As mentioned in our baseline report, a key part of our strategy to prevent interference is working with government authorities, law enforcement, security experts, civil society and other tech companies to
stop emerging threats by establishing a direct line of communication, sharing knowledge and identifying opportunities for collaboration.
In December 2024 and February 2025, we shared our Quarterly Adversarial Threat reports (
Q3 2024 and
Q4 2024) with information on threat research into new covert influence operations that we took down. We detected and removed these campaigns before they were able to build authentic audiences on our apps.
Global enforcements: Russia remains the number one source of global CIB networks we’ve disrupted to date since 2017, with 39 covert influence operations. The next most frequent sources of foreign interference are Iran, with 31 CIB networks, and China, with 12. This year, our teams have taken down around 20 new covert influence operations around the world, including in the Middle East, Asia, Europe and the US.
Moldova:
We removed 7 Facebook accounts, 23 Pages, one Group and 20 accounts on Instagram for violating our policy against coordinated inauthentic behavior. This network originated primarily in the Transnistria region of Moldova, and targeted Russian-speaking audiences in Moldova.
They posted original content, including cartoons, about news and geopolitical events concerning Moldova. It included criticism of President Sandu, pro-EU politicians, and close ties between Moldova and Romania.
We removed this campaign before they were able to build authentic audiences on our apps.
Benin:
We removed 16 Facebook accounts and 6 Pages for violating our coordinated inauthentic behavior policy. This network originated in Benin, and targeted primarily France.
First, the people behind this operation created Pages which posed as French and posted about politics in France, but were run by authentic users in Benin. We quickly took down this activity on our apps. In response to enforcement, they changed tactics. Instead of using authentic accounts, the operators created a network of fake and compromised accounts, and used TOR and proxy IP infrastructure to conceal their origin and appear to be in France. Our automated systems and expert investigators continued to detect and take them down on a rolling basis.
This effort targeted primarily France with posts in French about news and politics, including criticism of President Macron and NATO; supportive commentary about Marine Le Pen and her party; and calls for reduced support for Ukraine.
Our quarterly reports also included further updates and analysis on Doppelganger.