{"id":4465,"date":"2024-09-11T14:40:35","date_gmt":"2024-09-11T13:40:35","guid":{"rendered":"https:\/\/gifct.org\/?page_id=4465"},"modified":"2024-09-16T16:46:23","modified_gmt":"2024-09-16T15:46:23","slug":"resource-guide","status":"publish","type":"page","link":"https:\/\/gifct.org\/resource-guide\/","title":{"rendered":"GIFCT and Member Resources"},"content":{"rendered":"<p>[spb_row element_name=&#8221;Intro Row&#8221; wrap_type=&#8221;full-width-contained&#8221; row_bg_type=&#8221;color&#8221; color_row_height=&#8221;content-height&#8221; bg_type=&#8221;cover&#8221; parallax_image_height=&#8221;content-height&#8221; parallax_image_movement=&#8221;fixed&#8221; parallax_image_speed=&#8221;standard&#8221; bg_video_loop=&#8221;yes&#8221; parallax_video_height=&#8221;window-height&#8221; row_id=&#8221;row-intro&#8221; row_top_style=&#8221;none&#8221; row_bottom_style=&#8221;none&#8221; parallax_video_overlay=&#8221;none&#8221; row_overlay_opacity=&#8221;0&#8243; remove_element_spacing=&#8221;no&#8221; row_col_spacing=&#8221;0&#8243; row_col_pos=&#8221;default&#8221; row_col_equal_heights=&#8221;no&#8221; row_expanding=&#8221;no&#8221; row_animation=&#8221;none&#8221; row_animation_delay=&#8221;0&#8243; minimize_row=&#8221;yes&#8221; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2>Resources in this Guide<\/h2>\n<p>This guide to GIFCT and Member Resources discusses the different ways tech companies approach and fulfill <a href=\"https:\/\/gifct.org\/membership\/\" target=\"_blank\" rel=\"noopener\">GIFCT\u2019s membership criteria<\/a> and presents links to all relevant member company resources related to this criteria. This guide is <b>designed to support tech companies, civil society groups, governments, and academic researchers <\/b>interested in learning about GIFCT member company efforts to prevent terrorists and violent extremists from exploiting digital platforms. In addition to resources developed by members, this guide also highlights resources produced by GIFCT, and its partners where relevant, that have helped guide companies in furthering their commitment to the GIFCT membership criteria.<\/p>\n<div class=\"ac-extended-content\" style=\"display: none;\"><\/p>\n<p>GIFCT\u2019s membership criteria are intended to maintain the integrity of GIFCT while we work toward our mission, promote a culture of global multi-stakeholder collaboration, and emphasize the complementary and mutually reinforcing nature of combating terrorism and violent extremism while respecting human rights. The criteria are designed to be <b>meaningful and applicable for a diverse range of technology companies large and small<\/b>.<\/p>\n<p>Reflective of <a href=\"https:\/\/gifct.org\/membership\/\" target=\"_blank\" rel=\"noopener\">GIFCT\u2019s membership criteria<\/a>, this guide shares information on:<\/p>\n<ul>\n<li aria-level=\"1\"><b>Publicly available policies <\/b>where GIFCT members explicitly prohibit terrorist and\/or violent extremist activity.<\/li>\n<li aria-level=\"1\">Information on GIFCT members\u2019 ability to <b>receive, review, and act on reports of illicit activity<\/b> or activity violating their terms of service.<\/li>\n<li aria-level=\"1\">Efforts to <b>explore new technical solutions<\/b> to counter terrorist and violent extremist activity online.<\/li>\n<li aria-level=\"1\">GIFCT and member <b>transparency reports<\/b>.<\/li>\n<li aria-level=\"1\">GIFCT and member <b>commitments to respecting human rights<\/b>.<\/li>\n<li aria-level=\"1\"><b>Support of civil society organizations which challenge terrorism and violent extremism.<\/b> This includes, for example, links to counter-narrative programs,\u00a0 digital literacy resources, and other relevant tools which can help activists and NGOs scale and optimize their voices online to push back against terrorism and extremism,<\/li>\n<\/ul>\n<p>This information is presented in two sections. <a href=\"#row-comm\">Section 1<\/a> provides an overview of GIFCT and member company efforts to counter terrorism and violent extremism online, in line with GIFCT\u2019s membership criteria. <a href=\"#row-app-a\">Section 2<\/a> contains links to GIFCT resources (<a href=\"#row-app-a\">Appendix A<\/a>) and links to member company resources in alignment with GIFCT membership criteria (<a href=\"https:\/\/gifct.org\/appendix-b\/?\" target=\"_blank\" rel=\"noopener\">Appendix B<\/a>). These links can be filtered by company, company type, and criteria.<\/p>\n<p><\/div><div><a data-more-text=\"View More\" data-less-text=\"View Less\" class=\"ac-readmore margin-btm\" href=\"#\" style=\"display: table;\">View More<\/a><\/div>\n<p>[\/spb_text_block] [\/spb_row] [spb_row element_name=&#8221;Public Policy &#8211; Grey Bgd&#8221; wrap_type=&#8221;full-width-contained&#8221; row_bg_type=&#8221;color&#8221; row_bg_color=&#8221;#f0f0f0&#8243; color_row_height=&#8221;content-height&#8221; bg_type=&#8221;cover&#8221; parallax_image_height=&#8221;content-height&#8221; parallax_image_movement=&#8221;fixed&#8221; parallax_image_speed=&#8221;standard&#8221; bg_video_loop=&#8221;yes&#8221; parallax_video_height=&#8221;window-height&#8221; row_id=&#8221;row-comm&#8221; row_top_style=&#8221;none&#8221; row_bottom_style=&#8221;none&#8221; parallax_video_overlay=&#8221;none&#8221; row_overlay_opacity=&#8221;0&#8243; remove_element_spacing=&#8221;no&#8221; row_col_spacing=&#8221;0&#8243; row_col_pos=&#8221;default&#8221; row_col_equal_heights=&#8221;no&#8221; row_expanding=&#8221;no&#8221; row_animation=&#8221;none&#8221; row_animation_delay=&#8221;0&#8243; minimize_row=&#8221;yes&#8221; simplified_controls=&#8221;no&#8221; custom_css_percentage=&#8221;no&#8221; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;padding-top: 30px;&#8221; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h3>Section 1: GIFCT Member Efforts to Counter Terrorism and Violent Extremism Online and GIFCT Support<\/h3>\n<p>[\/spb_text_block] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2>Publicly Available Policies<\/h2>\n<p><i>This section provides an overview of GIFCT and member efforts in support of GIFCT\u2019s first membership criterion: <\/i><b><i>terms of service, community guidelines, or other publicly available policies that explicitly prohibit terrorist and\/or violent extremist activity.\u00a0<\/i><\/b><\/p>\n<p><i>Links to member company policies can be found in <a href=\"https:\/\/gifct.org\/appendix-b\/?category=Policies\" target=\"_blank\" rel=\"noopener\">Appendix B<\/a>, showing the diversity of ways in which member companies approach this criterion. <\/i><\/p>\n<div class=\"ac-extended-content\" style=\"display: none;\"><\/p>\n<p>Most digital platforms require users to agree to set Community Guidelines, Standards and\/or Terms of Service (ToS) before accessing that platform\u2019s tools and services. A criterion for GIFCT membership is that <b>members must explicitly prohibit terrorist and\/or violent extremist activity on their services.<\/b> This framing should exist in publicly available policies, such as their ToS or Community Guidelines. GIFCT does not provide exact language that must be used, respecting that platforms might have slightly different policy framing. However, GIFCT can and does provide guidance and support to companies developing this language.