Saturday, May 01, 2021

Planning & Zoning Board PUBLIC HEARING Meeting Wednesday 04/28/2021

A huge agenda that was preceded by a Study Session no longer broadcast You can find the published meeting details and the Approved Minutes in the link farther down . . .

MAIN ITEM OF INTEREST: A transit-oriented development "Smart Growth Community Plan" that is opposed by Tyler Montague. Interesting to note how certain PZ Board members chime in and join Montague in resisting for what their stated reasons are while we don't know their motivations . . .

File #: PZ 21052   
Type: PZ Zoning - Discuss and Recommend Status: Agenda Ready
In control: Planning and Zoning Board - Public Hearing
On agenda: 4/28/2021
Title:

ZON19-00832 District 3. Within the 1800 block of West Main Street (north side) and within the 100 block of North Dobson Road (east side) and within the 0 to 200 blocks of North Sycamore (west side). Located east of Dobson Road and north of Main Street. (21± acres).

Modification to the Sycamore Station Smart Growth Community Plan.

This request will allow for a mixed-use transit-oriented development.

Neil Calfee, Miravista Holdings, LLC, applicant

Dobson Station, LLC; City of Mesa; Pride Ventures, LLC, owners.

(Continued from April 28, 2021) Planner: Cassidy Welch Staff Recommendation: Approval with conditions

Attachments:

1. Vicinity Map,

2. Narrative,

3. Original Smart Growth Community Plan,

4. Redline Modified Smart Growth Community Plan,

5. Modified Smart Growth Community Plan,

6. Citizen Participation Plan,

7. Citizen Participation Report,

8. Presentation

-------------------------------------------------------------------------------------------------------------------------------

