Get in Touch

    Follow us

    Resource Guide

    Introduction & How to Use This Document

    This document serves as a guide for civil society groups, academic researchers, governments, and other tech companies wanting to know more about the resources and information that GIFCT member companies make available about their efforts to counter terrorist and violent extremist activity and tools developed to combat forms of online radicalization.

    In each section we have linked directly to resources on each topic developed by GIFCT member companies as well as resources from GIFCT and its partners at the Global Network on Technology and Extremism (GNET) and Tech Against Terrorism.

    Community Standards

    Most platforms require users to agree to set terms of service before accessing a platform’s tools. While terms of service give legal parameters for usage, content standards explain in a less legally formatted way what is and is not allowed to be shared on a given tech platform. These guidelines are put in place to ensure users can use the platforms freely and safely, while understanding where they might cross the line and have content removed or engagement on the platform restricted. These guidelines are generally global. Most companies design, review and update these standards based on feedback from a range of stakeholders that might include their users, government bodies, and global experts in fields such as technology, public safety and human rights. GIFCT members enforce their own respective policies and conduct their own practices in response to violations of their terms of service or standards such as content removal and account disabling.

    Transparency

    In addition to explicit platform policies that prohibit terrorist and violent extremist content or activities, every GIFCT member is required to publish, at a minimum, an annual transparency report that reviews elements of how standards are upheld and enforced. Though exact format and content presentation vary from company to company, these reports tend to provide data on basics around government data request processing and wider removal compliance. As a company has more resources and ability to build out more nuanced metrics within a transparency report, these reports might also include data on the appearance and removal of specific types of violating content and the amount of content on which the platform took action. In the most advanced examples of transparency reporting to date these reports sometimes include rates of appeals to report on false/positive removal rates, and even the prevalence of violating content on the platform over time.

    Safety Hubs

    Often, activists, academics, journalists, and practitioners in the counterterrorism and counter-extremism space have to find ways to mitigate the risks to their personal safety online more than an average user. By using online platforms to research or challenge hate-based extremism and terrorism, an individual can often put themselves or the sensitive communities they engage with online at risk. Safety concerns also tend to arise for many activists and NGOs who often have public facing interactions with different communities and as a result tend to face several risks online. Platforms’ safety guidelines and resources are, therefore, increasingly important to ensure that users know how to flag abuse, manage privacy settings, and report things such as potentially hacked accounts or nefarious activities of dangerous organizations.

    Reporting Mechanisms

    Related to broader safety concerns, another GIFCT membership requirement states that all members must have a functional way to “receive and act on reports of illegal activity or activity violating terms of service.” While members approach this in a variety of ways, all member companies provide public resources and tools to assist users in reporting illegal and prohibited activity and content.

    At the very least a publicly available email address or direct contact portal is available, by which users may contact the company and report content or activity in violation of the platform’s guidelines. Mailchimp, MEGA, and WhatsApp all provide basic outreach portals of this. For companies like MEGA and WhatsApp, which feature end-to-end encryption, this is the most efficient way to report abuse because the company does not otherwise have access to the content and activity of users. JustPaste.It users can directly email the platform at support@justpaste.it – instructions for properly submitting information about violating content can be found here.

    Counterspeech and Counter-Narrative Facilitation

    While safety tools allow users to flag harm and on-platform violations that lead to possible removal of content, we also know that removal alone will never solve for the root causes of radicalization and hate-based extremism. Larger social media platforms have realized that their platforms also house crucial tools for activists and practitioners to develop content and online activities for prevention purposes. Some GIFCT members have developed tools that can optimize community-level voices that challenge hate speech and extremism. Supporting counterspeech and counter-narrative efforts emerges out of a recognition that deplatforming and removing content only addresses symptoms of radicalization, rather than causes.

    Digital Literacy

    While counterspeech and counter-narrative campaigns and initiatives look to disrupt a cycle or pathway of hate-based radicalization, many practitioners and researchers have highlighted that preventing violent extremism needs to start with better comprehensive digital literacy for online audiences (young and old). Digital Literacy is a broad term that refers to a range of skills and information that allow individuals and organizations to safely and effectively operate in digital environments by questioning online information and having the tools to discern opinion from fact. While some of the material shared here is targeted at younger people, it is equally useful to those unfamiliar with operating on digital platforms and those who wish to engage younger audiences (activists, NGOs, teachers) by providing the basics in clear, straightforward language that can be easily communicated to others.

    Advertising and Marketing

    Some GIFCT member companies offer advertising and marketing tools for their users based on how they function and monetize as a platform. While these tools are often developed for more traditional commerce and marketplace use cases, we also know that these tools can be optimized by activists, NGOs and practitioners to better launch their messaging to target audiences and further counterspeech goals. Some companies have advertising and marketing tools to ensure that a range of organizations and/or activist’s campaigns and voices reach the relevant target audiences and can be effectively measured.