<\/p>\n<p>Policies often referred to as<b> Community Guidelines or Standards, <\/b>establish the set of <b>rules for what type of content or activity is prohibited<\/b> on a platform. In most cases, these policies clarify that violations can lead to content removal, account suspension, or other penalties.<\/p>\n<p><b>ToS<\/b> are used to <b>ensure that users understand their rights and responsibilities<\/b> when using a platform, and provide a clear framework for resolving disputes that may arise. Usually, ToS cover issues beyond the scope of Community Guidelines such as liability, privacy, and intellectual property, and are necessary to ensure that the platform operates in a fair and transparent manner. While some companies have both Community Guidelines and ToS, others may only have ToS. Some may have more extensive policies beyond Community Guidelines that users are required to follow.<\/p>\n<p>Most companies design, review, and update their ToS and guidelines based on feedback from a range of stakeholders that might include their users, government bodies, and global experts in fields such as technology, public safety, and human rights. Company policies and the methods that companies use to communicate those policies are diverse, reflecting the needs of each digital platform and their user audience. Some companies share policies in video format, creating supplemental policy explainers in plain language, or embedding a Code of Conduct within a game environment.<\/p>\n<h4><strong>Defining Terrorism and Violent Extremism<\/strong><\/h4>\n<p><b>There is no universally agreed legal, academic, or technical working definition of terrorism or violent extremism. While definitions of terrorism put forward by governments are debated, there are even fewer public working definitions of violent extremism by governments or international bodies, as seen in the <\/b><a href=\"https:\/\/def-frameworks.gifct.org\/global-definitions-of-terrorism\/\" target=\"_blank\" rel=\"noopener\"><b>Definitional Frameworks and Principles Map<\/b><\/a><b>. <\/b>A complex framework of UN Security Council resolutions outlines terrorism-related acts that should be criminalized, though states vary in their degree of <a href=\"https:\/\/www.un.org\/securitycouncil\/ctc\/content\/cted-analytical-brief-commentary-codification-terrorism-offence\" target=\"_blank\" rel=\"noopener\">domestication<\/a>. It should be noted that <a href=\"https:\/\/www.un.org\/ruleoflaw\/blog\/document\/security-council-resolution-1566-2004-on-threats-to-international-peace-and-security-caused-by-terrorist-acts\/\" target=\"_blank\" rel=\"noopener\">UN Security Council Resolution 1566 (2004)<\/a> makes some headway to gathering elements of a definition of terrorism in an internationally agreed framework.<\/p>\n<p>Most tech companies have independently\u00a0 developed definitions and approaches based on existing resources and in consideration of the specificities of their platforms. Tech companies may rely on guidance provided by national and international law and policies, including the <a href=\"https:\/\/www.un.org\/securitycouncil\/content\/un-sc-consolidated-list\" target=\"_blank\" rel=\"noopener\">UN Security Council\u2019s Consolidated Sanction\u2019s List<\/a>, as a reference for groups and individuals subject to international counterterrorism sanctions. GIFCT does not offer a prescriptive definition of terrorism or extremism but instead supports tech companies and the wider counterterrorism and counter extremism community in raising awareness of how other states or actors have defined terrorism\u00a0 through its <a href=\"https:\/\/def-frameworks.gifct.org\" target=\"_blank\" rel=\"noopener\"><b>Definitional Frameworks and Principles<\/b><\/a> Project.<b> GIFCT has also developed both list-based and behavior-based approaches to the inclusion criteria of the <\/b><a href=\"https:\/\/gifct.org\/hsdb\/\" target=\"_blank\" rel=\"noopener\"><b>Hash Sharing Database<\/b><\/a><b>.<\/b><\/p>\n<h4>GIFCT\u2019s Support<\/h4>\n<ul>\n<li aria-level=\"1\">GIFCT offers policy consultations for current and prospective member companies to develop, enhance, or refine publicly available policies explicitly prohibiting terrorism and\/or violent extremism. This can include support from GIFCT staff by directly working with policy teams, or connecting them to global experts through partners like GNET, depending on the needs of the company. Support is offered to current and prospective members regardless of organizational type, size, location, or maturity.<\/li>\n<li aria-level=\"1\">GIFCT also works with multi-stakeholder partners to produce resources for member companies. Understanding the difficulties tech companies can sometimes face in applying government definitions or designation lists, GIFCT has worked with its multi-stakeholder <a href=\"https:\/\/gifct.org\/working-groups-landing-page\/\" target=\"_blank\" rel=\"noopener\">Working Groups<\/a>, for example, to launch products to help guide companies such as:\n<ul>\n<li aria-level=\"2\">A <a href=\"https:\/\/def-frameworks.gifct.org\/\" target=\"_blank\" rel=\"noopener\">Definitional Frameworks and Principles<\/a> website comparing international government definitions of terrorism and violent extremism. This website contains:\n<ul>\n<li aria-level=\"3\"><a href=\"https:\/\/def-frameworks.gifct.org\/global-definitions-of-terrorism\/\" target=\"_blank\" rel=\"noopener\">Global Definitions of Terrorism<\/a>: a comparative and interactive map<\/li>\n<li aria-level=\"3\"><a href=\"https:\/\/def-frameworks.gifct.org\/behavioral-definitions-of-terrorism\/\" target=\"_blank\" rel=\"noopener\">Behavioral Definitions of Terrorism<\/a>: an interactive tool to compare behavioral definition elements used globally<\/li>\n<li aria-level=\"3\"><a href=\"https:\/\/def-frameworks.gifct.org\/risk-mitigation-supplement\/\" target=\"_blank\" rel=\"noopener\">Risk Mitigation in Applying Government Terrorist Designation Lists<\/a>: a supplement for consideration listing pros and cons of terrorist designation lists. This supplement also outlines some risk mitigation tactics for tech companies to consider while reviewing and potentially applying government terrorist designation lists.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li aria-level=\"2\">Videos to help tech companies and the wider counterterrorism and counter-extremism community in understanding, developing, and applying definitions of terrorism and violent extremism through animated explainers on:\n<ul>\n<li aria-level=\"3\"><a href=\"https:\/\/def-frameworks.gifct.org\/what-is-terrorism-from-strict-designations-to-dynamic-behavioural-factors-for-tech-platforms\/\" target=\"_blank\" rel=\"noopener\">What is Terrorism?<\/a> outlines the wide spectrum of definitions of terrorism and violent extremism across the globe and shares recommendations for tech platforms that utilize terrorism definitions in their policy creation.