Get started using the Tech Against Terrorism TCAP API. This document outlines how you can obtain an authentication token and use our API services.
GO TO
The Submissions API provides two endpoints for tech platforms to query our database and find out what contents our OSINT team have found on their platforms as well what alerts we have issued to them. Platforms can refine their queries to specify dates and specific terrorist groups.
The Hash Verification API provides platforms with an interface to check if any content uploaded by their users has already been identified as terrorist content by the TCAP. Platforms query the API with the hash strings of their media files from their own systems. In turn, they receive a response indicating if any of those files are, or are likely to be, terrorist content.
The URL Hash List API provides a robust solution for retrieving all MD5 URL hashes stored within the TCAP database. This powerful tool is designed to address the challenge of ensuring that no link to a specific piece of content is overlooked.
The Content Hash Fingerprinting API provides robust access to a comprehensive database of content fingerprints designed for advanced content moderation systems. The API leverages multiple hashing algorithms including MD5, SHA256, SHA512, and PDQ to ensure maximum coverage and accuracy in content identification.