Get in Touch

    Follow us

    Resource Guide

    Introduction & How to Use This Document

    This document serves as a guide for civil society groups, academic researchers, governments, and other tech companies wanting to know more about the resources and information that GIFCT member companies make available about their efforts to counter terrorist and violent extremist activity and tools developed to combat forms of online radicalization.

    In each section we have linked directly to resources on each topic developed by GIFCT member companies as well as resources from GIFCT and its partners at the Global Network on Technology and Extremism (GNET) and Tech Against Terrorism.

    Community Standards

    Most platforms require users to agree to set terms of service before accessing a platform’s tools. While terms of service give legal parameters for usage, content standards explain in a less legally formatted way what is and is not allowed to be shared on a given tech platform. These guidelines are put in place to ensure users can use the platforms freely and safely, while understanding where they might cross the line and have content removed or engagement on the platform restricted. These guidelines are generally global. Most companies design, review and update these standards based on feedback from a range of stakeholders that might include their users, government bodies, and global experts in fields such as technology, public safety and human rights. GIFCT members enforce their own respective policies and conduct their own practices in response to violations of their terms of service or standards such as content removal and account disabling.

    Transparency

    In addition to explicit platform policies that prohibit terrorist and violent extremist content or activities, every GIFCT member is required to publish, at a minimum, an annual transparency report that reviews elements of how standards are upheld and enforced. Though exact format and content presentation vary from company to company, these reports tend to provide data on basics around government data request processing and wider removal compliance. As a company has more resources and ability to build out more nuanced metrics within a transparency report, these reports might also include data on the appearance and removal of specific types of violating content and the amount of content on which the platform took action. In the most advanced examples of transparency reporting to date these reports sometimes include rates of appeals to report on false/positive removal rates, and even the prevalence of violating content on the platform over time.

    Safety Hubs

    Often, activists, academics, journalists, and practitioners in the counterterrorism and counter-extremism space have to find ways to mitigate the risks to their personal safety online more than an average user. By using online platforms to research or challenge hate-based extremism and terrorism, an individual can often put themselves or the sensitive communities they engage with online at risk. Safety concerns also tend to arise for many activists and NGOs who often have public facing interactions with different communities and as a result tend to face several risks online. Platforms’ safety guidelines and resources are, therefore, increasingly important to ensure that users know how to flag abuse, manage privacy settings, and report things such as potentially hacked accounts or nefarious activities of dangerous organizations.

    Reporting Mechanisms

    Related to broader safety concerns, another GIFCT membership requirement states that all members must have a functional way to “receive and act on reports of illegal activity or activity violating terms of service.” While members approach this in a variety of ways, all member companies provide public resources and tools to assist users in reporting illegal and prohibited activity and content.

    At the very least a publicly available email address or direct contact portal is available, by which users may contact the company and report content or activity in violation of the platform’s guidelines. Mailchimp, MEGA, and WhatsApp all provide basic outreach portals of this. For companies like MEGA and WhatsApp, which feature end-to-end encryption, this is the most efficient way to report abuse because the company does not otherwise have access to the content and activity of users. JustPaste.It users can directly email the platform at [email protected] – instructions for properly submitting information about violating content can be found here.

    Counterspeech and Counter-Narrative Facilitation

    While safety tools allow users to flag harm and on-platform violations that lead to possible removal of content, we also know that removal alone will never solve for the root causes of radicalization and hate-based extremism. Larger social media platforms have realized that their platforms also house crucial tools for activists and practitioners to develop content and online activities for prevention purposes. Some GIFCT members have developed tools that can optimize community-level voices that challenge hate speech and extremism. Supporting counterspeech and counter-narrative efforts emerges out of a recognition that deplatforming and removing content only addresses symptoms of radicalization, rather than causes.

