Resource Guide

Introduction & How to Use This Document

This document serves as a guide for civil society groups, academic researchers, governments, and other tech companies wanting to know more about the resources and information that GIFCT member companies make available about their efforts to counter terrorist and violent extremist activity and tools developed to combat forms of online radicalization.

In each section we have linked directly to resources on each topic developed by GIFCT member companies as well as resources from GIFCT and its partners at the Global Network on Technology and Extremism (GNET) and Tech Against Terrorism.

Community Standards

Most platforms require users to agree to set terms of service before accessing a platform’s tools. While terms of service give legal parameters for usage, content standards explain in a less legally formatted way what is and is not allowed to be shared on a given tech platform. These guidelines are put in place to ensure users can use the platforms freely and safely, while understanding where they might cross the line and have content removed or engagement on the platform restricted. These guidelines are generally global. Most companies design, review and update these standards based on feedback from a range of stakeholders that might include their users, government bodies, and global experts in fields such as technology, public safety and human rights. GIFCT members enforce their own respective policies and conduct their own practices in response to violations of their terms of service or standards such as content removal and account disabling.


In addition to explicit platform policies that prohibit terrorist and violent extremist content or activities, every GIFCT member is required to publish, at a minimum, an annual transparency report that reviews elements of how standards are upheld and enforced. Though exact format and content presentation vary from company to company, these reports tend to provide data on basics around government data request processing and wider removal compliance. As a company has more resources and ability to build out more nuanced metrics within a transparency report, these reports might also include data on the appearance and removal of specific types of violating content and the amount of content on which the platform took action. In the most advanced examples of transparency reporting to date these reports sometimes include rates of appeals to report on false/positive removal rates, and even the prevalence of violating content on the platform over time.

Safety Hubs

Often, activists, academics, journalists, and practitioners in the counterterrorism and counter-extremism space have to find ways to mitigate the risks to their personal safety online more than an average user. By using online platforms to research or challenge hate-based extremism and terrorism, an individual can often put themselves or the sensitive communities they engage with online at risk. Safety concerns also tend to arise for many activists and NGOs who often have public facing interactions with different communities and as a result tend to face several risks online. Platforms’ safety guidelines and resources are, therefore, increasingly important to ensure that users know how to flag abuse, manage privacy settings, and report things such as potentially hacked accounts or nefarious activities of dangerous organizations.

Reporting Mechanisms

Related to broader safety concerns, another GIFCT membership requirement states that all members must have a functional way to “receive and act on reports of illegal activity or activity violating terms of service.” While members approach this in a variety of ways, all member companies provide public resources and tools to assist users in reporting illegal and prohibited activity and content.

At the very least a publicly available email address or direct contact portal is available, by which users may contact the company and report content or activity in violation of the platform’s guidelines. Mailchimp, MEGA, and WhatsApp all provide basic outreach portals of this. For companies like MEGA and WhatsApp, which feature end-to-end encryption, this is the most efficient way to report abuse because the company does not otherwise have access to the content and activity of users. JustPaste.It users can directly email the platform at [email protected] – instructions for properly submitting information about violating content can be found here.

Counterspeech and Counter-Narrative Facilitation

While safety tools allow users to flag harm and on-platform violations that lead to possible removal of content, we also know that removal alone will never solve for the root causes of radicalization and hate-based extremism. Larger social media platforms have realized that their platforms also house crucial tools for activists and practitioners to develop content and online activities for prevention purposes. Some GIFCT members have developed tools that can optimize community-level voices that challenge hate speech and extremism. Supporting counterspeech and counter-narrative efforts emerges out of a recognition that deplatforming and removing content only addresses symptoms of radicalization, rather than causes.

