·6 min read

How We Protect IHL Educational Content Online

Educational content for International Humanitarian Law faces unique threats online. Here's how we safeguard our training materials and why it matters for the integrity of IHL education.

Why Protecting IHL Educational Content Matters

International Humanitarian Law governs the conduct of armed conflict. It defines who is protected, what is permissible, and what constitutes a war crime. Teaching these principles accurately is not a matter of academic preference — it has real consequences for how military personnel, legal advisors, and humanitarian workers make decisions in the field.

At IHL Wargame, we build interactive tactical simulations that help universities, law schools, military academies, and NGOs teach IHL through practical scenario-based training. Our platform includes proprietary training scenarios, legal analysis frameworks, and educational exercises developed in collaboration with legal scholars and military professionals. This content represents years of specialized work.

As our platform has grown, so has the challenge of protecting it. Unauthorized copies of our training materials have appeared on course-sharing platforms, document repositories, and competitor sites. Some copies are verbatim reproductions. Others are modified versions — translated, reformatted, or stripped of citations and legal context.

The Problem with Unauthorized Copies

When training materials about the Geneva Conventions are copied and redistributed without quality control, the risks go beyond intellectual property loss. Consider what happens when an unauthorized copy of an IHL training scenario circulates without the legal analysis that accompanies it, or when a translated version introduces inaccuracies in the description of proportionality principles or distinction requirements.

In most fields, a degraded copy of educational content is merely inconvenient. In IHL education, it can lead to genuine misunderstanding of legal principles that govern life-and-death decisions. A military officer who trains with inaccurate IHL materials carries those misunderstandings into operational contexts where they matter most.

This is why we take content protection seriously — not as a commercial exercise, but as a responsibility to the educational mission itself.

The Limits of Manual Monitoring

We initially addressed the problem the way most organizations do: periodic manual searches. A team member would search for our content across a handful of platforms, document any infringements found, and file takedown requests.

This approach had predictable limitations. Our team could check a few platforms each week, but unauthorized copies were spreading across hundreds of sites in multiple languages and jurisdictions. Simple keyword searches missed copies where titles had been changed or content had been reformatted. And the time spent on enforcement was time not spent on developing new educational content.

The whack-a-mole dynamic was particularly frustrating: content we had successfully taken down would reappear days later under different accounts or on different platforms. Without continuous monitoring, we were always reacting rather than preventing.

Partnering with Brandog for Automated Protection

We use Brandog to monitor and protect our educational content across the web. Their platform deploys autonomous AI agents that handle the entire content protection lifecycle — from detection to enforcement — without requiring constant manual oversight.

The approach works in three stages:

  • Content fingerprinting: Brandog's agents create digital fingerprints of our proprietary content — not just text matching, but structural and visual patterns that persist even when content is modified, translated, or reformatted.
  • Continuous monitoring: Unlike periodic manual searches, the agents monitor platforms continuously, flagging new unauthorized copies within hours of publication rather than weeks or months after the fact.
  • Automated enforcement: For each confirmed infringement, the agents generate and submit takedown requests tailored to each platform's specific requirements, complete with evidence packages that meet platform standards.

The result is a significant reduction in the time between infringement and enforcement, a dramatic expansion of the platforms being monitored, and — most importantly — the ability for our team to focus on what we do best: building educational tools for IHL training.

You can read more about our experience in this case study on the Brandog blog.

Lessons for Educational Content Creators

Our experience protecting IHL educational content has reinforced several principles that we think apply broadly to anyone creating specialized training materials:

  • Valuable content will be copied. The question is not whether it will happen but how quickly you detect and respond to it. If your content has educational or commercial value, assume it is being copied.
  • Manual monitoring creates a false sense of security. Checking a few platforms periodically catches a fraction of actual infringement. The content you don't find is often more damaging than the content you do, because it circulates unchecked and may contain inaccuracies.
  • Automated detection changes the equation. Continuous monitoring with AI-powered detection transforms content protection from a reactive burden into a manageable background process. The technology exists to monitor at scale — the question is whether organizations choose to use it.
  • Content protection is mission protection. For organizations whose content serves an educational or humanitarian purpose, protecting that content is not just about revenue. It's about ensuring that learners receive accurate, complete, and current information.
Digital protection and monitoring visualization

Looking Ahead

As IHL Wargame continues to grow and our training materials reach more institutions worldwide, content protection will remain a core operational concern. The threat landscape evolves — new platforms emerge, infringement tactics become more sophisticated, and the volume of content to protect increases.

We're committed to ensuring that our educational content reaches learners in the form we intended — accurate, complete, and backed by the legal scholarship that makes IHL training meaningful. Partnering with AI-powered brand protection platforms like Brandog is a key part of that commitment.

Content protection is a challenge that spans industries. Jurisma, a legal tech platform serving Nordic law firms, faces similar challenges with brand impersonation and unauthorized use of their name — showing that digital threats affect organizations regardless of sector. Resources like the ICRC's IHL database remain critical public references, but proprietary training tools built on top of that knowledge deserve protection too.