<\/li>\n<li aria-level=\"3\"><a href=\"https:\/\/def-frameworks.gifct.org\/the-community-impacts-of-legal-definitions-of-terrorism\/\" target=\"_blank\" rel=\"noopener\">The Impact of Legal Definitions of Terrorism<\/a> explores the ways in which designation lists have unintentionally caused the stigmatization of a particular religious community and overly impacted the Muslim community.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li aria-level=\"2\">An analysis on the <a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2022\/07\/GIFCT-22WG-LF-TVEC-1.1.pdf\" target=\"_blank\" rel=\"noopener\">Interoperability of Terrorism Definitions (2022).\u00a0<\/a><\/li>\n<\/ul>\n<p><\/div><div><a data-more-text=\"View More\" data-less-text=\"View Less\" class=\"ac-readmore margin-btm\" href=\"#\" style=\"display: table;\">View More<\/a><\/div>\n<p>[\/spb_text_block] [\/spb_row] [spb_row element_name=&#8221;Safety Row &#8211; White Bgd&#8221; wrap_type=&#8221;full-width-contained&#8221; row_bg_type=&#8221;color&#8221; color_row_height=&#8221;content-height&#8221; bg_type=&#8221;cover&#8221; parallax_image_height=&#8221;content-height&#8221; parallax_image_movement=&#8221;fixed&#8221; parallax_image_speed=&#8221;standard&#8221; bg_video_loop=&#8221;yes&#8221; parallax_video_height=&#8221;window-height&#8221; row_id=&#8221;row-trans&#8221; row_top_style=&#8221;none&#8221; row_bottom_style=&#8221;none&#8221; parallax_video_overlay=&#8221;none&#8221; row_overlay_opacity=&#8221;0&#8243; remove_element_spacing=&#8221;no&#8221; row_col_spacing=&#8221;0&#8243; row_col_pos=&#8221;default&#8221; row_col_equal_heights=&#8221;no&#8221; row_expanding=&#8221;no&#8221; row_animation=&#8221;none&#8221; row_animation_delay=&#8221;0&#8243; minimize_row=&#8221;yes&#8221; simplified_controls=&#8221;no&#8221; custom_css_percentage=&#8221;no&#8221; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;padding-top: 30px;&#8221; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2><b>Safety and Reporting<\/b><\/h2>\n<p><i>This section provides an overview of GIFCT and member efforts in support of GIFCT\u2019s second membership criterion: <\/i><b><i>the ability to receive, review, and act on both reports of activity that is illegal and\/or violated terms of service and user appeals.<\/i><\/b><\/p>\n<p><i>Links to member company safety hubs and reporting information can be found in <a href=\"https:\/\/gifct.org\/appendix-b\/\" target=\"_blank\" rel=\"noopener\">Appendix B<\/a>, showing the diversity of ways in which member companies approach this criterion.<\/i><\/p>\n<div class=\"ac-extended-content\" style=\"display: none;\"><\/p>\n<p>All GIFCT members must have a functional way to receive, review, and act on user reports of illegal activity or activity that violates their policies. <b>Approaches differ by company type and user needs<\/b>, but all GIFCT member companies provide public resources and tools to assist users in reporting illegal and prohibited activity and content. Most members also allow users to appeal the resulting action that a company takes to remove content or restrict a user.<\/p>\n<p><b>The majority of GIFCT member companies have safety portals or hubs which bring together policies, reporting options, and instructions to guide users in reporting content or activities.<\/b> Some safety portals provide targeted content for different audiences, such as information for parents, teachers, or law enforcement. Basic options for reporting include a publicly available email address or direct contact portal by which users may contact the company and report activity in violation of the platform\u2019s policies. Member companies consider company ability, user needs, and product type when developing reporting options.<\/p>\n<h4>GIFCT\u2019s Approach<\/h4>\n<p>Safety across digital platforms is a shared industry responsibility and efforts are furthered by a range of stakeholders in the private sector along with, academic researchers, civil society, governmental and intergovernmental actors. Fostering <b>multi-stakeholder engagement to further safety objectives is one of <\/b><a href=\"https:\/\/gifct.org\/about\/\" target=\"_blank\" rel=\"noopener\"><b>GIFCT\u2019s foundational goals<\/b><\/a><b>. <\/b>When different stakeholders work together to address this ever evolving and complex challenge, we see progress that would be difficult for any one entity to achieve alone.<\/p>\n<p><b>Safety tools and risk mitigation strategies need to evolve with the changing threat landscape. <\/b>GIFCT participates in external dialogues and international commitments with bodies such as the <a href=\"https:\/\/www.un.org\/sc\/ctc\/\" target=\"_blank\" rel=\"noopener\">United Nations Counterterrorism Executive Directorate<\/a>, the <a href=\"https:\/\/home-affairs.ec.europa.eu\/networks\/european-union-internet-forum-euif_en\" target=\"_blank\" rel=\"noopener\">European Union Internet Forum<\/a>, and the <a href=\"https:\/\/www.christchurchcall.com\/\" target=\"_blank\" rel=\"noopener\">Christchurch Call to Action<\/a>, among others, to ensure our work is informed by global perspectives on threats and needs.<\/p>\n<p>GIFCT recognizes that activists, academics, journalists, and practitioners in the counterterrorism and counter-extremism space often must mitigate the risks to their <b>personal safety online<\/b>. GIFCT supports member company efforts to incorporate the perspectives of civil society and academia on these issues through thematic cross-sector <a href=\"https:\/\/gifct.org\/working-groups-landing-page\/\" target=\"_blank\" rel=\"noopener\">Working Groups<\/a>, <a href=\"https:\/\/gifct.org\/events\/\" target=\"_blank\" rel=\"noopener\">regional events<\/a>, and\u00a0 GIFCT\u2019s academic research arm, the <a href=\"https:\/\/gnet-research.org\/\" target=\"_blank\" rel=\"noopener\">Global Network on Extremism and Technology<\/a> (GNET). GIFCT\u2019s Working Group\u2019s have also provided recommendations on <a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2022\/07\/GIFCT-22WG-PI-GoodPractice-1.1.pdf\" target=\"_blank\" rel=\"noopener\">Good Practices, Tools, and Safety Measures for Researchers (2022)<\/a>.<\/p>\n<p><\/div><div><a data-more-text=\"View More\" data-less-text=\"View Less\" class=\"ac-readmore margin-btm\" href=\"#\" style=\"display: table;\">View More<\/a><\/div>\n<p>[\/spb_text_block] [\/spb_row] [spb_row element_name=&#8221;New Tech Solutions Row &#8211; Grey Bgd&#8221; wrap_type=&#8221;full-width-contained&#8221; row_bg_type=&#8221;color&#8221; row_bg_color=&#8221;#f0f0f0&#8243; color_row_height=&#8221;content-height&#8221; bg_type=&#8221;cover&#8221; parallax_image_height=&#8221;content-height&#8221; parallax_image_movement=&#8221;fixed&#8221; parallax_image_speed=&#8221;standard&#8221; bg_video_loop=&#8221;yes&#8221; parallax_video_height=&#8221;window-height&#8221; row_id=&#8221;row-safety&#8221; row_top_style=&#8221;none&#8221; row_bottom_style=&#8221;none&#8221; parallax_video_overlay=&#8221;none&#8221; row_overlay_opacity=&#8221;0&#8243; remove_element_spacing=&#8221;no&#8221; row_col_spacing=&#8221;0&#8243; row_col_pos=&#8221;default&#8221; row_col_equal_heights=&#8221;no&#8221; row_expanding=&#8221;no&#8221; row_animation=&#8221;none&#8221; row_animation_delay=&#8221;0&#8243; minimize_row=&#8221;yes&#8221; simplified_controls=&#8221;no&#8221; custom_css_percentage=&#8221;no&#8221; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;padding-top: 30px;&#8221; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2><b>Exploring New Technical Solutions<\/b><\/h2>\n<p><i>This section provides an overview of GIFCT and member efforts in support of GIFCT\u2019s third membership criterion: <\/i><b><i>a desire to explore new technical solutions to counter terrorist and violent extremist activity online.