In setting out the work program for the past 12 months, the group’s shared objective was to collaborate across industry, government, and civil society “to map content-sharing algorithms and processes used by industry that may facilitate consumption of content that may increase user interest in or amplify terrorist and violent extremist content and consider positive interventions and risk mitigation points.” This report focuses on the first part of that objective: To map content-sharing algorithms and processes used by industry. The potential role of content-sharing algorithms in radicalization and violent extremist recruitment continues to be an issue of focus. Yet there is little understanding about what those algorithms are and how they might be misused, contribute to radicalization, or be exploited by violent extremist groups and bad actors. This document is the first step in contributing to that understanding.