GIFCT invests in the development and distribution of groundbreaking technological solutions to support member companies committed to preventing terrorist and violent extremists from exploiting their platforms while protecting human rights.
Hash-Sharing Consortium
In 2016, the founding member companies of GIFCT (Facebook, Microsoft, Twitter, and YouTube), created a shared industry database of “hashes” — unique digital “fingerprints” — of known violent terrorist imagery or terrorist recruitment videos that had been removed from their services.
How does it work?
An image or video is “hashed” in its raw form and is not linked to any original platform or user data. Hashes appear as a numerical representation of the original content and cannot be reverse-engineered to recreate the image and/or video. A platform needs to find a match with a given hash on their platform in order to see what the hash corresponds with.
Content Incident Protocol
The Global Internet Forum to Counter Terrorism’s (GIFCT) Content Incident Protocol (CIP) is a process by which GIFCT member companies become aware of, quickly assess, and act on potential content circulating online resulting from a real-world terrorism or violent extremist event. The CIP was created in April 2019 and announced in July 2019 in response to the tragedy in Christchurch.
How does it work?
No one individual or organization can activate a content incident. Rather, the protocol is based on the existence of content online relating to the real-world terrorism or violent extremism event—like Christchurch and Halle—and potential distribution of that content, including a live stream of murder or attempted murder produced by the attack’s perpetrator or an accomplice.
By declaring a CIP, all hashes of an attacker’s video and other related content is shared in the GIFCT hash database with other GIFCT member platforms. Furthermore, a continuous stream of communication is established among all GIFCT founding members to identify and address risks and needs during an active CIP.
URL Sharing
Terrorist content is increasingly shared on one platform with a link to content hosted on another platform. Companies only have jurisdiction to remove the primary source content from what is hosted on their services, meaning they can remove a post, but the source link and hosted content remains intact on the third party platform. Inspired by Twitter’s effort to share URLs with platforms that were linked to and from Twitter posts associated with terrorist content, GIFCT began a program in January 2019 to implement a link-sharing system of its own.