    Appendix A: GIFCT Membership Criteria and Benefits

    Membership Criteria

    GIFCT member companies are listed on our website here. In order to join GIFCT, companies must meet the following requirements:

    • Content standards that explicitly prohibit the promotion of terrorism in their terms of service, community guidelines, or other publicly available content policies
    • The ability to receive and act on reports of illegal activity or activity violating terms of service
    • A desire to explore new technical solutions to content and conduct challenges
    • Regular, public data transparency
    • A public commitment to respecting human rights, particularly free expression and privacy, when implementing content removal policies
    • Support for expanding the capacity of civil society organizations to challenge violent extremism

    If a company looking to join the GIFCT does not meet certain requirements, GIFCT offers that company mentorship through our partnership with Tech Against Terrorism.

    Membership Benefits

    • Potential access to GIFCT’s hash-sharing database and URL sharing program
    • Participation in crisis response communications around international terrorist and violent extremist events with online implications
    • Briefings from scholars associated with the Global Network on Extremism and Technology (GNET), the academic research arm of GIFCT
    • Briefings on technological approaches and solutions
    • Priority participation in topical workshops, e-learnings and webinars with global experts

    Contact: for any questions contact us at outreach@gifct.org.

    Sign up to receive email updates from the Global Internet Forum to Counter Terrorism

    Appendix B

    GIFCT and Partner Resources Index

     

    PartnerWebpage TitleLink
    GIFCTMembership PillarsClick here to view
    GIFCTTransparencyClick here to view
    GIFCTWorking GroupsClick here to view
    GIFCTNews Page and Newsletter SubscriptionClick here to view
    GIFCTCampaign ToolkitClick here to view
    GIFCTDigital Security ChecklistClick here to view
    GIFCTEmail UpdatesClick here to view
    TATMentorshipClick here to view
    TATWorkshops and EventsClick here to view
    TATKnowledge Sharing Platform (KSP)Click here to view
    GNETHomepage: Insights and ReportsClick here to view

    Member Resources Index

     