<\/i><\/b><\/p>\n<p>GIFCT member companies often seek to utilize automated tools to detect and deter terrorist and\/or violent extremist activity on their platforms. For many GIFCT member companies, the majority of terrorist or violent extremist activity on their platforms is detected, and removed, through automated tools rather than user reporting. <b>GIFCT member companies utilize or express interest in engaging with a variety of technical tools to detect and deter terrorist and violent extremist activity online.<\/b><\/p>\n<div class=\"ac-extended-content\" style=\"display: none;\"><\/p>\n<p>One such tool is GIFCT\u2019s <a href=\"https:\/\/gifct.org\/hsdb\/\" target=\"_blank\" rel=\"noopener\">hash-sharing database<\/a>. The database enables sharing of \u201chashes\u201d (or \u201cdigital fingerprints\u201d) of known terrorist and violent extremist content between GIFCT and its member companies based on <a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2022\/12\/HSDB-Taxonomy-FOR-PUBLICATION-Dec-2022-1.pdf\" target=\"_blank\" rel=\"noopener\">strict inclusion criteria<\/a> which has evolved over time and which is agreed upon by GIFCT and member companies. Content found by a member company is \u201chashed\u201d in its raw form, ensuring there is no link to any source original platform or user data. Hashes appear as a numerical representation of the original content, which means they are extremely difficult to reverse engineer to recreate the content.<\/p>\n<p><b>Each company that is part of the hash-sharing database determines its\u00a0 engagement with the database<\/b>, depending on their own terms of service, how their platform operates, and how they utilize technical and human resources, among other factors. Further explanation of how hashes and the hash-sharing database works can found on <a href=\"https:\/\/gifct.org\/hsdb\/\" target=\"_blank\" rel=\"noopener\">GIFCT\u2019s hash-sharing database<\/a> webpage and the accompanying explainer video.<\/p>\n<h4>GIFCT\u2019s Support<\/h4>\n<p>GIFCT supports technical solutions to counter terrorist and violent extremist activity, through facilitating companies in onboarding to the hash-sharing database as well as by connecting companies with information about how technology might be exploited or used to counter terrorism and violent extremism.<\/p>\n<ul>\n<li aria-level=\"1\"><a href=\"https:\/\/gifct.org\/working-groups-landing-page\/\" target=\"_blank\" rel=\"noopener\"><b>GIFCT Working Groups<\/b><\/a> bring together experts from diverse stakeholder groups, geographies, and disciplines to offer advice on critical themes related to countering terrorism and violent extremism online and deliver on targeted substantive projects. Working Groups have considered a wide range of topics including tooling, algorithmic processes, artificial intelligence, and evolutions to the hash-sharing database. Previous outputs include:\n<ul>\n<li aria-level=\"2\"><a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2023\/09\/GIFCT-23WG-0823-GenerativeAI-1.1.pdf\" target=\"_blank\" rel=\"noopener\">Considerations of the Impacts of Generative AI on Online Terrorism and Extremism (2023)<\/a><\/li>\n<li aria-level=\"2\"><a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2023\/09\/GIFCT-23WG-0823-3DPrinting-1.1.pdf\" target=\"_blank\" rel=\"noopener\">Risks and Challenges in Online Communities for 3D-Printed Firearms Among Extremists and Terrorists (2023)<\/a><\/li>\n<li aria-level=\"2\"><a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2023\/09\/GIFCT-23WG-0823-SocialMedia-1.1.pdf\" target=\"_blank\" rel=\"noopener\">Social Media and its Impact on Terrorism and Violent Extremism in the Next 2-5 Years (2023)<\/a><\/li>\n<li aria-level=\"2\"><a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2022\/07\/GIFCT-22WG-TA-Evaluate-1.1.pdf\" target=\"_blank\" rel=\"noopener\">Methodologies to Evaluate Content Sharing Algorithms &amp; Processes (2022)<\/a><\/li>\n<li aria-level=\"2\"><a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2022\/09\/GIFCT-22WG-ContextualityIntros-1.1.pdf\" target=\"_blank\" rel=\"noopener\">The Contextuality of Lone Wolf Algorithms: An Examination of (Non)Violent Extremism in the Cyber-Physical Space (2022)<\/a><\/li>\n<li aria-level=\"2\"><a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2021\/07\/GIFCT-TAWG-2021.pdf\" target=\"_blank\" rel=\"noopener\">Gap Analysis and Recommendations for Deploying Technical Solutions to Tackle the Terrorist Use of the Internet (2021)<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\">GIFCT\u2019s academic research arm, the <a href=\"https:\/\/gnet-research.org\/\" target=\"_blank\" rel=\"noopener\"><b>Global Network on Extremism and Technology (GNET)<\/b><\/a> also shares research from global subject-matter experts through topical <a href=\"https:\/\/gnet-research.org\/resources\/insights\/\" target=\"_blank\" rel=\"noopener\">Insights<\/a>, <a href=\"https:\/\/gnet-research.org\/resources\/reports\/\" target=\"_blank\" rel=\"noopener\">reports<\/a>, and <a href=\"https:\/\/gnet-research.org\/events\/\" target=\"_blank\" rel=\"noopener\">events<\/a> designed to highlight emerging trends and adversarial shifts around the nexus between terrorism and technology.<\/li>\n<\/ul>\n<p><b>Regional Workshops<\/b> convene tech companies and local stakeholders to shed light on how terrorist and violent extremist networks exploit digital platforms in specific regions. <a href=\"https:\/\/gifct.org\/events\/\" target=\"_blank\" rel=\"noopener\">Regional Workshops<\/a> foster collaborative efforts between tech companies and partners to address these challenges.<\/p>\n<p><\/div><div><a data-more-text=\"View More\" data-less-text=\"View Less\" class=\"ac-readmore margin-btm\" href=\"#\" style=\"display: table;\">View More<\/a><\/div>\n<p>[\/spb_text_block] [\/spb_row] [spb_row element_name=&#8221;Transparency Row &#8211; White Bgd&#8221; wrap_type=&#8221;full-width-contained&#8221; row_bg_type=&#8221;color&#8221; color_row_height=&#8221;content-height&#8221; bg_type=&#8221;cover&#8221; parallax_image_height=&#8221;content-height&#8221; parallax_image_movement=&#8221;fixed&#8221; parallax_image_speed=&#8221;standard&#8221; bg_video_loop=&#8221;yes&#8221; parallax_video_height=&#8221;window-height&#8221; row_id=&#8221;row-mech&#8221; row_top_style=&#8221;none&#8221; row_bottom_style=&#8221;none&#8221; parallax_video_overlay=&#8221;none&#8221; row_overlay_opacity=&#8221;0&#8243; remove_element_spacing=&#8221;no&#8221; row_col_spacing=&#8221;0&#8243; row_col_pos=&#8221;default&#8221; row_col_equal_heights=&#8221;no&#8221; row_expanding=&#8221;no&#8221; row_animation=&#8221;none&#8221; row_animation_delay=&#8221;0&#8243; minimize_row=&#8221;yes&#8221; simplified_controls=&#8221;no&#8221; custom_css_percentage=&#8221;no&#8221; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;padding-top: 30px;&#8221; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2><b>Transparency<\/b><\/h2>\n<p><i>This section provides an overview of GIFCT and member efforts in support of GIFCT\u2019s fourth membership criterion:\u00a0 <\/i><b><i>regular, public data transparency reports.