Attachments:
File #Agenda #TypeTitleActionResultAction Details
PZ 21048 2-aPZ MinutesMinutes from the April 14, 2021 study session and regular meeting.  Not available
PZ 21049 3-aPZ Zoning - ActionZON20-00782 District 4. Within the 1000 block of East University Drive (south side) and within the 300 block of North Miller Street (east side). Located west of Stapley Drive on the south side of University Drive. (2.4± acres). Site Plan Review. The request will allow a multiple residence development. Kaelee Wilson, Berry Riddell LLC, applicant; Stalwart Acquisitions, LLC, owner. Planner: Kellie Rorex Staff Recommendation: Approval with conditions  Not available
PZ 21050 3-bPZ Zoning - ActionZON20-00820 District 4. Within the 1500 block of East Main Street (north side) and within the 0 to 100 block of North Hunt Drive (west side). Located east of Stapley Drive on the north side of Main Street. (.8± acres). Site Plan Review. This request will allow for the redevelopment of a restaurant. Justin Pasternak, applicant; Casa Ramos, Inc., owner. Planner: Charlotte Bridges Staff Recommendation: Approval with conditions  Not available
PZ 21051 3-cPZ Zoning - ActionZON21-00133 District 6. Within the 8100 block of East Ray Road (south side). Located west of Hawes Road on the south side of Ray Road. (18.1± acres). Site Plan Review; and Special Use Permit. This request will allow for the development of an industrial building. Eric Zitny, Ware Malcomb, applicant; Marwest Enterprises, LLC, owner. Planner: Cassidy Welch Staff Recommendation: Approval with conditions  Not available
PZ 21052 4-aPZ Zoning - Discuss and RecommendZON19-00832 District 3. Within the 1800 block of West Main Street (north side) and within the 100 block of North Dobson Road (east side) and within the 0 to 200 blocks of North Sycamore (west side). Located east of Dobson Road and north of Main Street. (21± acres). Modification to the Sycamore Station Smart Growth Community Plan. This request will allow for a mixed-use transit-oriented development. Neil Calfee, Miravista Holdings, LLC, applicant; Dobson Station, LLC; City of Mesa; Pride Ventures, LLC, owners. (Continued from April 28, 2021) Planner: Cassidy Welch Staff Recommendation: Approval with conditions  Not available
PZ 21053 4-bPZ Zoning - Discuss and RecommendZON20-00786 District 6. Within the 9700 block of East Southern Avenue (south side). Located west of Crismon Road on the south side of Southern Avenue. (8.1± acres). Rezone from Planned Employment Park (PEP) to Multiple Residence 5 (RM-5) with a Planned Area development Overlay (PAD); and Site Plan Review.. This request will allow for a multiple residence development. Sean Lake, Pew and Lake, PLC, applicant; Sunny Acres/Montgomery 320 LLC, owner. (Continued from April 14, 2021) Planner: Cassidy Welch Staff Recommendation: Approval with conditions  Not available
PZ 21054 4-cPZ Zoning - Discuss and RecommendZON20-00872 District 6. Within the 3800 to 4000 blocks of South Power Road (east side). Located south of Elliot Road on the east side of Power Road. (overall 41.85± acres). Modification to an approved Planned Area Development Overlay (PAD) on a 41.85± acre property; rezone 10.8± acres of the 41.85± acre property from General Industrial (GI) PAD to Light Industrial (LI) PAD; and Site Plan Review on 39.5± acres of the 41.85± acre property. Jack Gilmore, Gilmore Planning and Landscape Architecture, applicant; Power Lender Partners LLC & Rockall Power LLC, owner. (Companion case to Preliminary Plat “Power 42”, associated with item *5-a). Planner: Wahid Alam Staff Recommendation: Approval with conditions  Not available
PZ 21055 4-dPZ Zoning - Discuss and RecommendZON21-00050 District 6. Within the 1800 to 2000 blocks of South Sossaman Road (west side). Located north of Baseline Road on the west side of Sossaman Road. (1.2± acres) Rezone from Single Residence 6 with a Planned Area Development overlay (RS-6-PAD), Office Commercial (OC), and Neighborhood Commercial (NC) to Multiple Residence 4 with a Planned Area Development (RM-4-PAD); and Site Plan Review. This request will allow for the development of a multiple residence development. Brian Sandstrom, ARCHISTRUCT, applicant; Superstition & Sossaman Road and Sossaman & Baseline Rd LTD Partnership, owners. (Companion case to Preliminary Plat “Sossaman Heights”, associated with item *5-b). Planner: Cassidy Welch Staff Recommendation: Approval with conditions  Not available
PZ 21056 4-ePZ Zoning - Discuss and RecommendZON21-00089 District 1. Within the 2600 to 2800 blocks of East Lehi Road (west side). Located north of McDowell Road and east of the 202 Red Mountain Freeway. (41.8± acres). Rezone from Single Residence 43 (RS-43) to Single Residence 15 (RS-15) with a Planned Area Development Overlay (PAD). This request will allow the development of a single-residence subdivision. Sean Lake, Pew and Lake, PLC, applicant; Cemex USA Construction Materials, Inc., owner. (Companion case to Preliminary Plat “The Grove at Lehi”, associated with item *5-c). Planner: Evan Balmer Staff Recommendation: Approval with conditions  Not available
PZ 21057 4-fPZ Zoning - Discuss and RecommendZON21-00191 District 1. Within the 2200 block of North Center Street (west side). Located north of McKellips Road and east of Country Club Drive. (24.42± acres) Rezone from Agricultural (AG) and Light Industrial (LI) to Public/Semi Public (PS). This request will allow for development of a public facility. Valerie Ahyong - Engineering Department, City of Mesa, applicant; City of Mesa, owner. Planner: Chloe Durfee-Sherman Staff Recommendation: Approval with conditions  Not available
PZ 21058 5-aPZ Preliminary Plat“Power 42” District 6. Within the 3800 to 4000 blocks of South Power Road (east side). Located south of Elliot Road on the east side of Power Road. (overall 41.85± acres). Preliminary Plat. Jack Gilmore, Gilmore Planning and Landscape Architecture, applicant; Power Lender Partners LLC & Rockall Power LLC, owner. (Companion case to ZON20-00872 associated with item *4-c) Planner: Wahid Alam Staff Recommendation: Approval with conditions  Not available
PZ 21059 5-bPZ Preliminary Plat“Sossaman Heights” District 6. Within the 1800 to 2000 blocks of South Sossaman Road (west side). Located north of Baseline Road on the west side of Sossaman Road. (1.2± acres) Preliminary Plat. Brian Sandstrom, ARCHISTRUCT, applicant; Superstition & Sossaman Road and Sossaman & Baseline Rd LTD Partnership, owners. (Companion case to ZON21-00050, associated with item *4-d). Planner: Cassidy Welch Staff Recommendation: Approval with conditions  Not available
PZ 21060 5-cPZ Preliminary Plat“The Grove at Lehi”, District 1. Within the 2600 to 2800 blocks of East Lehi Road (west side). Located north of McDowell Road and east of the 202 Red Mountain Freeway. (41.8± acres) Preliminary Plat. Sean Lake, Pew and Lake, PLC, applicant; Cemex USA Construction Materials, Inc., owner. (Companion case to ZON21-00089, associated with item *4-e). Planner: Evan Balmer Staff Recommendation: Approval with conditions  Not available

-------------------------------------------------------------------------------------------------------------------------------

https://mesa.legistar.com/Calendar.aspx

 

STREAMING FROM THE LOWER CHAMBERS > Mesa City Council Study Session Thu 07:30 am 04.29.2021


The stage is set. The script is ready. "The Brady Bunch" cast of characters are all in their places.