Digital Literacy

While counterspeech and counter-narrative campaigns and initiatives look to disrupt a cycle or pathway of hate-based radicalization, many practitioners and researchers have highlighted that preventing violent extremism needs to start with better comprehensive digital literacy for online audiences (young and old). Digital Literacy is a broad term that refers to a range of skills and information that allow individuals and organizations to safely and effectively operate in digital environments by questioning online information and having the tools to discern opinion from fact. While some of the material shared here is targeted at younger people, it is equally useful to those unfamiliar with operating on digital platforms and those who wish to engage younger audiences (activists, NGOs, teachers) by providing the basics in clear, straightforward language that can be easily communicated to others.

Advertising and Marketing

Some GIFCT member companies offer advertising and marketing tools for their users based on how they function and monetize as a platform. While these tools are often developed for more traditional commerce and marketplace use cases, we also know that these tools can be optimized by activists, NGOs and practitioners to better launch their messaging to target audiences and further counterspeech goals. Some companies have advertising and marketing tools to ensure that a range of organizations and/or activist’s campaigns and voices reach the relevant target audiences and can be effectively measured.

Appendix A: GIFCT Membership Criteria and Benefits

Membership Criteria

GIFCT member companies are listed on our website here. In order to join GIFCT, companies must meet the following requirements:

  • Content standards that explicitly prohibit the promotion of terrorism in their terms of service, community guidelines, or other publicly available content policies
  • The ability to receive and act on reports of illegal activity or activity violating terms of service
  • A desire to explore new technical solutions to content and conduct challenges
  • Regular, public data transparency
  • A public commitment to respecting human rights, particularly free expression and privacy, when implementing content removal policies
  • Support for expanding the capacity of civil society organizations to challenge violent extremism

If a company looking to join the GIFCT does not meet certain requirements, GIFCT offers that company mentorship through our partnership with Tech Against Terrorism.

Membership Benefits

  • Potential access to GIFCT’s hash-sharing database and URL sharing program
  • Participation in crisis response communications around international terrorist and violent extremist events with online implications
  • Briefings from scholars associated with the Global Network on Extremism and Technology (GNET), the academic research arm of GIFCT
  • Briefings on technological approaches and solutions
  • Priority participation in topical workshops, e-learnings and webinars with global experts

Contact: for any questions contact us at [email protected].

Sign up to receive email updates from the Global Internet Forum to Counter Terrorism

Appendix B

GIFCT and Partner Resources Index

PartnerWebpage TitleLink
GIFCTMembership PillarsClick here to view
GIFCTTransparencyClick here to view
GIFCTWorking GroupsClick here to view
GIFCTNews Page and Newsletter SubscriptionClick here to view
GIFCTCampaign ToolkitClick here to view
GIFCTDigital Security ChecklistClick here to view
GIFCTEmail UpdatesClick here to view
GIFCTThe Definitions and Principles Framework ProjectClick here to view
TATMentorshipClick here to view
TATWorkshops and EventsClick here to view
TATKnowledge Sharing Platform (KSP)Click here to view
GNETHomepage: Insights and ReportsClick here to view