    MemberWebpage TitleLink
    AirbnbCommunity StandardsClick here to view
    AirbnbTransparencyClick here to view
    AirbnbSafety and accessibilityClick here to view
    AirbnbNeighborhood SupportClick here to view
    AirbnbTrust and SafetyClick here to view
    AirbnbHost Resource CenterClick here to view
    AirbnbHow do I report a message or block someone on Airbnb?Click here to view
    AirbnbHow do I report discrimination to Airbnb?Click here to view
    AmazonCommunity GuidelinesClick here to view
    AmazonSecurity and Privacy – Law Enforcement Information RequestsClick here to view
    AmazonSecurity and PrivacyClick here to view
    DiscordCommunity GuidelinesClick here to view
    DiscordTransparency ReportClick here to view
    DiscordSafety CenterClick here to view
    DiscordSafety – Parents and EducatorsClick here to view
    DiscordTrust and Safety – How to Properly Report Issues to Trust and SafetyClick here to view
    DropboxAcceptable Use PolicyClick here to view
    DropboxTransparency OverviewClick here to view
    DropboxSecurity and Privacy – Report Abuse on DropboxClick here to view
    DropboxBlog, 2019: Protecting our users and society: guarding against terrorist contentClick here to view
    FacebookCommunity StandardsClick here to view
    FacebookTransparency ReportClick here to view
    FacebookDigital Literacy LibraryClick here to view
    FacebookCommunity Standards – Dangerous Individuals and OrganizationsClick here to view
    FacebookCombating Hate and Extremism (FB News, 2019)Click here to view
    FacebookWhat Are We Doing to Stay Ahead of Terrorists? (FB News, 2018)Click here to view
    FacebookBusinessClick here to view
    FacebookFacebook CounterspeechClick here to view
    FacebookSocial ImpactClick here to view
    FacebookSafety CenterClick here to view
    FacebookSafety Center – Law EnforcementClick here to view
    FacebookSafety Center – Parents PortalClick here to view
    FacebookSafety Center – Empowering YouthClick here to view
    FacebookSafety Advisory BoardClick here to view
    FacebookPolicies and Reporting – How to Report ThingsClick here to view
    InstagramCommunity GuidelinesClick here to view
    InstagramCommunity Guidelines FAQs (Instagram Blog, 2018)Click here to view
    InstagramTransparency ReportClick here to view
    InstagramHelp Center – Report SomethingClick here to view
    InstagramCommunityClick here to view
    JustPaste.itTerms of ServiceClick here to view
    JustPaste.itTransparency ReportClick here to view
    JustPaste.itAbuse ReportingClick here to view
    LinkedInProfessional Community PoliciesClick here to view
    LinkedInTransparencyClick here to view
    LinkedInReport Inappropriate Content, Messages, or Safety ConcernsClick here to view
    LinkedInSafety Center – Identifying AbuseClick here to view
    LinkedInSafety Center – Staying SafeClick here to view
    MailchimpAcceptable Use PolicyClick here to view
    MailchimpTransparency ReportsClick here to view
    MailchimpAbuse DeskClick here to view
    MEGATerms of ServiceClick here to view
    MEGATransparency Report 2020Click here to view
    MEGAContact Us – Report Objectionable MaterialClick here to view
    MEGATakedown GuidanceClick here to view
    MicrosoftCommunity Code of ConductClick here to view
    MicrosoftReport Hate Speech Content Posted to a Microsoft Hosted Consumer ServiceClick here to view
    MicrosoftCorporate Social Responsibility – Reports HubClick here to view
    MicrosoftDigital LiteracyClick here to view
    MicrosoftReport Terrorist Content Posted to a Microsoft Consumer ServiceClick here to view
    MicrosoftRegister with Microsoft NonprofitsClick here to view
    MicrosoftAdvertisingClick here to view
    MicrosoftAbout Microsoft AdvertisingClick here to view
    MicrosoftAI For GoodClick here to view
    MicrosoftPartner Network – Sales and MarketingClick here to view
    MicrosoftOnline SafetyClick here to view
    MicrosoftOnline Safety – Resources and ResearchClick here to view
    MicrosoftSecurityClick here to view
    MicrosoftReport a Concern to BingClick here to view
    MicrosoftAdvertising Learning LabClick here to view
    MicrosoftMicrosoft partners with Institute for Strategic Dialogue and NGOs to discourage online radicalization to violence (blog post, Microsoft on the Issues)Click here to view
    MicrosoftCorporate Citizenship – Support for NGOsClick here to view
    MicrosoftAdvertising Training CoursesClick here to view
    MicrosoftAdvertising – Ad products: Solutions for online advertisingClick here to view
    MicrosoftOnline Safety – Promoting Digital CivilityClick here to view
    MicrosoftRequest to Reinstate Disabled ContentClick here to view
    PinterestCommunity GuidelinesClick here to view
    PinterestTransparency ReportClick here to view
    PinterestHelp Center – Safety – Report Something on PinterestClick here to view
    PinterestHelp Center – Safety – Get More Help – Report a Policy ViolationClick here to view
    TumblrCommunity GuidelinesClick here to view
    TumblrTransparency ReportClick here to view
    TumblrReport Offensive ContentClick here to view
    TumblrReport AbuseClick here to view
    TumblrReport Suspected Terrorism ContentClick here to view
    TwitterThe Twitter RulesClick here to view
    TwitterNGO HandbookClick here to view
    TwitterTransparencyClick here to view
    TwitterSafety and SecurityClick here to view
    TwitterTrust and Safety CouncilClick here to view
    TwitterBrand SafetyClick here to view
    TwitterViolent Organizations PolicyClick here to view
    TwitterHow Twitter Ads WorkClick here to view
    TwitterAdvertising – TargetingClick here to view
    TwitterAdvertising – Campaign TypesClick here to view
    TwitterAnalyticsClick here to view
    TwitterBusiness Resources and GuidesClick here to view
    TwitterCorporate PhilanthropyClick here to view
    TwitterHateful Conduct PolicyClick here to view
    TwitterQ&A: The marketing team behind @SimonBooks shares tips on creating impactful organic and paid content (Blog Post, Twitter Business)Click here to view
    Twitter@TwitterSafety (Twitter Account)Click here to view
    TwitterHelp – Safety and Security – Sensitive ContentClick here to view
    TwitterBusiness – Twitter Video ResourcesClick here to view
    TwitterRules and Policies – Report ViolationsClick here to view
    TwitterTeaching and Learning with Twitter Media and Information LiteracyClick here to view
    WhatsAppHow to Use WhatsApp ResponsiblyClick here to view
    WhatsAppSafety TipsClick here to view
    WhatsAppSecurityClick here to view
    WhatsAppWhite Paper – How WhatsApp Fights Bulk Messaging and Automated BehaviorClick here to view
    WhatsAppHelp Center – Advanced Safety and Security Features – Report Issues to WhatsAppClick here to view
    WordPress.comCommunity GuidelinesClick here to view
    WordPress.comTransparency ReportClick here to view
    WordPress.comReport a SiteClick here to view
    WordPress.comReport Content to WordPress.com StaffClick here to view
    WordPress.comTerrorist Activity PolicyClick here to view
    YouTubeCommunity GuidelinesClick here to view
    YouTubeTransparency – Community Guidelines EnforcementClick here to view
    YouTubeSafety ResourcesClick here to view
    YouTubeSafety Resources – Suicide and Self-Injury PolicyClick here to view
    YouTubeSafety Resources – Parent ResourcesClick here to view
    YouTubeSafety Resources – Teen ResourcesClick here to view
    YouTubeSafety Resources – Educator ResourcesClick here to view
    YouTubePolicies – Violent Criminal OrganizationsClick here to view
    YouTubeHelp – Hate Speech PolicyClick here to view
    YouTubeAdvertisingClick here to view
    YouTubeCreators for ChangeClick here to view
    YouTubeGoogle for Nonprofits – YouTube Nonprofit ProgramClick here to view
    YouTubeSocial ImpactClick here to view
    YouTubeHelp Center – Report Inappropriate ContentClick here to view
    YouTubeHelp Center – Other Reporting OptionsClick here to view
    YouTubeHelp Center – Report a YouTube search predictionClick here to view
    YouTubeHelp Center – Trusted Flagger ProgramClick here to view
    YouTubeEver wonder how YouTube works?Click here to view
    YouTube/GoogleRequest Google Nonprofit AccountClick here to view