2 days later about 40 views

All Ready > Here's the show

 

 

Ice Cycle, Recurring Nova, Solar Wind Incoming | S0 News May.1.2021

Star-Planet Energy, Master the Disaster | S0 News Apr.30.2021

Billy Ocean - When the Going Gets Tough, the Tough Get Going (Official)

3rd Zero-Day Cyber Attack > Pulse Secure Connect Integrity Tools Breach /Advanced Persistent Threats

 
Whoa! A sign things are getting worse. The intrusions just keep coming - here's part of the global attacks from Jason Miller,
Pulse Secure Critical Zero-Day Security Bug Under Active Exploit |  Threatpost
"When the Cybersecurity and Infrastructure Security Agency released its third emergency cyber directive in the last five months, agencies were once again on notice to fix yet another critical vulnerability.
Last week’s directive detailed a potential major problem with the virtual private network software from Pulse Secure. CISA gave agencies until April 23 to identify all instances of the software and run the Pulse Connect Secure Integrity Tool. Along with this latest directive, CISA told agencies to patch Microsoft Exchange servers in March and another one for the SolarWinds vulnerability in December.
This type of fire drill is becoming far too common for agencies, and really every business, as the cyber threats seem to be ramping up, particularly against companies with global install bases. . .
“DHS is more effective in recognizing and sharing what the vulnerabilities are and how to fix them. But currently their only course of action right now is the ‘hair on fire’ approach where they push out this directive and rank it high because they don’t know how vulnerable agencies are so they just have to push out because it’s severe and everyone is in this worse-case scenario,”  [John Barnhart]
Cybersecurity and Infrastructure Security Agency в Twitter: "Organizations  using Ivanti Pulse Connect Secure appliances are encouraged to run the  Ivanti Integrity Checker Tool, update to the latest software version, and  investigate for
The problem is not just for the U.S. government but across the entire Internet
 

Pulse Secure VPN zero-day used to hack defense firms, govt orgs

Pulse Secure has shared mitigation measures for a zero-day authentication bypass vulnerability in the Pulse Connect Secure (PCS) SSL VPN appliance actively exploited in attacks against worldwide organizations and focused on US Defense Industrial base (DIB) networks.

To mitigate the vulnerability tracked as CVE-2021-22893 (with a maximum 10/10 severity score), Pulse Secure advises customers with gateways running PCS 9.0R3 and higher to upgrade the server software to the 9.1R.11.4 release.

As a workaround, the vulnerability can be mitigated on some gateways by disabling Windows File Share Browser and Pulse Secure Collaboration features using instructions available in the security advisory published earlier today.

Pulse Secure also released the Pulse Connect Secure Integrity Tool to help customers determine if their systems are impacted. Security updates to solve this issue will be released in early May.

 

Pulse Secure VPN zero-day used to hack defense firms, govt orgs

------------------------------------------------------------------------------------------------------------------------------

More

More US agencies potentially hacked, this time with Pulse Secure exploits

Zeroday vulnerability under attack has a severity rating of 10 out of 10.

At least five US federal agencies may have experienced cyberattacks that targeted recently discovered security flaws that give hackers free rein over vulnerable networks, the US Cybersecurity and Infrastructure Security Agency said on Friday.

The vulnerabilities in Pulse Connect Secure, a VPN that employees use to remotely connect to large networks, include one that hackers had been actively exploiting before it was known to Ivanti, the maker of the product. The flaw, which Ivanti disclosed last week, carries a severity rating of 10 out of a possible 10. The authentication bypass vulnerability allows untrusted users to remotely execute malicious code on Pulse Secure hardware, and from there, to gain control of other parts of the network where it's installed. . .

Federal agencies, critical infrastructure, and more

Security firm FireEye said in a report published on the same day as the Ivanti disclosure that hackers linked to China spent months exploiting the critical vulnerability to spy on US defense contractors and financial institutions around the world. Ivanti confirmed in a separate post that the zeroday vulnerability, tracked as CVE-2021-22893, was under active exploit.Advice on Pulse Connect Secure RCE Vulnerability - NCSC.GOV.UK

CISA said it’s aware of compromises of federal agencies, critical infrastructure entities, and private sector organizations dating back to June 2020.