<\/i><\/b><\/p>\n<p><i>Links to member company transparency reports can be found in <a href=\"https:\/\/gifct.org\/appendix-b\/?category=Transparency\" target=\"_blank\" rel=\"noopener\">Appendix B<\/a>, showing the diversity of ways in which member companies approach this criterion.\u00a0<\/i><\/p>\n<p>Transparency is a core value in both principle and practice across GIFCT\u2019s efforts to prevent, respond to, and share knowledge about terrorist exploitation of digital platforms. Accordingly, <b>GIFCT members must publish an annual transparency report that reviews elements of how their policy guidelines are upheld and enforced<\/b>.<\/p>\n<div class=\"ac-extended-content\" style=\"display: none;\"><\/p>\n<p>Though exact format and content presentation vary from company to company, member transparency reports tend to provide data on basics around <b>government data request processing<\/b> and wider <b>removal compliance<\/b>. Transparency reporting for specific metrics may also be required by regional or national law. The granularity of data provided in these transparency reports varies according to a number of different factors, including greater resources and additional personnel to produce accurate and consistent transparency reports, as well as reporting by government entities, all of which support more robust efforts to detect, label, and review content. Some types of data included in member company transparency reports include:<\/p>\n<ul>\n<li aria-level=\"1\">Specific categories for terrorism and violent extremism content removals.<\/li>\n<li aria-level=\"1\">Data which combines the enforcement of community guidelines, content removal requests by governments and law enforcement, as well as how content might be restricted according to local laws.<\/li>\n<li aria-level=\"1\">Data focused on government and law enforcement requests.<\/li>\n<li aria-level=\"1\">Responses to reports made by users.<\/li>\n<\/ul>\n<h4>GIFCT\u2019s Approach<\/h4>\n<p>Operating with transparency as a core value,<b> GIFCT has a commitment<\/b> <b>to annual transparency reporting<\/b> which allows us to inform our members, and the wider public, about our efforts so that we remain accountable to our mission and values. Accordingly, GIFCT has produced its <a href=\"https:\/\/gifct.org\/transparency\/\" target=\"_blank\" rel=\"noopener\">own annual transparency reports<\/a> since 2019, including our most recent <a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2024\/04\/GIFCT-Annual-Report-2023.pdf\" target=\"_blank\" rel=\"noopener\">2023 Annual and Transparency Report<\/a>.<\/p>\n<p>Recognizing that tech companies, governments, and NGOs can always improve how they convey transparency and what is added to transparency data, GIFCT Working Groups made up of international, multi-sector stakeholders have produced outputs to guide GIFCT and tech companies in their efforts to be more transparent through outputs such as the below:<\/p>\n<ul>\n<li aria-level=\"1\"><a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2023\/09\/GIFCT-23WG-0823-Transparency-1.1.pdf\" target=\"_blank\" rel=\"noopener\">Pathways to Meaningful Transparency (2023)<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2022\/07\/GIFCT-22WG-ResearchAgendaScopingPaper-1.1.pdf\" target=\"_blank\" rel=\"noopener\">Transparency Reporting: Good Practices and Lessons from Global Assessment Frameworks (2022)<\/a><\/li>\n<li aria-level=\"1\"><a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2022\/07\/GIFCT-22WG-TR-Empirical-1.1.pdf\" target=\"_blank\" rel=\"noopener\">Recommendation Algorithms and Extremist Content: A Review of Empirical Evidence (2022)<\/a><\/li>\n<\/ul>\n<p>For <b>tech companies seeking GIFCT membership<\/b> that do not currently produce regular transparency reports, GIFCT provides staff and partnered support to facilitate the development of best practices around transparency in a way that works for the specific tech platform.<\/p>\n<p><\/div><div><a data-more-text=\"View More\" data-less-text=\"View Less\" class=\"ac-readmore margin-btm\" href=\"#\" style=\"display: table;\">View More<\/a><\/div>\n<p>[\/spb_text_block] [\/spb_row] [spb_row element_name=&#8221;Commitment Row &#8211; Grey Bgd&#8221; wrap_type=&#8221;full-width-contained&#8221; row_bg_type=&#8221;color&#8221; row_bg_color=&#8221;#f0f0f0&#8243; color_row_height=&#8221;content-height&#8221; bg_type=&#8221;cover&#8221; parallax_image_height=&#8221;content-height&#8221; parallax_image_movement=&#8221;fixed&#8221; parallax_image_speed=&#8221;standard&#8221; bg_video_loop=&#8221;yes&#8221; parallax_video_height=&#8221;window-height&#8221; row_id=&#8221;row-counter&#8221; row_top_style=&#8221;none&#8221; row_bottom_style=&#8221;none&#8221; parallax_video_overlay=&#8221;none&#8221; row_overlay_opacity=&#8221;0&#8243; remove_element_spacing=&#8221;no&#8221; row_col_spacing=&#8221;0&#8243; row_col_pos=&#8221;default&#8221; row_col_equal_heights=&#8221;no&#8221; row_expanding=&#8221;no&#8221; row_animation=&#8221;none&#8221; row_animation_delay=&#8221;0&#8243; minimize_row=&#8221;yes&#8221; simplified_controls=&#8221;no&#8221; custom_css_percentage=&#8221;no&#8221; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;padding-top: 30px;&#8221; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2><b>Commitment to Human Rights<\/b><\/h2>\n<p><i>This section provides an overview of GIFCT and member efforts in support of GIFCT\u2019s fifth membership criterion: <\/i><b><i>a public commitment to respecting human rights in accordance with the <\/i><\/b><a href=\"https:\/\/www.ohchr.org\/en\/publications\/reference-publications\/guiding-principles-business-and-human-rights\" target=\"_blank\" rel=\"noopener\"><b><i>United Nations Guiding Principles on Business and Human Rights<\/i><\/b><\/a><b><i> (UNGPs).<\/i><\/b><\/p>\n<p><i>Links to member company commitments to human rights can be found in <a href=\"https:\/\/gifct.org\/appendix-b\/?category=Human+Rights\" target=\"_blank\" rel=\"noopener\">Appendix B<\/a>, showing the diversity of ways in which member companies approach this criterion.<\/i><\/p>\n<p><b>Counterterrorism and human rights are complementary and mutually reinforcing goals. <\/b>Preventing terrorists and violent extremists from exploiting digital platforms enhances the protection, fulfillment, and realization of human rights. Achieving this alignment is not automatic, but requires a deliberate, inclusive, and sustained effort to embed human rights throughout counterterrorism efforts.