• Stress Reduction 
• Improved Efficiencies 
• Workplace innovation

3 Current events summary including meetings and conferences attended 

4 Scheduling of meetings.
-------------------------------------------------------------------------------------
The Office of Management and Budget's (OMB) mission is to ensure the effective and efficient use of resources in order to sustain the delivery of quality services for the residents of Mesa.
The Office of Management and Budget develops and manages the annual operating budget and the five-year capital improvement program
  • It forecasts city-wide revenues, expenditures and fund balances
  • It conducts special projects
  • It administers the City's performance excellencewhich provides process improvement, performance management and strategic planning services to city organizations.

In addition, OMB is home to the Management Analyst Team, which recruits talented professionals interested in a career in 
LINK > https://www.mesaaz.gov/city-hall/office-of-management-budget 
____________________________________________________________________
PRESENTATIONS AND REPORTS: Go here  >
 https://www.mesaaz.gov/city-hall/office-of-management-budget/presentations-reports
____________________________________________________________________
Item 2-a
File #: 21-0352   
Type: Presentation Status: Agenda Ready
In control: City Council Study Session
On agenda: 4/5/2021
Title: Hear a presentation, discuss, and provide direction on the Police Department budget.
Attachments: 1. Presentation
----------------------------------------------------------------------------------------------------------------------------
Check it Out >
Office of Management & Budget
What is the City’s budget process? 
Anyone see where citizens are involved)           
Delve into the City’s 12 step budget cycle, see how the budget is managed, and understand budget limitations and requirements
(Might be nice if this was updated from last year 2017, but then again they've been busy)
_________________________________________________________________________
The Office of Management and Budget's (OMB) mission is to ensure the effective and efficient use of resources in order to sustain the delivery of quality services for the residents of Mesa.
The Office of Management and Budget develops and manages the annual operating budget and the five-year capital improvement program. It forecasts city-wide revenues, expenditures and fund balances; conducts special projects; and administers the City's performance excellence, which provides process improvement, performance management and strategic planning services to city organizations.
More
 

Sunday, April 04, 2021

FED FORESIGHT FAILURE: "Advanced Persistent Threats" > Cybersecurity and Infrastructure Security

One more warning on Friday 02 April 2021 in a Joint Statement about MORE HACKING and Ransomware or Espionage Compromises
Advanced persistent threat - WikipediaAn advanced persistent threat is a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period.

Feds say hackers are likely exploiting critical Fortinet VPN vulnerabilities

Exploits allow hackers to log into VPNs and then access other network resources.

"The FBI and the Cybersecurity and Infrastructure Security Agency said that advanced hackers are likely exploiting critical vulnerabilities in the Fortinet FortiOS VPN in an attempt to plant a beachhead to breach medium and large-sized businesses in later attacks
Feds say hackers are likely exploiting critical Fortinet VPN vulnerabilitiesAPT actors may use these vulnerabilities or other common exploitation techniques to gain initial access to multiple government, commercial, and technology services,” the agencies said Friday in a joint advisory. “Gaining initial access pre-positions the APT actors to conduct future attacks.” APT is short for advanced persistent threat, a term used to describe well-organized and well-funded hacking groups, many backed by nation states.
Breaching the mote
Fortinet FortiOS SSL VPNs are used mainly in border firewalls, which cordon off sensitive internal networks from the public Internet. Two of the three already-patched vulnerabilities listed in the advisory—CVE-2018-13379 and CVE-2020-12812—are particularly severe because they make it possible for unauthenticated hackers to steal credentials and connect to VPNs that have yet to be updated.
“If the VPN credentials are also shared with other internal services (e.g. if they're Active Directory, LDAP, or similar single sign-on credentials) then the attacker immediately gains access to those services with the privileges of the user whose credentials were stolen,” said James Renken, a site reliability engineer at the Internet Security Research Group. Renken is one of two people credited with discovering a third FortiOS vulnerability—CVE-2019-5591—that Friday’s advisory said was also likely being exploited. “The attacker can then explore the network, pivot to trying to exploit various internal services, etc.”
. . .The FBI and CISA provided no details about the APT mentioned in the joint advisory. The advisory also hedges by saying that there is a “likelihood” the threat actors are actively exploiting the vulnerabilities.
Patching the vulnerabilities requires IT administrators to make configuration changes, and unless an organization is using a network with more than one VPN device, there will be downtime. While those barriers are often tough in environments that need VPNs to be available around the clock, the risk of being swept into a ransomware or espionage compromise is significantly greater.
-------------------------------------------------------------------------------------------------------------------------------
Cybersecurity

CISA, FBI warn of hacking threat against Fortinet product

 
alert (Rawpixel.com/Shutterstock.com) 

The Cybersecurity and Infrastructure Security Agency and the FBI on Friday issued a new advisory warning that an advanced persistent threat actor is using old vulnerabilities in enterprise software from Fortinet to gain access to government and industry networks.

"The APT actors may be using any or all of these CVEs to gain access to networks across multiple critical infrastructure sectors to gain access to key networks as pre-positioning for follow-on data exfiltration or data encryption attacks," according to the advisory

 
More
FBI: APTs Actively Exploiting Fortinet VPN Security Holes
Three security vulnerabilities in the Fortinet SSL VPN are being used to gain a foothold within networks before moving laterally and carrying out recon.fortinet vpn cyberattacks
The FBI and the Cybersecurity and Infrastructure Security Agency are warning that advanced persistent threat (APT) nation-state actors are actively exploiting known security vulnerabilities in the Fortinet FortiOS cybersecurity operating system, affecting the company’s SSL VPN products.

