THE W.C. DISPATCH

THE W.C. DISPATCH

Share this post

THE W.C. DISPATCH
THE W.C. DISPATCH
The DISARM Files #1
Copy link
Facebook
Email
Notes
More
User's avatar
Discover more from THE W.C. DISPATCH
Don't Just Understand the Narrative. Break it.
Over 2,000 subscribers
Already have an account? Sign in

The DISARM Files #1

Unveiling a Covert Information Warfare Strategy

Walter Curt's avatar
Walter Curt
Dec 10, 2023
7

Share this post

THE W.C. DISPATCH
THE W.C. DISPATCH
The DISARM Files #1
Copy link
Facebook
Email
Notes
More
1
2
Share

The DISARM Revelation: Unmasking a Hidden War on Information

December 9th, 2023: By, Walter Curt

After the CTIL Files' explosive release by Schellenberger and Matt Taibbi, a widespread investigative effort was ignited among internet researchers. Key players in this endeavor included America Mission, The W.C. Dispatch, and TrashDiscourse, all diving deep into the layers of an extensive censorship regime. This collaborative effort, bolstered by the expertise of cybersecurity authorities like Nate Cain and numerous Open-Source Intelligence (OSI) specialists, transformed the CTIL files into a cornerstone for extensive research. This collective venture, involving over a dozen diverse research groups, has laid the groundwork for this comprehensive series of articles, shedding light on the intricate mechanisms of information control and censorship.

Before we delve into the intricacies of the DISARM Framework, it's crucial to address some fundamental questions. Primarily, what exactly is DISARM, and who are the key players behind it? To uncover these details, we turned to DISARM's own documents, seeking clarity directly from the source:

“Q1: What is the DISARM Foundation and its purpose?

The DISARM Foundation is a non-partisan, non-profit organization, incorporated in the US and also working across Europe. Its purpose is to develop a small team to maintain and enhance the DISARM Framework on behalf of its users.

Q2: What is the purpose of the DISARM Framework?

The purpose of the DISARM Framework is to provide a ‘common language’ for the many people around the world working to mitigate the harms caused by disinformation, by enabling them to track, describe, and share their analyses using the common language.

Q3: Who funds DISARM?

The DISARM Framework has been developed largely by volunteers, since it first began its life as the AMITT 1 Framework in 2019. Our first financial support came from the Alfred Landecker Foundation in Europe in 2022. We continue to operate with very limited resources, whilst looking for further financial support to ensure our sustainability. We receive no financial support from governments.”

Key figures in the DISARM group, notably including SJ Terp and Pablo Breuer, are also prominent in the CTIL files. A cursory examination reveals striking similarities between the DISARM and CTIL initiatives, particularly their reliance on volunteer efforts and ‘lack’ of substantial funding.

What distinctly sets the DISARM files apart from the CTIL files is the evolution and detail of the framework they reference. The AMITT Blue Countermeasures Framework, mentioned in these documents, is an earlier iteration of what has now developed into the current DISARM Framework.

These DISARM Files unveil a comprehensive and startling strategy of information warfare, seemingly developed and potentially implemented by the US government. Termed the DISARM framework, the documents detail a range of both offensive and defensive tactics, all aimed at controlling and manipulating the information space. The prospect of employing such strategies domestically against American citizens raises grave concerns, touching upon the very essence of civil liberties and potential constitutional violations.

→The Framework

The most consequential aspect of this release is the revelation that the AMITT Blue Countermeasures, initially detailed in the CTIL file release, have undergone significant expansion. This expansion notably enhances the offensive capabilities of the censorship apparatus. Below are the most notable enhancements, each accompanied by a summary of the action intended for offensive use:

C00172:
Social Media Source Removal
:

  • Metatechnique: M005

  • Summary: Removing accounts, pages, groups, e.g. Facebook page removal.

C00052:
Infiltrate Platforms
:

  • Metatechnique: M013

  • Summary: Detect and degrade

C00067:
Denigrate the Recipient/ Project of Online Funding
:

  • Metatechnique: M013

  • Summary: Reduce the credibility of groups behind misinformation-linked funding campaigns.

C00189:
Ensure That Platforms are Taking Down Flagged Accounts
:

  • Metatechnique: M003

  • Summary: Use ongoing analysis/monitoring of "flagged" profiles. Confirm whether platforms are actively removing flagged accounts and raise pressure via e.g. government organizations to encourage removal.

C00160:
Find and Train Influencers
:

  • Metatechnique: M001

  • Summary: Identify key influencers (e.g. use network analysis), then reach out to identified users and offer support, through either training or resources.

C00197:
Remove Suspicious Accounts
:

  • Metatechnique: M005

  • Summary: Standard reporting for false profiles (identity issues). Includes detecting hijacked accounts and reallocating them - if possible, back to original owners.

C00058:
Report Crowdfunder as Violator
:

  • Metatechnique: M005

  • Summary: counters crowdfunding. Includes ‘Expose online funding as fake”.