<\/p>\n<div class=\"ac-extended-content\" style=\"display: none;\"><\/p>\n<p>As a criterion for membership, <b>all GIFCT members must express a public commitment to respecting human rights<\/b> in accordance with the United Nations Guiding Principles on Business and Human Rights. GIFCT provides support to companies looking to join GIFCT in order to achieve this, and other membership criteria.<\/p>\n<h4>GIFCT\u2019s Approach<\/h4>\n<p>GIFCT\u2019s approach to human rights is based on the UN Guiding Principles on Business and Human Rights. The participation of companies as members of GIFCT and governments and CSO representatives in GIFCT\u2019s governance structure means that both the state duty to protect human rights and the corporate responsibility to respect human rights have direct relevance to our work.<\/p>\n<p>In December 2020, GIFCT commissioned Business for Social Responsibility (BSR) to conduct a <a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2021\/07\/BSR_GIFCT_HRIA.pdf\" target=\"_blank\" rel=\"noopener\">Human Rights Impact Assessment<\/a>.The report allowed GIFCT to take early and decisive action to position universal and fundamental human rights at the center of strategic planning and programmatic activities. Since then GIFCT has continued to sustain and grow its commitments to human rights and guidance for tech company members through a series of resources including:<\/p>\n<ul>\n<li aria-level=\"1\">Human rights updates in our <a href=\"https:\/\/gifct.org\/transparency\/\" target=\"_blank\" rel=\"noopener\">Transparency Reports<\/a><\/li>\n<li aria-level=\"1\">Publishing a GIFCT <a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2022\/12\/GIFCT-HumanRightsPolicy-13.12Update.pdf\" target=\"_blank\" rel=\"noopener\">Human Rights Policy\u00a0<\/a><\/li>\n<li aria-level=\"1\">Guidance on <a href=\"https:\/\/def-frameworks.gifct.org\/risk-mitigation-supplement\/\" target=\"_blank\" rel=\"noopener\">human rights and risk mitigations in applying government designation lists<\/a> to online spaces<\/li>\n<li aria-level=\"1\">Working Groups producing an analysis on the <a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2022\/07\/GIFCT-22WG-CR-Lifecycle-1.1.pdf\" target=\"_blank\" rel=\"noopener\">Human Rights Lifecycle of a Terrorist Incident Online (2022)<\/a> to better incorporate human rights related questions throughout incident response work<\/li>\n<\/ul>\n<p>We cannot achieve our mission and human rights goals alone, and GIFCT\u2019s approach to <b>multi-stakeholder engagement underpins our approach to human rights due diligence<\/b>, including through consultations with our <a href=\"https:\/\/gifct.org\/governance\/\" target=\"_blank\" rel=\"noopener\">Independent Advisory Committee (IAC)<\/a>.<\/p>\n<p><\/div><div><a data-more-text=\"View More\" data-less-text=\"View Less\" class=\"ac-readmore margin-btm\" href=\"#\" style=\"display: table;\">View More<\/a><\/div>\n<p>[\/spb_text_block] [\/spb_row] [spb_row element_name=&#8221;Civil Society Row &#8211; White Bgd&#8221; wrap_type=&#8221;full-width-contained&#8221; row_bg_type=&#8221;color&#8221; color_row_height=&#8221;content-height&#8221; bg_type=&#8221;cover&#8221; parallax_image_height=&#8221;content-height&#8221; parallax_image_movement=&#8221;fixed&#8221; parallax_image_speed=&#8221;standard&#8221; bg_video_loop=&#8221;yes&#8221; parallax_video_height=&#8221;window-height&#8221; row_id=&#8221;row-support&#8221; row_top_style=&#8221;none&#8221; row_bottom_style=&#8221;none&#8221; parallax_video_overlay=&#8221;none&#8221; row_overlay_opacity=&#8221;0&#8243; remove_element_spacing=&#8221;no&#8221; row_col_spacing=&#8221;0&#8243; row_col_pos=&#8221;default&#8221; row_col_equal_heights=&#8221;no&#8221; row_expanding=&#8221;no&#8221; row_animation=&#8221;none&#8221; row_animation_delay=&#8221;0&#8243; minimize_row=&#8221;yes&#8221; simplified_controls=&#8221;no&#8221; custom_css_percentage=&#8221;no&#8221; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;padding-top: 30px;&#8221; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2>Supporting Civil Society Organizations to Challenge Terrorism and Violent Extremism<\/h2>\n<p><i>This section provides an overview of GIFCT and member efforts in support of GIFCT\u2019s sixth membership criterion: <\/i><b><i>support for expanding the capacity of civil society organizations to challenge terrorism and violent extremism.<\/i><\/b><\/p>\n<p><i>Links to member company counterspeech, counter-narrative, and digital literacy resources can be found in <a href=\"https:\/\/gifct.org\/appendix-b\/?category=Civil+Society+Support\" target=\"_blank\" rel=\"noopener\">Appendix B<\/a>, showing the diversity of ways in which member companies approach this criterion. <\/i><\/p>\n<div class=\"ac-extended-content\" style=\"display: none;\"><\/p>\n<h4>Counterspeech, Positive Intervention, and Counter-Narrative Facilitation<\/h4>\n<p>Counterspeech efforts are a type of communication that aims to <b>challenge or rebut hateful or violent speech<\/b>. Counter-narrative and positive intervention efforts seek to <b>offer and promote an alternative perspective to narratives <\/b>that focus on hate and violence. Reporting mechanisms discussed in the\u00a0 <a href=\"#row-trans\">Safety and Reporting<\/a> section allow users to flag harm and policy violations that lead to the possible removal of content. However, content removal alone does not address the root causes of radicalization and hate-based extremism.<\/p>\n<p>Many digital platforms house <b>crucial tools for activists and practitioners to develop content and online activities<\/b> advancing counterspeech, positive intervention, and counter narrative efforts. Efforts supported by tech companies often focus on helping activists and organizations produce, launch, and evaluate localized content to challenge engaging narratives created by violent extremists. Other forms of counterspeech aim to create friction between individuals searching for violent extremist content by proactively surfacing alternative voices or local resources for disengagement. These efforts rely on strong partnerships between tech companies and local civil society organizations around the world, reinforcing GIFCT\u2019s belief that multi-sector collaboration is a critical element of effectively combating terrorism and extremism in online spaces.<\/p>\n<h4>Digital Literacy<\/h4>\n<p>Many practitioners and researchers have highlighted that <b>preventing violent extremism fully includes<\/b> <b>improving digital literacy for online audiences<\/b>. Digital literacy refers to a range of skills and information that allow individuals and organizations to safely and effectively operate in digital environments by questioning online information and having the tools to discern opinion from fact.<\/p>\n<p>Some GIFCT member companies have built out substantial educational resources for digital literacy on their platforms. These resources provide in-depth information for users to make their online experiences (or the experiences of those they have responsibility for) safer.