Meta

Meta
Policies
Community StandardsMeta Advertising StandardsOther policiesHow Meta improvesAge-Appropriate Content

Features
Our approach to dangerous organizations and individualsOur approach to the opioid epidemicOur approach to electionsOur approach to misinformationOur approach to newsworthy contentOur approach to Facebook Feed rankingOur approach to explaining rankingAccessibility at Meta

Research tools
Content Library and Content Library APIAd Library ToolsOther research tools and data catalogue

Enforcement
Detecting violationsTaking action

Governance
Governance innovationOversight Board overviewHow to appeal to the Oversight BoardOversight Board casesOversight Board recommendationsCreating the Oversight BoardOversight Board: Further asked questionsMeta’s Bi-Annual Updates on the Oversight BoardTracking the Oversight Board's Impact

Security
Threat disruptionsSecurity threatsThreat reporting

Reports
Community Standards Enforcement ReportIntellectual PropertyGovernment Requests for User DataContent Restrictions Based on Local LawInternet DisruptionsWidely Viewed Content ReportRegulatory and Other Transparency Reports

Policies
Community Standards
Meta Advertising Standards
Other policies
How Meta improves
Age-Appropriate Content
Features
Our approach to dangerous organizations and individuals
Our approach to the opioid epidemic
Our approach to elections
Our approach to misinformation
Our approach to newsworthy content
Our approach to Facebook Feed ranking
Our approach to explaining ranking
Accessibility at Meta
Research tools
Content Library and Content Library API
Ad Library Tools
Other research tools and data catalogue
Enforcement
Detecting violations
Taking action
Governance
Governance innovation
Oversight Board overview
How to appeal to the Oversight Board
Oversight Board cases
Oversight Board recommendations
Creating the Oversight Board
Oversight Board: Further asked questions
Meta’s Bi-Annual Updates on the Oversight Board
Tracking the Oversight Board's Impact
Security
Threat disruptions
Security threats
Threat reporting
Reports
Community Standards Enforcement Report
Intellectual Property
Government Requests for User Data
Content Restrictions Based on Local Law
Internet Disruptions
Widely Viewed Content Report
Regulatory and Other Transparency Reports
Policies
Community Standards
Meta Advertising Standards
Other policies
How Meta improves
Age-Appropriate Content
Features
Our approach to dangerous organizations and individuals
Our approach to the opioid epidemic
Our approach to elections
Our approach to misinformation
Our approach to newsworthy content
Our approach to Facebook Feed ranking
Our approach to explaining ranking
Accessibility at Meta
Research tools
Content Library and Content Library API
Ad Library Tools
Other research tools and data catalogue
Security
Threat disruptions
Security threats
Threat reporting
Reports
Community Standards Enforcement Report
Intellectual Property
Government Requests for User Data
Content Restrictions Based on Local Law
Internet Disruptions
Widely Viewed Content Report
Regulatory and Other Transparency Reports
Enforcement
Detecting violations
Taking action
Governance
Governance innovation
Oversight Board overview
How to appeal to the Oversight Board
Oversight Board cases
Oversight Board recommendations
Creating the Oversight Board
Oversight Board: Further asked questions
Meta’s Bi-Annual Updates on the Oversight Board
Tracking the Oversight Board's Impact
Policies
Community Standards
Meta Advertising Standards
Other policies
How Meta improves
Age-Appropriate Content
Features
Our approach to dangerous organizations and individuals
Our approach to the opioid epidemic
Our approach to elections
Our approach to misinformation
Our approach to newsworthy content
Our approach to Facebook Feed ranking
Our approach to explaining ranking
Accessibility at Meta
Research tools
Content Library and Content Library API
Ad Library Tools
Other research tools and data catalogue
Enforcement
Detecting violations
Taking action
Governance
Governance innovation
Oversight Board overview
How to appeal to the Oversight Board
Oversight Board cases
Oversight Board recommendations
Creating the Oversight Board
Oversight Board: Further asked questions
Meta’s Bi-Annual Updates on the Oversight Board
Tracking the Oversight Board's Impact
Security
Threat disruptions
Security threats
Threat reporting
Reports
Community Standards Enforcement Report
Intellectual Property
Government Requests for User Data
Content Restrictions Based on Local Law
Internet Disruptions
Widely Viewed Content Report
Regulatory and Other Transparency Reports
English (US)
Privacy PolicyTerms of ServiceCookies
Home
Security

Security

Taking down coordinated adversarial networks to counter global threats and improve our defenses.
Security at Meta
As the world becomes more interconnected, threat actors target people across the internet. Our goal is to detect and counter them, while constantly improving our defenses. Using what we call a Network Disruption approach, we take down each adversarial network of accounts and Pages as a whole, rather than removing them piecemeal. This makes it harder for malicious groups to come back and target people who use our apps.
Since 2017, we’ve reported takedowns of more than 200 covert influence operations, cyber espionage, mass reporting and brigading networks. We know bad actors are persistent, but so are we, and we’re staying vigilant to help protect people globally.

Security threats
We know that no single company can solve various global threats alone. We share findings about threats we detect with our industry peers and security researchers to help our entire defender community better understand and counter internet-wide threats, like the ones below.
Meta security
COORDINATED INAUTHENTIC BEHAVIOR
Coordinated efforts to manipulate public debate for a strategic goal, in which fake accounts are central to such covert influence operations.
Meta security
BRIGADING
Coordinated efforts to harass people in attempt to intimidate and silence them, often through repetitive direct messages or mass-commenting on their posts.
Meta security
CYBER ESPIONAGE
Covert efforts to target people to collect intelligence and/or compromise their devices and online accounts for a strategic goal.
Meta security
MASS REPORTING
Coordinated efforts to abuse our reporting systems to get accounts or content incorrectly taken down, typically with the intent of silencing people.

Learn more about Meta’s threat disruptions
Meta’s public threat reports include security research into the takedowns of adversarial networks, threat indicators and other actions we’ve taken to counter malicious groups.
META'S THREAT DISRUPTIONS
This list provides a deep dive into our work to detect and counter security threats on our platform, broken down by year. We will continue to update this list regularly as we publish new threat disruption reports.
Timeline
Meta
Transparency Center
Policies
Enforcement
Security
Features
Governance
Research tools
Reports
English (US)