Get in Touch

    Follow us

    Tech Innovation

    GIFCT invests in the development and distribution of groundbreaking technological solutions to support member companies committed to preventing terrorist and violent extremists from exploiting their platforms while protecting human rights.

    Hash-sharing database

    In 2017, the founding members of GIFCT spearheaded a shared, safe and secure industry database of “perceptual hashes” of known images and videos- produced by terrorist entities on the United Nations designated terrorist groups lists- which GIFCT members had removed from their services.

    Hash-Sharing Database Taxonomy

    GIFCT originally established the hash-sharing database taxonomy in 2017 with content produced by individuals and entities on the United Nations Security Council’s Consolidated Sanctions List in order to find common ground amongst tech company members who often use slightly different operational definitions of “terrorism” and “terrorist content”. Following the terrorist attacks in Christchurch, New Zealand in March 2019 in which the perpetrator livestreamed his attack, GIFCT expanded the taxonomy in order to enable hash-sharing of content from such attacks where violent propaganda is produced and addressing producers of terrorist content that are not included on the United Nations Security Council’s Consolidated Sanctions List.

    At the beginning of 2021, GIFCT  launched a multi-stakeholder effort to engage a wide range of experts on expanding the reach and impact of our hash-sharing database’s taxonomy in order to respond to terrorist content online across the ideological spectrum. We believe that our work must be complementary and mutually-reinforced with human rights and fundamental freedoms, starting with the material we recognize as terrorist content online. This six-month project resulted in a compilation report from international experts that will help shape and inform our strategy for thoughtful, deliberate, and practical broadening of our taxonomy framework over time.