Explainers
How does GIFCT define terrorism and violent extremism?
Our goal is to prevent terrorist and violent extremist exploitation of digital platforms. Recognizing there is no universally agreed-upon definition of terrorism, GIFCT works to facilitate broad dialogue and analysis of how terrorism and violent extremism manifests across the ideological spectrum. Through GIFCT Working Groups, supporting academic research through GNET, and within the workshops and events we host, we offer information and insights about how online activity, ideological trends, current events, and other factors are contributing to terrorism and violent extremism throughout the globe.
However, when developing and operating cross-platform tools, such as the GIFCT hash-sharing database, that help tech companies identify and when applicable, take action on content on their platforms, we’ve established refined parameters and a definitional framework for what constitutes terrorist and violent extremist content. Hashes of terrorist and violent extremist content that qualify to be put in the hash-sharing database currently must meet a taxonomy that recognizes the original producers of the content as well as the type of content and severity for harm. Learn more about that taxonomy here.
What is the hash-sharing database?
GIFCT’s hash-sharing database (HSDB) is a cross-platform database that enables the sharing of “hashes” (or “digital fingerprints”) of known terrorist and violent extremist content (TVEC) between member platforms in a secure, efficient, and privacy-protecting manner. The HSDB allows GIFCT members to identify and act on TVEC quickly, in accordance with their respective policies and terms of service. Learn more about the HSDB here.
Do governments have access to the database?
No. Only tech companies have access to the hash-sharing database. Content found by a member company is “hashed” in its raw form, ensuring there is no link to any source original platform or user data. Hashes appear as a numerical representation of the original content, which means they cannot be easily reverse engineered to recreate the content. Questions and requests for specific content should be directed to member companies since hashes are only numerical representations of source content and cannot practically be reverse engineered to recreate the content.
What is the Incident Response Framework?
The Incident Response Framework (IRF) is the mechanism that helps member companies respond to online dimensions of offline violence. The IRF is composed of three non-hierarchical activation types designed to counter various methods terrorists or violent extremists may use to exploit digital platforms. Its goal is to prevent the spread of content that graphically depicts or explicitly glorifies their violence. Learn more about the IRF here.
What is a Perpetrator Content Incident?
The Perpetrator Content Incident is an activation type of the IRF. It is designed to coordinate a response to online, perpetrator-produced content directly related to a terrorist or violent extremist event and support members in identifying and preventing the spread of this content. Learn more about IRF activation types here.
What is GIFCT’s governance structure?
GIFCT’s Executive Director, Naureen Chowdhury Fink, and the team of experts pursuing our programming, technological, and strategic initiatives lead GIFCT’s day-to-day operations as an independent non-profit organization. GIFCT’s Operating Board is made up of members from its founding companies—Meta (formerly Facebook), Microsoft, and YouTube—and up to two “At-Large,” general GIFCT members, elected by GIFCT members on an annual basis. The Operating Board is advised by an Independent Advisory Committee composed of representatives from civil society, government, and intergovernmental organizations. Learn more about the Operating Board and Independent Advisory Committee here.
How is GIFCT funded?
GIFCT’s member companies provide financial contributions to fund GIFCT’s operations. Our four founding member companies and Operating Board members have funded GIFCT since its establishment while additional members began contributing in 2021. GIFCT’s Annual Report provides further information about our membership tiering structure for financial contributions. See the Financial sections of our 2024 Annual Report for the latest information.
How does GIFCT involve civil society?
GIFCT believes that solutions developed to prevent terrorist and violent extremist exploitation of digital platforms can only work if they reflect multi-stakeholder input, especially from civil society. By design, representatives from civil society hold a majority on GIFCT’s Independent Advisory Committee, participate across all GIFCT Working Groups, have been vital influences in how we seek to carry out the commitments of the Human Rights Impact Assessment we commissioned in the first year of our operations as an independent entity, and are recognized as key stakeholders advising across GIFCT’s lines of effort. GIFCT also hosts webinars and events that incorporate civil society voices to highlight areas of concern, adversarial shifts, and areas for further GIFCT work.
How does GIFCT work with governments?
GIFCT regularly engages governments based on a shared interest to prevent terrorist and violent extremist exploitation of digital platforms. GIFCT Membership is only applicable to tech companies, however, representatives from governments hold rotating seats on GIFCT’s Independent Advisory Committee. In this capacity, they help to advise and guide GIFCT and its Operating Board. Representatives from governments participate across all of our GIFCT Working Groups and engage with GIFCT when a terrorist or violent extremist attack activates our Incident Response Framework. At the same time, GIFCT participates in a range of forums and initiatives led by governments to combat terrorist and violent extremist activity and facilitates discussions on the impacts of particular legislation designed to address this activity.
Does GIFCT take positions on legislation?
GIFCT is not a lobbying body but does create space for and facilitate multi-sector discussions around topics such as developing legislation and policies. This work is primarily done through the GIFCT Working Groups, where representatives from tech, government, and civil society co-lead discussions and drive annual outputs analyzing themes at the intersections of technology and counterterrorism.
What does GIFCT do, and what does GNET do?
The Global Network on Extremism and Technology (GNET) is the academic research arm of GIFCT and aims to better understand the ways in which terrorists use technology. GIFCT funds GNET in order to generate real-time, cutting-edge research and expert insights about trends at the nexus of technology and terrorism globally and make this information available to tech companies, governments, civil society and other experts and practitioners trying to stay informed on the latest developments and influences for terrorist and violent extremist activity online.
How can I partner with GIFCT?
There are several ways to partner with GIFCT depending on the type of organization you may be:
- Tech companies can pursue membership with GIFCT. Learn more about our membership criteria and how to apply here.
- Academics and researchers interested can engage our academic research arm, GNET, and seek to contribute their subject matter expertise.
- Representatives from government and civil society are encouraged to learn more about GIFCT Working Groups and how to join here.
Others interested can reach out to [email protected].
How do I join a GIFCT Working Group?
We encourage you to apply to join a GIFCT Working Group when they are refreshed each year. Working Groups run on an annual basis and bring together experts from diverse stakeholder groups, geographies, and disciplines to offer advice in specific thematic areas and deliver on targeted, substantive projects. Each year, we refresh working groups to update themes and focus areas and to allow new participants to join. Participants work with GIFCT to prepare strategic work plans, outlining objectives, goals, strategies, deliverables, and timelines.