The objective of the GIFCT has always been to substantially disrupt terrorists’ ability to promote terrorism, disseminate violent extremist propaganda, and exploit or glorify real-world acts of violence on our services. We do this by joining forces with counterterrorism experts in government, civil society and the wider industry around the world. Our work centers around three, interrelated strategies:
Today, building on the commitments we made as part of the Christchurch Call to Action, we are adding a fourth pillar to our work that will focus on crisis response. Specifically, we are introducing joint content incident protocols for responding to emerging or active events, such as the horrific terrorist attack in Christchurch, so that relevant information can be quickly and efficiently shared, processed and acted upon by all member companies. We are also releasing our first GIFCT Transparency Report and a new counterspeech campaign toolkit that will help activists and civil society organizations challenge the voices of extremism online.
And as we head into our third year as GIFCT, we are pleased to welcome Pinterest and Dropbox as members. We will continue to add new members, particularly smaller companies, that could benefit from the collective experience of GIFCT members.
When terrorists misuse the internet, they often upload the same piece of content to multiple platforms to maximize their reach. To disrupt this behavior, we jointly developed a shared industry database of “hashes” — or digital fingerprints — that allows us to safely share known terrorist images and video propaganda with partner companies. This enables us to more quickly identify and take action against potential terrorist content on our respective platforms.
The shared database predates the creation of GIFCT, but over the last couple years, we have significantly increased the volume of hashes within the database. In 2018, for example, we set and achieved our goal of reaching 100,000 unique hashes. And in the first six months of this year, we’ve already doubled that number, and we now have more than 200,000 unique hashes in the database.
As we take steps to deliver on the four collaborative actions set forth in the Christchurch Call to Action, we’re expanding the shared industry database so that it extends beyond photos and videos to include URLs that lead to known terrorist and violent extremist content online.
We have heard, loud and clear, from government and civil society that we need to be more transparent about what we are working on as an industry. As a result, today we are releasing our first-ever GIFCT Transparency Report. The report goes into detail about the GIFCT’s primary work streams, providing greater insight into how the Hash Sharing Consortium has defined terrorist content, and the volume and types of content included in the database. The full transparency report, which is available here, will complement the transparency reports put out by individual GIFCT member companies.
When we committed to the Christchurch Call to Action and issued a nine-point plan outlining concrete steps we plan to take as an industry, we said, “We come together, resolute in our commitment to ensure we are doing all we can to fight the hatred and extremism that lead to terrorist violence.” Never has that commitment been more important. As industry partners, we continue to prioritize and deepen engagement with governments, civil society and smaller tech companies around the world.
In partnership with Tech Against Terrorism, we’ve held 11 workshops in nine countries on four continents. We’ve met with 120 different tech and innovation platforms, and we have provided funding to secure Jihadology.net to make sure that researchers studying terrorism can still access primary research material while ensuring that terrorists and people vulnerable to recruitment cannot.
Today, we are also rolling out a cross-platform counter-violent extremist toolkit that we jointly developed with the Institute for Strategic Dialogue. The toolkit will assist civil society organizations in developing online campaigns to challenge extremist ideologies, while prioritizing their safety. We know that the technology industry isn’t the best or most appropriate messenger when it comes to pushing back on violent extremists, which is why it’s so important to support civil society organizations that have the credibility and knowledge to combat, respond and counter the promotion of violent extremism online.
Perhaps most importantly, today we are adding a fourth pillar to the GIFCT’s core mission: enabling and empowering companies to respond to crises like Christchurch. The horrific terrorist attack highlighted the importance of close communication between members, and between government and the wider industry, which is why we are introducing joint content incident protocols to enable and empower companies to more quickly and effectively respond to emerging and active events.
The protocol, which can be triggered by a real-world event involving murder or attempted murder of defenseless civilians or innocents, outlines steps that tech companies can take to respond quickly to an attack. Based on the joint protocols, we will work together to categorize the type of incident and the anticipated level and degree of online impact. We will also set up formal channels of communication so we can share intelligence and content with non-GIFCT companies and other stakeholders, as needed.
Terrorism and violent extremism are complex problems that require a joint response from industry, governments and wider society. We believe that by working together, sharing the best technological and operational elements of our individual efforts, we can have a significantly greater impact on the threat of terrorist content online than we can alone.
We are grateful for the support of and collaboration with governments, international organizations and NGOs around the world, including the EU Internet Forum and the UN Counter Terrorism Executive Directorate. We look forward to sharing more updates in the coming months.
— The Global Internet Forum to Counter Terrorism
San Francisco is on the cusp of banning e-cigarettes while a Florida town is now half a million dollars poorer following a ransomware attack. Google's building 20,000 new Silicon Valley homes (since California won't) and a new predictive hotel app ca…
Engadget RSS Feed
The most straightforward way to keep track of your baby's data is the trusty spreadsheet. We recommend Google Sheets, since you can easily share it with your partner, and it has most of the features you'd want from a proper spreadsheet application. W…
Engadget RSS Feed
Android Wear 2.0 was supposed to revitalize and kick off the wearable platform thanks to a plethora of new features and partnerships. Alright, well, we all know that didn’t happen, but Google’s still bringing in new features to hopefully spark something. The latest is version 2.6, and it’s got a few useful tricks up its […]
Come comment on this article: Android Wear v2.6 brings recent apps, download progress indicators, and more
If you are pregnant and looking to find videos, reading material, or connections with other families who are also expecting, we’ve rounded up a slew of apps that will allow you to do so.
The post Track the progress of your burgeoning baby with these pregnancy apps appeared first on Digital Trends.
The Hyperloop, Elon Musk’s intriguing idea for a transportation system, could revolutionize mass transit as we know it. But questions about its financial and political feasibility loom large.
The post As Hyperloop progress glides forward, here’s what you need to know appeared first on Digital Trends.
Google has released its latest diversity report, showing slow progress, but progress nonetheless. Google is quick to highlight that these numbers do not reflect where the company wants to be.
The post Google’s latest diversity report shows very slow progress appeared first on Digital Trends.