<\/p>\n<h4>GIFCT\u2019s Support for Civil Society<\/h4>\n<p>GIFCT supports civil society organizations in their efforts to challenge terrorism and violent extremism through a number of resources:<\/p>\n<ul>\n<li aria-level=\"1\"><a href=\"https:\/\/www.campaigntoolkit.org\/\" target=\"_blank\" rel=\"noopener\">GIFCT\u2019s Campaign Toolkit<\/a> provides a range of information on digital campaigns, from goal setting to audience targeting and impact measuring. Activists, NGOs, and practitioners can use the Campaign Toolkit to leverage the resources provided by many of our members to develop campaigns and counter-narrative projects.<\/li>\n<li aria-level=\"1\">GIFCT\u2019s Working Groups support civil society by bringing together civil society, the technology industry, government, and academia to foster collaboration and information-sharing. Previous outputs to support CSOs and practitioners in their counter-extremism work includes:\n<ul>\n<li aria-level=\"2\"><a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2023\/11\/GIFCT-23WG-1023-Playbook-1.1.pdf\" target=\"_blank\" rel=\"noopener\">Playbook on Positive Interventions Strategies Online (2023)<\/a><\/li>\n<li aria-level=\"2\"><a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2022\/07\/GIFCT-22WG-PI-Impact-1.1.pdf\" target=\"_blank\" rel=\"noopener\">Active Strategic Communication: Measuring Impact and Audience Engagement (2022)<\/a><\/li>\n<li aria-level=\"2\"><a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2022\/07\/GIFCT-22WG-PI-GoodPractice-1.1.pdf\" target=\"_blank\" rel=\"noopener\">Good Practices, Tools and Safety Measures for Researchers (2022)<\/a><\/li>\n<li aria-level=\"2\"><a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2021\/07\/GIFCT-CAPI2-2021.pdf\" target=\"_blank\" rel=\"noopener\">Content-Sharing Algorithms, Processes, and Positive Interventions Working Group: Positive Interventions (2021)<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>GIFCT\u2019s academic wing, the Global Network on Extremism and Technology routinely publishes work on <a href=\"https:\/\/gnet-research.org\/tag\/counter-narrative\/\" target=\"_blank\" rel=\"noopener\">counterspeech and counter-narrative deployment<\/a>.<\/p>\n<p><\/div><div><a data-more-text=\"View More\" data-less-text=\"View Less\" class=\"ac-readmore margin-btm\" href=\"#\" style=\"display: table;\">View More<\/a><\/div>\n<p>[\/spb_text_block] [\/spb_row] [spb_row element_name=&#8221;Appendix A &#8211; Grey Bgd&#8221; wrap_type=&#8221;full-width-contained&#8221; row_bg_type=&#8221;color&#8221; row_bg_color=&#8221;#f0f0f0&#8243; color_row_height=&#8221;content-height&#8221; bg_type=&#8221;cover&#8221; parallax_image_height=&#8221;content-height&#8221; parallax_image_movement=&#8221;fixed&#8221; parallax_image_speed=&#8221;standard&#8221; bg_video_loop=&#8221;yes&#8221; parallax_video_height=&#8221;window-height&#8221; row_id=&#8221;row-app-a&#8221; row_top_style=&#8221;none&#8221; row_bottom_style=&#8221;none&#8221; parallax_video_overlay=&#8221;none&#8221; row_overlay_opacity=&#8221;0&#8243; remove_element_spacing=&#8221;no&#8221; row_col_spacing=&#8221;0&#8243; row_col_pos=&#8221;default&#8221; row_col_equal_heights=&#8221;no&#8221; row_expanding=&#8221;no&#8221; row_animation=&#8221;none&#8221; row_animation_delay=&#8221;0&#8243; minimize_row=&#8221;yes&#8221; simplified_controls=&#8221;no&#8221; custom_css_percentage=&#8221;no&#8221; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;padding-top: 30px;padding-bottom: 30px;&#8221; border_styling_global=&#8221;default&#8221; el_class=&#8221;appendix-a&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h3>Section 2: Resource Links and GIFCT Membership<\/h3>\n<p>[\/spb_text_block] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2><b>Appendix A: GIFCT Resources<\/b><\/h2>\n<table class=\"sf-table standard_minimal\"><tbody><p><\/p>\n<tr>\n<th>\n<p><b>GIFCT Resource<\/b><\/p>\n<\/th>\n<th>\n<p><strong>Link<\/strong><\/p>\n<\/th>\n<\/tr>\n<p><\/p>\n<tr>\n<td>\n<p>Resources and Publications<\/p>\n<\/td>\n<td>\n<p><a href=\"https:\/\/gifct.org\/gifct-resources-and-publications\/\" target=\"_blank\" rel=\"noopener\">Click to view<\/a><\/p>\n<\/td>\n<\/tr>\n<p><\/p>\n<tr>\n<td>\n<p>Transparency Reports<\/p>\n<\/td>\n<td>\n<p><a href=\"https:\/\/gifct.org\/transparency\/\" target=\"_blank\" rel=\"noopener\">Click to view<\/a><\/p>\n<\/td>\n<\/tr>\n<p><\/p>\n<tr>\n<td>\n<p>Working Groups and Working Group Outputs<\/p>\n<\/td>\n<td>\n<p><a href=\"https:\/\/gifct.org\/working-groups-landing-page\/\" target=\"_blank\" rel=\"noopener\">Click to view<\/a><\/p>\n<\/td>\n<\/tr>\n<p><\/p>\n<tr>\n<td>\n<p>GIFCT\u2019s Academic Research Arm: Global Network on Extremism and Technology<\/p>\n<\/td>\n<td>\n<p><a href=\"https:\/\/gnet-research.org\/\" target=\"_blank\" rel=\"noopener\">Click to view<\/a><\/p>\n<\/td>\n<\/tr>\n<p><\/p>\n<tr>\n<td>\n<p>Human Rights Policy<\/p>\n<\/td>\n<td>\n<p><a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2022\/12\/GIFCT-HumanRightsPolicy-13.12Update.pdf\" target=\"_blank\" rel=\"noopener\">Click to view<\/a><\/p>\n<\/td>\n<\/tr>\n<p><\/p>\n<tr>\n<td>\n<p>2019 Human Rights Impact Assessment<\/p>\n<\/td>\n<td>\n<p><a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2021\/07\/BSR_GIFCT_HRIA.pdf\" target=\"_blank\" rel=\"noopener\">Click to view<\/a><\/p>\n<\/td>\n<\/tr>\n<p><\/p>\n<tr>\n<td>\n<p>GIFCT\u2019s Hash-Sharing Database<\/p>\n<\/td>\n<td>\n<p><a href=\"https:\/\/gifct.org\/hsdb\/\" target=\"_blank\" rel=\"noopener\">Click to view<\/a><\/p>\n<\/td>\n<\/tr>\n<p><\/p>\n<tr>\n<td>\n<p>Definitions and Principles Framework Project<\/p>\n<\/td>\n<td>\n<p><a href=\"https:\/\/def-frameworks.gifct.org\/\" target=\"_blank\" rel=\"noopener\">Click to view<\/a><\/p>\n<\/td>\n<\/tr>\n<p><\/p>\n<tr>\n<td>\n<p>Campaign Toolkit<\/p>\n<\/td>\n<td>\n<p><a href=\"https:\/\/www.campaigntoolkit.org\/\" target=\"_blank\" rel=\"noopener\">Click to view<\/a><\/p>\n<\/td>\n<\/tr>\n<p><\/p>\n<tr>\n<td>\n<p>Events<\/p>\n<\/td>\n<td>\n<p><a href=\"https:\/\/gifct.org\/events\/\" target=\"_blank\" rel=\"noopener\">Click to view<\/a><\/p>\n<\/td>\n<\/tr>\n<p><\/p>\n<tr>\n<td>\n<p>Technical Solutions Code of Conduct<\/p>\n<\/td>\n<td>\n<p><a href=\"https:\/\/gifct.org\/wp-content\/uploads\/2022\/12\/GIFCT-Tech-Solution-Code-of-Ethics-GIFCT-For-Publishing-APPROVED-20221115-2.pdf\" target=\"_blank\" rel=\"noopener\">Click to view<\/a><\/p>\n<\/td>\n<\/tr>\n<p><\/p>\n<tr>\n<td>\n<p>News<\/p>\n<\/td>\n<td>\n<p><a href=\"\/news\/\" target=\"_blank\" rel=\"noopener\">Click to view<\/a><\/p>\n<\/td>\n<\/tr>\n<p><\/p>\n<tr>\n<td>\n<p>Subscribe to Emails<\/p>\n<\/td>\n<td>\n<p><a href=\"https:\/\/gifct.us17.list-manage.com\/subscribe?u=6c63d1064a67c2bb2ac830e53&amp;id=d458d7f692\" target=\"_blank\" rel=\"noopener\">Click to view<\/a><\/p>\n<\/td>\n<\/tr>\n<p><\/p>\n<\/tbody><\/table>\n<p>[\/spb_text_block] [\/spb_row] [spb_row element_name=&#8221;Appendix B &#8211; White Bgd&#8221; wrap_type=&#8221;full-width-contained&#8221; row_bg_type=&#8221;color&#8221; color_row_height=&#8221;content-height&#8221; bg_type=&#8221;cover&#8221; parallax_image_height=&#8221;content-height&#8221; parallax_image_movement=&#8221;fixed&#8221; parallax_image_speed=&#8221;standard&#8221; bg_video_loop=&#8221;yes&#8221; parallax_video_height=&#8221;window-height&#8221; row_id=&#8221;row-app-b&#8221; row_top_style=&#8221;none&#8221; row_bottom_style=&#8221;none&#8221; parallax_video_overlay=&#8221;none&#8221; row_overlay_opacity=&#8221;0&#8243; remove_element_spacing=&#8221;no&#8221; row_col_spacing=&#8221;0&#8243; row_col_pos=&#8221;default&#8221; row_col_equal_heights=&#8221;no&#8221; row_expanding=&#8221;no&#8221; row_animation=&#8221;none&#8221; row_animation_delay=&#8221;0&#8243; minimize_row=&#8221;yes&#8221; simplified_controls=&#8221;no&#8221; custom_css_percentage=&#8221;no&#8221; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;padding-top: 30px;padding-bottom: 30px;&#8221; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2><b>Appendix B: Member Company Resources<\/b><\/h2>\n<h4><a href=\"https:\/\/gifct.org\/appendix-b\/\" target=\"_blank\" rel=\"noopener\"><b>Click <\/b><b>HERE<\/b><b> to view GIFCT Member Company Resources.