    Digital Literacy

    While counterspeech and counter-narrative campaigns and initiatives look to disrupt a cycle or pathway of hate-based radicalization, many practitioners and researchers have highlighted that preventing violent extremism needs to start with better comprehensive digital literacy for online audiences (young and old). Digital Literacy is a broad term that refers to a range of skills and information that allow individuals and organizations to safely and effectively operate in digital environments by questioning online information and having the tools to discern opinion from fact. While some of the material shared here is targeted at younger people, it is equally useful to those unfamiliar with operating on digital platforms and those who wish to engage younger audiences (activists, NGOs, teachers) by providing the basics in clear, straightforward language that can be easily communicated to others.

    Advertising and Marketing

    Some GIFCT member companies offer advertising and marketing tools for their users based on how they function and monetize as a platform. While these tools are often developed for more traditional commerce and marketplace use cases, we also know that these tools can be optimized by activists, NGOs and practitioners to better launch their messaging to target audiences and further counterspeech goals. Some companies have advertising and marketing tools to ensure that a range of organizations and/or activist’s campaigns and voices reach the relevant target audiences and can be effectively measured.

    Appendix A: GIFCT Membership Criteria and Benefits

    Membership Criteria

    GIFCT member companies are listed on our website here. In order to join GIFCT, companies must meet the following requirements:

    • Content standards that explicitly prohibit the promotion of terrorism in their terms of service, community guidelines, or other publicly available content policies
    • The ability to receive and act on reports of illegal activity or activity violating terms of service
    • A desire to explore new technical solutions to content and conduct challenges
    • Regular, public data transparency
    • A public commitment to respecting human rights, particularly free expression and privacy, when implementing content removal policies
    • Support for expanding the capacity of civil society organizations to challenge violent extremism

    If a company looking to join the GIFCT does not meet certain requirements, GIFCT offers that company mentorship through our partnership with Tech Against Terrorism.

    Membership Benefits

    • Potential access to GIFCT’s hash-sharing database and URL sharing program
    • Participation in crisis response communications around international terrorist and violent extremist events with online implications
    • Briefings from scholars associated with the Global Network on Extremism and Technology (GNET), the academic research arm of GIFCT
    • Briefings on technological approaches and solutions
    • Priority participation in topical workshops, e-learnings and webinars with global experts

    Contact: for any questions contact us at [email protected].

    Sign up to receive email updates from the Global Internet Forum to Counter Terrorism

    Appendix B

    GIFCT and Partner Resources Index

    PartnerWebpage TitleLink
    GIFCTMembership PillarsClick here to view
    GIFCTTransparencyClick here to view
    GIFCTWorking GroupsClick here to view
    GIFCTNews Page and Newsletter SubscriptionClick here to view
    GIFCTCampaign ToolkitClick here to view
    GIFCTDigital Security ChecklistClick here to view
    GIFCTEmail UpdatesClick here to view
    GIFCTThe Definitions and Principles Framework ProjectClick here to view
    TATMentorshipClick here to view
    TATWorkshops and EventsClick here to view
    TATKnowledge Sharing Platform (KSP)Click here to view
    GNETHomepage: Insights and ReportsClick here to view

