Anonymous ID: ea08d7 Feb. 5, 2025, 2:51 p.m. No.22518010   🗄️.is 🔗kun   >>8242 >>8265 >>8342 >>8504 >>8747 >>8857 >>8880

>>22517867 (LB)

Trump not committing to putting US troops on the ground in Gaza, White House says

White House press secretary Karoline Leavitt said Trump has not committed to sending U.S. troops to Gaza

 

White House press secretary Karoline Leavitt said that President Donald Trump isn’t committing to deploying U.S. troops to Gaza after suggesting on Tuesday that the U.S. would "take over" the Gaza Strip.

 

"It's been made very clear to the president that the United States needs to be involved in this rebuilding effort, to ensure stability in the region for all people," Leavitt told reporters Wednesday at a White House press briefing. "But that does not mean boots on the ground in Gaza. It does not mean American taxpayers will be funding this effort. It means Donald Trump, who is the best dealmaker on the planet, is going to strike a deal with our partners in the region."

 

Leavitt said that Trump is an "outside-of-the-box thinker" who is "a visionary leader who solves problems that many others, especially in this city, claim are unsolvable."

 

Trump announced Tuesday that the U.S. would "take over" the Gaza Strip in a "long-term ownership position" to deliver stability to the region.

 

"The U.S. will take over the Gaza Strip, and we will do a job with it, too," Trump said Tuesday evening in a joint press conference with Israeli Prime Minister Benjamin Netanyahu. "We'll own it and be responsible for dismantling all of the dangerous, unexploded bombs and other weapons on the site."

 

"Level the site and get rid of the destroyed buildings, level it out, create an economic development that will supply unlimited numbers of jobs and housing for the people of the area," he said. "Do a real job. Do something different. Just can't go back. If you go back, it's going to end up the same way it has for 100 years."

 

Trump said that "all" Palestinians would be removed from Gaza under his plan. But Leavitt described their removal as "temporary" during the rebuilding process and said that Trump and his team were sorting out specific details with allies in the region regarding next steps.

 

"Again, it’s a demolition site right now," she said. "It’s not a livable place for any human being. And I think it’s actually quite evil to suggest that people should live in such dire conditions."

Moar…

 

https://www.foxnews.com/politics/white-house-trump-not-committing-putting-us-troops-gaza

Anonymous ID: ea08d7 Feb. 5, 2025, 3:19 p.m. No.22518212   🗄️.is 🔗kun   >>8256

>>22518198

 

Summary

 

Over the past 40 years, our world has become increasingly connected. These connections have enabled major advances in national security from pervasive real-time intelligence and communications to optimal logistics.

 

With this connectivity has come the threat of cyber attacks on both military systems and critical infrastructure. While we focus the vast majority of our security efforts on protecting computers and networks, more than 80 percent of cyber attacks and over 70 percent of those from nation states are initiated by exploiting humans rather than computer or network security flaws.

 

To build secure cyber systems, it is necessary to protect not only the computers and networks that make up these systems but their human users as well.

 

We call attacks on humans “social engineering” because they manipulate or “engineer” users into performing desired actions or divulging sensitive information. The most general social engineering attacks simply attempt to get unsuspecting internet users to click on malicious links.

 

More focused attacks attempt to elicit sensitive information, such as passwords or private information from organizations or steal things of value from particular individuals by earning unwarranted trust.

 

These attacks always have an “ask,” a desired behavior that the attacker wants to induce from the victim. To do this, they need trust from the victim, which is typically earned through interaction or co-opted via a spoofed or stolen identity. Depending on the level of sophistication, these attacks will go after individuals, organizations, or wide swathes of the population.

 

Social engineering attacks work because it is difficult for users to verify each and every communication they receive. Moreover, verification requires a level of technical expertise that most users lack. To compound the problem, the number of users that have access to privileged information is often large, creating a commensurately large attack surface.

 

The Active Social Engineering Defense (ASED) program aims to develop the core technology to enable the capability to automatically identify, disrupt, and investigate social engineering attacks. If successful, the ASED technology will do this by actively detecting attacks, intervening in communications between users and potential attackers, and coordinating investigations into the source of the attacks.

 

https://www.darpa.mil/research/programs/active-social-engineering-defense