Member Resources Index

MemberWebpage TitleLink
AirbnbCommunity PoliciesClick here to view
AirbnbTransparencyClick here to view
AirbnbSafety and accessibilityClick here to view
AirbnbNeighborhood SupportClick here to view
AirbnbTrust and SafetyClick here to view
AirbnbHost Resource CenterClick here to view
AirbnbHow do I report a message or block someone on Airbnb?Click here to view
AirbnbHow do I report discrimination to Airbnb?Click here to view
AmazonCommunity GuidelinesClick here to view
AmazonSecurity and Privacy – Law Enforcement Information RequestsClick here to view
AmazonSecurity and PrivacyClick here to view
BitchuteCommunity GuidelinesClick here to view
BitchuteGuidelines Enforcement ProcessClick here to view
BitchuteTransparency ReportingClick here to view
ClubhouseTrust and Safety pageClick here to view
ClubhouseKnowledge CenterClick here to view
ClubhouseCommunity GuidelinesClick here to view
DiscordCommunity GuidelinesClick here to view
DiscordTransparency ReportClick here to view
DiscordSafety CenterClick here to view
DiscordTrust and Safety – How to Properly Report Issues to Trust and SafetyClick here to view
DropboxAcceptable Use PolicyClick here to view
DropboxTransparency OverviewClick here to view
Dropbox“How to report inappropriate content on DropboxClick here to view
FacebookCommunity StandardsClick here to view
FacebookTransparency ReportsClick here to view
FacebookDigital Literacy LibraryClick here to view
FacebookCommunity Standards – Dangerous Individuals and OrganizationsClick here to view
FacebookCombating Hate and Extremism (FB News, 2019)Click here to view
FacebookWhat Are We Doing to Stay Ahead of TerrorismClick here to view
FacebookFacebook CounterspeechClick here to view
FacebookSocial ImpactClick here to view
FacebookSafety CenterClick here to view
FacebookSafety Center – Law EnforcementClick here to view
FacebookSafety Center – Parents PortalClick here to view
FacebookSafety Center – Empowering YouthClick here to view
FacebookSafety Advisory BoardClick here to view
FacebookPolicies and Reporting – How to Report ThingsClick here to view
GIPHYCommunity GuidelinesClick here to view
GIPHYSubmit a request or reportClick here to view
GIPHY2021 Transparency ReportClick here to view
GoogleAbuse and Content PoliciesClick here to view
GoogleTransparency ReportClick here to view
GoogleReport Content for Legal ReasonsClick here to view
InstagramCommunity GuidelinesClick here to view
InstagramTransparency ReportsClick here to view
InstagramAbuse and Spam – ReportClick here to view
InstagramCommunity ResourcesClick here to view
JustPaste.itTerms of ServiceClick here to view
JustPaste.itTransparency ReportClick here to view
JustPaste.itAbuse ReportingClick here to view
LinkedInProfessional Community PoliciesClick here to view
LinkedInTransparencyClick here to view
LinkedInReport Inappropriate Content, Messages, or Safety ConcernsClick here to view
MailchimpAcceptable Use PolicyClick here to view
MailchimpTransparency ReportsClick here to view
MailchimpAbuse DeskClick here to view
MEGATerms of ServiceClick here to view
MEGATransparency Report 2022Click here to view
MEGAContact Us – Report Objectionable MaterialClick here to view
MEGATakedown Guidance PolicyClick here to view
MicrosoftReport Hate Speech Content Posted to a Microsoft Hosted Consumer ServiceClick here to view
MicrosoftCorporate Social Responsibility – Reports HubClick here to view
MicrosoftDigital LiteracyClick here to view
MicrosoftDigital Safety Content ReportClick here to view
MicrosoftReport Terrorist Content Posted to a Microsoft Consumer ServiceClick here to view
MicrosoftRegister with Microsoft NonprofitsClick here to view
MicrosoftOnline Safety TipsClick here to view
MicrosoftOnline Safety – Resources and ResearchClick here to view
MicrosoftSecurityClick here to view
MicrosoftReport a Concern to BingClick here to view
MicrosoftExpanding our commitments to countering violent extremism onlineClick here to view
MicrosoftOnline Safety – Promoting Digital CivilityClick here to view
MicrosoftRequest to Reinstate Disabled ContentClick here to view
MicrosoftMicrosoft Services Agreement with Code of ConductClick here to view
MicrosoftXbox Community StandardsClick here to view