They just keep coming

The targeting of the five agencies is the latest in a string of large-scale cyberattacks to hit sensitive government and business organizations in recent months. In December, researchers uncovered an operation that infected the software build and distribution system of network management tools maker SolarWinds. The hackers used their control to push backdoored updates to about 18,000 customers. Nine government agencies and fewer than 100 private organizations—including Microsoft, antivirus maker Malwarebytes, and Mimecast—received follow-on attacks. In March, hackers exploiting newly discovered vulnerability in Microsoft Exchange compromised an estimated 30,000 Exchange servers in the US and as many as 100,000 worldwide. Microsoft said that Hafnium, its name for a group operating in China, was behind the attacks. In the days that followed, hackers not affiliated by Hafnium began infecting the already-compromised servers to install a new strain of ransomware. Two other serious breaches have also occurred, one against the maker of the Codecov software developer tool and the other against the seller of Passwordstate, a password manager used by large organizations to store credentials for firewalls, VPNs, and other network-connected devices. Both breaches are serious, because the hackers can use them to compromise the large number of customers of the companies' products. . .

The Pulse team took swift action to provide mitigations directly to the limited number of impacted customers that remediates the risk to their system, and we plan to issue a software update within the next few days,” a spokesperson added."

--------------------------------------------------------------------------------------------------------------------------------
More

Five U.S. Agencies May Have Been Hacked Through Ivanti Flaws

The U.S. Department of Homeland Security has determined that flaws in Ivanti Inc.’s products may have allowed hackers to breach at least five federal agencies.

A Different Type of Federal Agency: How DHS's Newest Cybersecurity Agency  Can Help Your Business | Password Protected

The Department’s Cybersecurity and Infrastructure Security Agency, known as CISA, has been working with organizations targeted through vulnerabilities in Ivanti’s Pulse Connect Secure products and required federal civilian agencies to run a tool designed to find them.

“CISA is aware of at least five federal civilian agencies who have run the Pulse Connect Secure Integrity Tool and identified indications of potential unauthorized access,” Matt Hartman, a deputy executive assistant director at CISA, said Thursday in a statement. “We are working with each agency to validate whether an intrusion has occurred and will offer incident response support accordingly.”

Hartman didn’t identify the agencies. Reuters previously reported the suspected breaches in federal agencies. . .

> The U.S. hasn’t attributed the cyber-activity to a specific hacking group. However, the cybersecurity firm FireEye Inc. recently found that hackers -- suspected to be based in China -- were using Pulse Secure virtual private networks to hack into dozens of organizations for apparent espionage purposes, according to Charles Carmakal, a senior vice president and chief technology officer at FireEye, who spoke to Bloomberg News in an interview last week.

> The Chinese Embassy in Washington didn’t immediately respond to a request for comment.

> Organizations targeted by the hackers through Pulse Secure flaws spanned financial services, government and defense contracting in the U.S. and Europe, Carmakal said. Since then, analysts at FireEye have observed additional victims including transportation, energy, professional services and telecommunications organizations.

“This is a pretty big deal from a national security perspective,” Carmakal said in the interview. He said there has been a significant spike in China-linked hacking in the U.S. this year, including widespread attacks that leveraged flaws in Microsoft Corp.’s Exchange software for email.

— With assistance by William Turton

Friday, April 30, 2021

iCOP Report: (COVERT OPERATIONS PROGRAM) No Stamp of Approval For Social Media Surveillance by U.S. Postal Services

Quick. Think of a single good reason why they should be monitoring or spying on social media outlets. Maybe that good-for-everything cover "Situational Awareness". US Postal Service Running “Covert Operations Program” to Spy on Americans' Social  Media Posts, Share With Agencies | LaptrinhX / News
The two-pager points out that the most worrying stuff inspectors came across emanated from Parler. But even at its most concerning, the iCOP effort came up with nothing but some wasted tax dollars and a few incursions into inalienable rights territory.
“No intelligence is available to suggest the legitimacy of these threats,” it adds.
------------------------------------------------------------------------------------------------------------------------------
More from Techdirt + Related Content
Thu, Apr 29th 2021 10:44amTim Cushing
The United States Postal Service is still in the spying business. The USPS has been scanning pretty much every piece of mail that runs through its system, creating a massive database of metadata that serves whatever purpose the USPS imagines it does.
Outcry over US Postal Service reportedly tracking social media posts | US  Postal Service | The Guardian
"National security" or whatever the fuck.

When not helping the DEA find cash and the occasional drug shipment, the USPS is also apparently keeping tabs on social media users. This includes social media services with smaller, but perhaps more concerning, user bases. The name of the game is still "national security," but it's unclear why the Postal Service -- which has a hard enough time divvying up its limited resources -- is engaged in this sort of surveillance.

A two-page report [PDF] from the USPS's "iCOP" (Internet Covert Operations Program) [again, why is this actually a thing?] -- first reported by Yahoo News -- details the internet sleuthery of US Postal Service Inspectors. . .

 

BEA News: Gross Domestic Product by State and Personal Income by State, 3rd Quarter 2025

  BEA News: Gross Domestic Product by State and Personal Income by S...