\u00a0<\/b><\/a><\/h4>\n<p>This webpage provides a list of member company policies and resources in alignment with GIFCT\u2019s membership criteria. Resources can be filtered by member company, member type, and membership criteria.<\/p>\n<p>[\/spb_text_block] [\/spb_row] [spb_row element_name=&#8221;Membership &#8211; Grey Bgd&#8221; wrap_type=&#8221;full-width-contained&#8221; row_bg_type=&#8221;color&#8221; row_bg_color=&#8221;#f0f0f0&#8243; color_row_height=&#8221;content-height&#8221; bg_type=&#8221;cover&#8221; parallax_image_height=&#8221;content-height&#8221; parallax_image_movement=&#8221;fixed&#8221; parallax_image_speed=&#8221;standard&#8221; bg_video_loop=&#8221;yes&#8221; parallax_video_height=&#8221;window-height&#8221; row_id=&#8221;row-app-c&#8221; row_top_style=&#8221;none&#8221; row_bottom_style=&#8221;none&#8221; parallax_video_overlay=&#8221;none&#8221; row_overlay_opacity=&#8221;0&#8243; remove_element_spacing=&#8221;no&#8221; row_col_spacing=&#8221;0&#8243; row_col_pos=&#8221;default&#8221; row_col_equal_heights=&#8221;no&#8221; row_expanding=&#8221;no&#8221; row_animation=&#8221;none&#8221; row_animation_delay=&#8221;0&#8243; minimize_row=&#8221;yes&#8221; simplified_controls=&#8221;no&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;padding-top: 30px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;]<\/p>\n<h2>GIFCT Membership<\/h2>\n<h4>Interested in GIFCT Membership?<\/h4>\n<p>Digital platforms seeking to join GIFCT must meet six criteria that allow us to deliver on our mission while maintaining our values. If your company does not meet certain requirements, GIFCT offers free development support towards meeting the following criteria:<\/p>\n<ol>\n<li aria-level=\"1\">Terms of service, community guidelines, or other publicly available policies that explicitly prohibit terrorist and\/or violent extremist activity.<\/li>\n<li aria-level=\"1\">The ability to receive, review, and act on both reports of activity that is illegal and\/or violated terms of service and user appeals.<\/li>\n<li aria-level=\"1\">A desire to explore new technical solutions to counter terrorist and violent extremist activity online.<\/li>\n<li aria-level=\"1\">Regular, public data transparency reports.<\/li>\n<li aria-level=\"1\">A public commitment to respecting human rights in accordance with the United Nations Guiding Principles on Business and Human Rights (UNGPs).<\/li>\n<li aria-level=\"1\">Support for expanding the capacity of civil society organizations to challenge terrorism and violent extremism.<\/li>\n<\/ol>\n<h4>Membership Benefits<\/h4>\n<ul>\n<li aria-level=\"1\">Potential access to GIFCT\u2019s <a href=\"https:\/\/gifct.org\/hsdb\/\" target=\"_blank\" rel=\"noopener\">hash-sharing database<\/a> and URL sharing program<\/li>\n<li aria-level=\"1\">Participation in crisis response communications around international terrorist and violent extremist events with online implications<\/li>\n<li aria-level=\"1\">Briefings from scholars associated with the <a href=\"https:\/\/gnet-research.org\/\" target=\"_blank\" rel=\"noopener\">Global Network on Extremism and Technology (GNET)<\/a>, the academic research arm of GIFCT<\/li>\n<li aria-level=\"1\">Briefings on technological approaches and solutions<\/li>\n<li aria-level=\"1\">Priority participation in topical workshops, e-learnings and webinars with global experts<\/li>\n<\/ul>\n<p>For questions contact us at <a href=\"mailto:outreach@gifct.org\">outreach@gifct.org<\/a>.<\/p>\n<p>Apply for GIFCT Membership <a href=\"https:\/\/gifct.org\/membership\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>To receive email updates from GIFCT, sign up <a href=\"https:\/\/gifct.us17.list-manage.com\/subscribe?u=6c63d1064a67c2bb2ac830e53&amp;id=d458d7f692\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>[\/spb_text_block] [\/spb_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[spb_row element_name=&#8221;Intro Row&#8221; wrap_type=&#8221;full-width-contained&#8221; row_bg_type=&#8221;color&#8221; color_row_height=&#8221;content-height&#8221; bg_type=&#8221;cover&#8221; parallax_image_height=&#8221;content-height&#8221; parallax_image_movement=&#8221;fixed&#8221; parallax_image_speed=&#8221;standard&#8221; bg_video_loop=&#8221;yes&#8221; parallax_video_height=&#8221;window-height&#8221; row_id=&#8221;row-intro&#8221; row_top_style=&#8221;none&#8221; row_bottom_style=&#8221;none&#8221; parallax_video_overlay=&#8221;none&#8221; row_overlay_opacity=&#8221;0&#8243; remove_element_spacing=&#8221;no&#8221; row_col_spacing=&#8221;0&#8243; row_col_pos=&#8221;default&#8221; row_col_equal_heights=&#8221;no&#8221; row_expanding=&#8221;no&#8221; row_animation=&#8221;none&#8221; row_animation_delay=&#8221;0&#8243; minimize_row=&#8221;yes&#8221; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] [spb_text_block animation=&#8221;none&#8221; animation_delay=&#8221;0&#8243; simplified_controls=&#8221;yes&#8221; custom_css_percentage=&#8221;no&#8221; padding_vertical=&#8221;0&#8243; padding_horizontal=&#8221;0&#8243; margin_vertical=&#8221;0&#8243; custom_css=&#8221;margin-top: 0px;margin-bottom: 0px;&#8221; border_size=&#8221;0&#8243; border_styling_global=&#8221;default&#8221; width=&#8221;1\/1&#8243; el_position=&#8221;first last&#8221;] Resources in this Guide This guide to GIFCT and Member [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4465","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/gifct.org\/wp-json\/wp\/v2\/pages\/4465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gifct.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gifct.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gifct.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/gifct.org\/wp-json\/wp\/v2\/comments?post=4465"}],"version-history":[{"count":6,"href":"https:\/\/gifct.org\/wp-json\/wp\/v2\/pages\/4465\/revisions"}],"predecessor-version":[{"id":5489,"href":"https:\/\/gifct.org\/wp-json\/wp\/v2\/pages\/4465\/revisions\/5489"}],"wp:attachment":[{"href":"https:\/\/gifct.org\/wp-json\/wp\/v2\/media?parent=4465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}