MicrosoftHuman rights statementClick here to view
MicrosoftMicrosoft’s approach to terrorist content onlineClick here to view
MicrosoftBing’s Webmaster guidelinesClick here to view
NianticPlayer GuidelinesClick here to view
NianticProduct SupportClick here to view
NianticSecurityClick here to view
NianticTransparency ReportClick here to view
PinterestCommunity GuidelinesClick here to view
PinterestTransparency ReportClick here to view
PinterestHelp Center – Safety – Report Something on PinterestClick here to view
PinterestHelp Center – Safety – Get More Help – Report a Policy ViolationClick here to view
TumblrCommunity GuidelinesClick here to view
TumblrTransparency ReportClick here to view
TumblrReporting ContentClick here to view
TumblrReport AbuseClick here to view
TumblrReport Suspected Terrorism ContentClick here to view
TwitchSafety CenterClick here to view
TwitchCommunity GuidelinesClick here to view
TwitchTransparency ReportClick here to view
TwitchFiling a ReportClick here to view
TwitchHuman Rights Impact AssessmentClick here to view
TwitchGuide for Parents and EducatorsClick here to view
TwitchConnect Safely’s Parent’s Guide to TwitchClick here to view
TwitterThe Twitter RulesClick here to view
TwitterCampaigning on Twitter – The Handbook for NGOs, Politics and Public ServiceClick here to view
TwitterTransparencyClick here to view
TwitterSafety and SecurityClick here to view
TwitterBrand SafetyClick here to view
TwitterAdvertising – TargetingClick here to view
TwitterAdvertising – Campaign TypesClick here to view
TwitterAnalyticsClick here to view
TwitterBusiness Resources and GuidesClick here to view
TwitterCorporate PhilanthropyClick here to view
TwitterHateful Conduct PolicyClick here to view
Twitter@TwitterSafety (Twitter Account)Click here to view
TwitterHelp – Safety and Security – Sensitive ContentClick here to view
TwitterBusiness – Twitter Video ResourcesClick here to view
TwitterRules and Policies – Report ViolationsClick here to view
TwitterTeaching and Learning with Twitter Media and Information LiteracyClick here to view
WhatsAppHow to Use WhatsApp ResponsiblyClick here to view
WhatsAppSafety Tips and SecurityClick here to view
WhatsAppUnauthorized use of automated or bulk messaging on WhatsAppClick here to view
WhatsAppBlocking and Reporting ContactsClick here to view
WordPress.comReport AbuseClick here to view
WordPress.comUser GuidelinesClick here to view
WordPress.comTransparency ReportClick here to view
WordPress.comReport a SiteClick here to view
WordPress.comTerrorist Activity PolicyClick here to view
YouTubeCommunity GuidelinesClick here to view
YouTubeTransparency – Community Guidelines EnforcementClick here to view
YouTubeSafety ResourcesClick here to view
YouTubeSafety Resources – Suicide and Self-Injury PolicyClick here to view
YouTubeSafety Resources – Parent ResourcesClick here to view
YouTubeSafety Resources – Teen ResourcesClick here to view
YouTubeSafety Resources – Educator ResourcesClick here to view
YouTubePolicies – Violent extremist or criminal organizations policyClick here to view
YouTubeHate Speech PolicyClick here to view
YouTubeAdvertisingClick here to view
YouTubeCreators ResourcesClick here to view
YouTubeGoogle for Nonprofits – YouTube Nonprofit ProgramClick here to view
YouTubeSocial ImpactClick here to view
YouTubeHelp Center – Report Inappropriate ContentClick here to view
YouTubeHelp Center – Other Reporting OptionsClick here to view
YouTubeHelp Center – Report a YouTube search predictionClick here to view
YouTubeHelp Center – Trusted Flagger ProgramClick here to view
YouTubeHow YouTube prevents radicalizationClick here to view
YouTube/GoogleRequest Google Nonprofit AccountClick here to view
ZoomTerms of ServiceClick here to view
ZoomTrust CenterClick here to view
ZoomSecurity OverviewClick here to view
ZoomPrivacy PracticesClick here to view
ZoomComplianceClick here to view
ZoomTrust and Safety CenterClick here to view
ZoomPrivacy StatementClick here to view
ZoomTransparency ReportClick here to view
ZoomCommunity Standards Enforcement Transparency ReportClick here to view
ZoomAcceptable Use GuidelinesClick here to view
ZoomExpression, Safety and Process at ZoomClick here to view