diff --git a/clusters/disarm-countermeasures.json b/clusters/disarm-countermeasures.json index 6f04af8..40271c7 100644 --- a/clusters/disarm-countermeasures.json +++ b/clusters/disarm-countermeasures.json @@ -2231,32 +2231,6 @@ "uuid": "b8b49628-4c3d-528c-90f1-2fee8722e2c5", "value": "Tool transparency and literacy for channels people follow." }, - { - "description": "Beware: content moderation misused becomes censorship.", - "meta": { - "external_id": "C00122", - "kill_chain": [ - "tactics:Deliver Content", - "responsetypes:Deny", - "metatechniques:Friction" - ], - "refs": [ - "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/counters/C00122.md" - ] - }, - "related": [ - { - "dest-uuid": "56b88516-ae4c-5176-b6ed-6e9be91ce898", - "type": "blocks" - }, - { - "dest-uuid": "667967b8-b3f1-55ad-8f8a-8c43c1290e6e", - "type": "affected-by" - } - ], - "uuid": "0b0f003a-4bb7-5f1e-8bc6-987c680cba39", - "value": "Content moderation" - }, { "description": "reduce the visibility of known botnets online.", "meta": { diff --git a/clusters/disarm-detections.json b/clusters/disarm-detections.json index 52e6fad..2cf9957 100644 --- a/clusters/disarm-detections.json +++ b/clusters/disarm-detections.json @@ -1936,31 +1936,6 @@ "uuid": "76efcfa4-6214-58b7-8557-60b77f36ef63", "value": "Model for bot account behaviour" }, - { - "description": "All techniques benefit from careful analysis and monitoring of activities on social network.", - "meta": { - "external_id": "F00078", - "kill_chain": [ - "tactics:Establish Social Assets", - "responsetypes:Detect" - ], - "refs": [ - "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/detections/F00078.md" - ] - }, - "related": [ - { - "dest-uuid": "97ff79d9-55d2-550a-8a10-459cad7822fb", - "type": "detects" - }, - { - "dest-uuid": "bd7a51b3-d00c-575f-a16e-6f51e5a67743", - "type": "detected-by" - } - ], - "uuid": "2032a145-fc97-52f2-9f3a-15badd5df9da", - "value": "Monitor account level activity in social networks" - }, { "description": "", "meta": { diff --git a/clusters/disarm-techniques.json b/clusters/disarm-techniques.json index 3b943e0..d20d0c3 100644 --- a/clusters/disarm-techniques.json +++ b/clusters/disarm-techniques.json @@ -3213,21 +3213,6 @@ "uuid": "9c655aa6-1474-5ab9-8eff-519df00fe41b", "value": "Social Media" }, - { - "description": "Examples include TV, Radio, Newspaper, billboards", - "meta": { - "external_id": "T0114.002", - "kill_chain": [ - "tactics:Deliver Content" - ], - "refs": [ - "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0114.002.md" - ] - }, - "related": [], - "uuid": "29640d07-bfc9-5d0a-a7ac-34dbd8141410", - "value": "Traditional Media" - }, { "description": "Delivering content by posting via owned media (assets that the operator controls).", "meta": { @@ -3843,21 +3828,6 @@ "uuid": "7c57a7c5-28eb-550d-bdf5-12be2396acb7", "value": "Conceal Operational Activity" }, - { - "description": "Concealing network identity aims to hide the existence an influence operation’s network completely. Unlike concealing sponsorship, concealing network identity denies the existence of any sort of organisation.", - "meta": { - "external_id": "T0129.001", - "kill_chain": [ - "tactics:Persist in the Information Environment" - ], - "refs": [ - "https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0129.001.md" - ] - }, - "related": [], - "uuid": "dab70ef3-f926-5288-b165-384fad15336d", - "value": "Conceal Network Identity" - }, { "description": "An influence operation may mix its own operation content with legitimate news or external unrelated content to disguise operational objectives, narratives, or existence. For example, an operation may generate \"lifestyle\" or \"cuisine\" content alongside regular operation content.", "meta": {