    Member Resources Index

    MemberWebpage TitleLink
    AirbnbCommunity PoliciesClick here to view
    AirbnbTransparencyClick here to view
    AirbnbSafety and accessibilityClick here to view
    AirbnbNeighborhood SupportClick here to view
    AirbnbTrust and SafetyClick here to view
    AirbnbHost Resource CenterClick here to view
    AirbnbHow do I report a message or block someone on Airbnb?Click here to view
    AirbnbHow do I report discrimination to Airbnb?Click here to view
    AmazonCommunity GuidelinesClick here to view
    AmazonSecurity and Privacy – Law Enforcement Information RequestsClick here to view
    AmazonSecurity and PrivacyClick here to view
    ClubhouseTrust and Safety pageClick here to view
    ClubhouseKnowledge CenterClick here to view
    ClubhouseCommunity GuidelinesClick here to view
    DiscordCommunity GuidelinesClick here to view
    DiscordTransparency ReportClick here to view
    DiscordSafety CenterClick here to view
    DiscordTrust and Safety – How to Properly Report Issues to Trust and SafetyClick here to view
    DropboxAcceptable Use PolicyClick here to view
    DropboxTransparency OverviewClick here to view
    Dropbox“How to report inappropriate content on DropboxClick here to view
    FacebookCommunity StandardsClick here to view
    FacebookTransparency ReportsClick here to view
    FacebookDigital Literacy LibraryClick here to view
    FacebookCommunity Standards – Dangerous Individuals and OrganizationsClick here to view
    FacebookCombating Hate and Extremism (FB News, 2019)Click here to view
    FacebookWhat Are We Doing to Stay Ahead of TerrorismClick here to view
    FacebookFacebook CounterspeechClick here to view
    FacebookSocial ImpactClick here to view
    FacebookSafety CenterClick here to view
    FacebookSafety Center – Law EnforcementClick here to view
    FacebookSafety Center – Parents PortalClick here to view
    FacebookSafety Center – Empowering YouthClick here to view
    FacebookSafety Advisory BoardClick here to view
    FacebookPolicies and Reporting – How to Report ThingsClick here to view
    GIPHYCommunity GuidelinesClick here to view
    GIPHYSubmit a request or reportClick here to view
    GIPHY2021 Transparency ReportClick here to view
    InstagramCommunity GuidelinesClick here to view
    InstagramTransparency ReportsClick here to view
    InstagramAbuse and Spam – ReportClick here to view
    InstagramCommunity ResourcesClick here to view
    JustPaste.itTerms of ServiceClick here to view
    JustPaste.itTransparency ReportClick here to view
    JustPaste.itAbuse ReportingClick here to view
    LinkedInProfessional Community PoliciesClick here to view
    LinkedInTransparencyClick here to view
    LinkedInReport Inappropriate Content, Messages, or Safety ConcernsClick here to view
    LinkedInSafety Center – Identifying AbuseClick here to view
    LinkedInSafety Center – Staying SafeClick here to view
    MailchimpAcceptable Use PolicyClick here to view
    MailchimpTransparency ReportsClick here to view
    MailchimpAbuse DeskClick here to view
    MEGATerms of ServiceClick here to view
    MEGATransparency Report 2022Click here to view
    MEGAContact Us – Report Objectionable MaterialClick here to view
    MEGATakedown Guidance PolicyClick here to view
    MicrosoftReport Hate Speech Content Posted to a Microsoft Hosted Consumer ServiceClick here to view
    MicrosoftCorporate Social Responsibility – Reports HubClick here to view
    MicrosoftDigital LiteracyClick here to view
    MicrosoftDigital Safety Content ReportClick here to view
    MicrosoftReport Terrorist Content Posted to a Microsoft Consumer ServiceClick here to view
    MicrosoftRegister with Microsoft NonprofitsClick here to view
    MicrosoftOnline Safety TipsClick here to view
    MicrosoftOnline Safety – Resources and ResearchClick here to view
    MicrosoftSecurityClick here to view
    MicrosoftReport a Concern to BingClick here to view
    MicrosoftExpanding our commitments to countering violent extremism onlineClick here to view
    MicrosoftOnline Safety – Promoting Digital CivilityClick here to view
    MicrosoftRequest to Reinstate Disabled ContentClick here to view