C00034:
Create More Friction at Account Creation
:

  • Metatechnique: M004

  • Summary: Counters fake account

C00044:
Keep People from Posting to Social Media Immediately
:

  • Metatechnique: M004

  • Summary: Platforms can introduce friction to slow down activities, force a small delay between posts, or replies to posts.

C00042:
Address Truth Contained in Narratives
:

  • Metatechnique: M010

  • Summary: Focus on and boost truths in misinformation narratives, removing misinformation from them.

C00046:
Marginalize and Discredit Extremist Groups
:

  • Metatechnique: M013

  • Summary: Reduce the credibility of extremist groups posting misinformation.

C00077:
Active Defense: Run TA15 "develop people” - Not Recommended
:

  • Metatechnique: M013

  • Summary: Develop networks of communities and influencers around counter-misinformation. Match them to misinformation creators.

In our investigation, we discovered that the DISARM framework is not merely a set of guidelines, but an automated system already employed by Special Operations and intelligence agencies, as revealed by internal military documents from a confidential source. This system's sophistication enables advanced tactics like social media source removal and platform infiltration with minimal human intervention.

The DISARM system, detailed in SOCOM internal documents, merges offensive (red team) and defensive (blue team) strategies in information warfare, ensuring a comprehensive approach to operations. This integration is bolstered by its ability to automate threat intelligence processing using the STIX/TAXII framework, rapidly analyzing and sharing data across platforms in real-time. Additionally, DISARM enables high-level threat information sharing across organizations with access to top-secret TS/SCI levels. This development highlights the framework's advanced operational system and raises serious concerns about its impact on public discourse and individual rights due to its automated, far-reaching nature.

→Militarization of Information:

The DISARM framework's tactics not only threaten fundamental freedoms but also mirror military information and cyber operations, indicating a shift towards militaristic information control within the United States. This blurring of lines between international warfare tactics and domestic information governance represents a significant departure from traditional approaches, requiring urgent scrutiny and public debate to protect democratic values and civil liberties.

These military influences within the DISARM framework are evident in various aspects:

  • Its structure and phrasing, such as "find, fix, finish," mirror methodologies used in special operations targeting.

  • Tactics are divided into offensive ("red team") and defensive ("blue team") operations, reflecting military exercises.

  • References to use by military commands and high classification levels indicate its application in classified military contexts.

  • The detailed tactics and emphasis on scaling up indicator sharing are reminiscent of military "playbooks" against adversary tactics, techniques, and procedures (TTPs).

  • Military planning language, including terms like "kill chains," is adapted for information and cyber warfare missions.

  • The overall framework and coordination level between agencies and allies suggest a model similar to how the military conducts joint information and influence activities in foreign strategic operations.

The DISARM framework seemingly repurposes military information warfare strategies, typically used in foreign contexts, for domestic application. This adaptation blurs the line between international combat tactics and domestic information control, raising serious concerns about their use within the United States. Such a shift could significantly impact democratic values, governmental transparency, and public trust, presenting deeply troubling implications.

In light of these revelations, America Mission is only beginning its investigation into the DISARM framework. We will expose the operational use of these strategies against U.S. citizens, revealing just a fraction of the extensive tactics and methods involved. Through ongoing research and public discussion, we seek to address the challenges these findings pose to our constitutional rights.

Kimsays's avatar
Patrick Rafferty's avatar
Jeremy Price's avatar
Arthur P Wolinsky's avatar
7 Likes∙
2 Restacks
7

Share this post

THE W.C. DISPATCH
THE W.C. DISPATCH
The DISARM Files #1
Copy link
Facebook
Email
Notes
More
1
2
Share

Discussion about this post

User's avatar
Arthur P Wolinsky's avatar
Arthur P Wolinsky
Dec 11, 2023

Important work!

Expand full comment
Like
Reply
Share
The Death of the Deep State: Crossfire Hurricane Documents Released
A Timeline of Key Events (2016–2019) – Media Reports vs. FBI Actions
Apr 11 • 
Walter Curt
58

Share this post

THE W.C. DISPATCH
THE W.C. DISPATCH
The Death of the Deep State: Crossfire Hurricane Documents Released
Copy link
Facebook
Email
Notes
More
6
How Are They Paying For It?
Over 400,000 Illegal Immigrants Attend Colleges in the United States, but where does the money come from?
Mar 21 • 
Walter Curt
10

Share this post

THE W.C. DISPATCH
THE W.C. DISPATCH
How Are They Paying For It?
Copy link
Facebook
Email
Notes
More
1
The Trump Feint Doctrine
Why the world’s greatest negotiator always looks reckless—until the board flips and the United States wins.
Apr 23 • 
Walter Curt
14

Share this post

THE W.C. DISPATCH
THE W.C. DISPATCH
The Trump Feint Doctrine
Copy link
Facebook
Email
Notes
More
3

Ready for more?

© 2025 WCDispatch LLC.
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More

Create your profile

User's avatar

Only paid subscribers can comment on this post

Already a paid subscriber? Sign in

Check your email

For your security, we need to re-authenticate you.

Click the link we sent to , or click here to sign in.