Policies that outline what is and isn't allowed on the Facebook app.
Policies that outline what is and isn't allowed on the Instagram app.
Policies for ad content and business assets.
Other policies that apply to Meta technologies.
How we update our policies, measure results, work with others, and more.
How we support communities in the face of the opioid epidemic.
How we help prevent interference, empower people to vote and more.
How we work with independent fact-checkers, and more, to identify and take action on misinformation.
How we assess content for newsworthiness.
How we reduce problematic content in News Feed.
How we build AI systems.
Comprehensive access to public data from Facebook and Instagram
Comprehensive and searchable database of all ads currently running across Meta technologies
Additional tools for in-depth research on Meta technologies and programs
Quarterly report on how well we're doing at enforcing our policies on the Facebook app and Instagram.
Report on how well we're helping people protect their intellectual property.
Report on government request for people's data.
Report on when we restrict content that's reported to us as violating local law.
Report on intentional internet restrictions that limit people's ability to access the internet.
Quarterly report on what people see on Facebook, including the content that receives the widest distribution during the quarter.
Download current and past regulatory reports for Facebook and Instagram.
Taking down coordinated adversarial networks to counter global threats and improve our defenses.
As the world becomes more interconnected, threat actors target people across the internet. Our goal is to detect and counter them, while constantly improving our defenses. Using what we call a Network Disruption approach, we take down each adversarial network of accounts and Pages as a whole, rather than removing them piecemeal. This makes it harder for malicious groups to come back and target people who use our apps.
Since 2017, we’ve reported takedowns of more than 200 covert influence operations, cyber espionage, mass reporting and brigading networks. We know bad actors are persistent, but so are we, and we’re staying vigilant to help protect people globally.
We know that no single company can solve various global threats alone. We share findings about threats we detect with our industry peers and security researchers to help our entire defender community better understand and counter internet-wide threats, like the ones below.
Coordinated efforts to manipulate public debate for a strategic goal, in which fake accounts are central to such covert influence operations.
Coordinated efforts to harass people in attempt to intimidate and silence them, often through repetitive direct messages or mass-commenting on their posts.
Covert efforts to target people to collect intelligence and/or compromise their devices and online accounts for a strategic goal.
Coordinated efforts to abuse our reporting systems to get accounts or content incorrectly taken down, typically with the intent of silencing people.
Meta’s public threat reports include security research into the takedowns of adversarial networks, threat indicators and other actions we’ve taken to counter malicious groups.
This list provides a deep dive into our work to detect and counter security threats on our platform, broken down by year. We will continue to update this list regularly as we publish new threat disruption reports.