    MicrosoftMicrosoft Services Agreement with Code of ConductClick here to view
    MicrosoftXbox Community StandardsClick here to view
    MicrosoftHuman rights statementClick here to view
    MicrosoftMicrosoft’s approach to terrorist content onlineClick here to view
    MicrosoftBing’s Webmaster guidelinesClick here to view
    NianticPlayer GuidelinesClick here to view
    NianticProduct SupportClick here to view
    NianticSecurityClick here to view
    NianticTransparency ReportClick here to view
    PinterestCommunity GuidelinesClick here to view
    PinterestTransparency ReportClick here to view
    PinterestHelp Center – Safety – Report Something on PinterestClick here to view
    PinterestHelp Center – Safety – Get More Help – Report a Policy ViolationClick here to view
    TumblrCommunity GuidelinesClick here to view
    TumblrTransparency ReportClick here to view
    TumblrReporting ContentClick here to view
    TumblrReport AbuseClick here to view
    TumblrReport Suspected Terrorism ContentClick here to view
    TwitterThe Twitter RulesClick here to view
    TwitterCampaigning on Twitter – The Handbook for NGOs, Politics and Public ServiceClick here to view
    TwitterTransparencyClick here to view
    TwitterSafety and SecurityClick here to view
    TwitterBrand SafetyClick here to view
    TwitterAdvertising – TargetingClick here to view
    TwitterAdvertising – Campaign TypesClick here to view
    TwitterAnalyticsClick here to view
    TwitterBusiness Resources and GuidesClick here to view
    TwitterCorporate PhilanthropyClick here to view
    TwitterHateful Conduct PolicyClick here to view
    Twitter@TwitterSafety (Twitter Account)Click here to view
    TwitterHelp – Safety and Security – Sensitive ContentClick here to view
    TwitterBusiness – Twitter Video ResourcesClick here to view
    TwitterRules and Policies – Report ViolationsClick here to view
    TwitterTeaching and Learning with Twitter Media and Information LiteracyClick here to view
    WhatsAppHow to Use WhatsApp ResponsiblyClick here to view
    WhatsAppSafety Tips and SecurityClick here to view
    WhatsAppUnauthorized use of automated or bulk messaging on WhatsAppClick here to view
    WhatsAppBlocking and Reporting ContactsClick here to view
    WordPress.comUser GuidelinesClick here to view
    WordPress.comTransparency ReportClick here to view
    WordPress.comReport a SiteClick here to view
    WordPress.comTerrorist Activity PolicyClick here to view
    YouTubeCommunity GuidelinesClick here to view
    YouTubeTransparency – Community Guidelines EnforcementClick here to view
    YouTubeSafety ResourcesClick here to view
    YouTubeSafety Resources – Suicide and Self-Injury PolicyClick here to view
    YouTubeSafety Resources – Parent ResourcesClick here to view
    YouTubeSafety Resources – Teen ResourcesClick here to view
    YouTubeSafety Resources – Educator ResourcesClick here to view
    YouTubePolicies – Violent extremist or criminal organizations policyClick here to view
    YouTubeHate Speech PolicyClick here to view
    YouTubeAdvertisingClick here to view
    YouTubeCreators ResourcesClick here to view
    YouTubeGoogle for Nonprofits – YouTube Nonprofit ProgramClick here to view
    YouTubeSocial ImpactClick here to view
    YouTubeHelp Center – Report Inappropriate ContentClick here to view
    YouTubeHelp Center – Other Reporting OptionsClick here to view
    YouTubeHelp Center – Report a YouTube search predictionClick here to view
    YouTubeHelp Center – Trusted Flagger ProgramClick here to view
    YouTubeHow YouTube prevents radicalizationClick here to view
    YouTube/GoogleRequest Google Nonprofit AccountClick here to view
    ZoomTerms of ServiceClick here to view
    ZoomTrust CenterClick here to view
    ZoomSecurity OverviewClick here to view
    ZoomPrivacy PracticesClick here to view
    ZoomComplianceClick here to view
    ZoomTrust and Safety CenterClick here to view
    ZoomPrivacy StatementClick here to view
    ZoomTransparency ReportClick here to view
    ZoomCommunity Standards Enforcement Transparency ReportClick here to view
    ZoomAcceptable Use GuidelinesClick here to view
    ZoomExpression, Safety and Process at ZoomClick here to view