According to an alert issued Friday by the FBI and CISA, cyberattackers are scanning devices on ports 4443, 8443 and 10443, looking for unpatched Fortinet security implementations. Specifically, APTs are exploiting CVE-2018-13379, CVE-2019-5591 and CVE-2020-12812.

“It is likely that the APT actors are scanning for these vulnerabilities to gain access to multiple government, commercial and technology services networks,” according to the alert. “APT actors have historically exploited critical vulnerabilities to conduct distributed denial-of-service (DDoS) attacks, ransomware attacks, structured query language (SQL) injection attacks, spear-phishing campaigns, website defacements, and disinformation campaigns.”

The bugs are popular with cyberattackers in general, due to Fortinet’s widespread footprint, researchers noted.

“CVE-2018-13379 is a critical vulnerability in the Fortinet FortiOS SSL VPN that has been favored by cybercriminals since exploit details became public in August 2019,” Satnam Narang, staff research engineer at Tenable, said via email. “In fact, Tenable’s 2020 Threat Landscape Retrospective placed it in our Top 5 Vulnerabilities of 2020 because we see threat actors continue to leverage it in the wild, well over a year after it was first disclosed.”

The FBI and CISA didn’t specify which APTs are mounting the recent activity.

Initial Compromise & Recon

Once exploited, the attackers are moving laterally and carrying out reconnaissance on targets, according to officials.

“The APT actors may be using any or all of these CVEs to gain access to networks across multiple critical-infrastructure sectors to gain access to key networks as pre-positioning for follow-on data exfiltration or data encryption attacks,” the warning explained. “APT actors may use other CVEs or common exploitation techniques—such as spear-phishing—to gain access to critical infrastructure networks to pre-position for follow-on attacks.”

The joint cybersecurity advisory from the FBI and CISA follows last year’s flurry of advisories from U.S. agencies about APT groups using unpatched vulnerabilities to target federal agencies and commercial organizations. . .

More >

Behavioral Models of InfoSec: Prospect Theory | by Kelly Shortridge | Medium

 
More

Hackers Setup Fake Cyber Security Firm To Target Security Researchers

Google’s Threat Analysis Group (TAG), a Google security team specialized in hunting advanced persistent threat (APT) groups, on Wednesday shared that a North Korean government-backed campaign is targeting cybersecurity researchers with malware via social media.

For those unaware, in January 2021, TAG had disclosed a hacking campaign, targeting security researchers working on vulnerability research and development across different organizations. On March 17th, the same actors behind those attacks set up a new website for a fake company called “SecuriElite” as well as associated Twitter and LinkedIn accounts.

The new website claims that it is an “offensive security company located in Turkey that offers pentests, software security assessments and exploits”.

As per the experts, this website has a link to their PGP public key at the bottom of the page like the previous websites set up by the actor. The PGP key hosted on the attacker’s blog acted as the lure for unsuspecting researchers in January attacks to visit the site “where a browser exploit was waiting to be triggered”.

The attacker’s latest batch of social media profiles continues the trend of posing as fellow security researchers interested in exploitation and offensive security. In total, Google has identified eight Twitter accounts and seven LinkedIn profiles.

The threat actors used multiple platforms to communicate with potential targets, including Twitter, LinkedIn, Telegram, Discord, Keybase and email to communicate with the researchers and build trust, only to deploy a Windows backdoor through a trojanized Visual Studio Project.

Following the discovery, Google reported all identified social media profiles to the platforms to allow them to take appropriate action, after which all of them were suspended.

The accounts seemed to be owned by vulnerability researchers and human resources personnel at various security firms including Trend Macro (a fake name inspired by Trend Micro), while some posed as the Chief Executive Officer and employees at the fictitious Turkish company.

Currently, the new attacker website is not serving any malicious content to deliver malware; however, Google has added the website’s URL to Google Safebrowsing as a precaution to prevent accidental visits by the users.

Following TAG’s disclosure in January 2021, security researchers from South Korean cybersecurity firm ENKI successfully identified these actors using an Internet Explorer 0-day. Based on their activity, TAG researchers believe that these actors are dangerous and likely have more 0-days.

“We encourage anyone who discovers a Chrome vulnerability to report that activity through the Chrome Vulnerabilities Rewards Program submission process,” concluded Adam Weidemann from TAG in the blog post.

More 
----------------------------------------------------------------------------------
AZURE NETWORK 
What's new: Azure Sentinel User and Entity Behavior Analytics in Public  Preview! - Microsoft Tech Community
 

Saturday, April 03, 2021

HINDSIGHT 2020 IS EVERYTHING: Q1 January-March 2021 Economic Reporter Newsletter

Here is the image used - don't know how far the city's Econ Dev office wants to look back but from all appearances (as you can tell by the name Mesa Bank on the 12-story building and other clues like no station platform for light rail service) - it was quite some time ago before this yearcity of Mesa -place near intro to quick jab
Opening Remarks THE QUICK JAB
Bill Jabjiniak, Economic Development Director

First Quarter 2021

 

 

2021 Oscar-Nominated Short: "Yes-People" | The Screening Room | The New ...

Why I Made... Murder Among The Mormons | The Story Behind The Documentary

Sun and Mega-Droughts, Disaster Review, Veil Nebula | S0 News Apr.3.2021

BEA News: Gross Domestic Product by State and Personal Income by State, 3rd Quarter 2025

  BEA News: Gross Domestic Product by State and Personal Income by S...