T&S #1: A Case of Spam in UGVC

Published: 2025 June 12
Disclaimer: The following is an educational analysis based on the author's interpretation of publicly available data using the framework outlined in this post. It constitutes the author's opinion and is not a definitive assertion of fact.

The Significance of UGVC Platforms

We value two primary things: {social connections} and {entertainment & education}. With mobile advances, user generated video content (UGVC) platforms offer unified experiences bringing these together into a single, accessible moment.

3
Leading Platforms (YT, IG, TikTok)
>1B
Users each (EOY 2024)

As of the end of 2024, each platform has over 1 billion users and over 25 billion USD in advertising revenue.

Attractiveness for Bad Actors

These delightful experiences also invite spammers, scammers, and fraudsters due to three platform properties:

  1. Concentration: High density of personally sensitive information.
  2. Scale: Massively scaled ecosystem of billions of activities.
  3. Value: High-value ecosystem driven by advertising revenue.

The existence of these actors poses a threat to the north-star where “content becomes community”.

Deterrence Methods

To deter undesirable behaviors, platforms define policies and enforce them through computer-program-driven (e.g., classifiers) and people-driven (e.g., investigations) approaches. These guidelines define what is allowable regarding content, interactions, and author properties.

A Basis for Spam Identification

Spam typically presents characteristics of being Inauthentic, Deceptive, Repetitive, and Promotional. To raise confidence in identification, we apply a UGVC spam evaluation framework assessing Content, Interactions/Activities, and Account properties.

  • Inauthentic: Coordinated behaviors.
  • Deceptive: Redirection tactics.
  • Repetitive: High-frequency posting.
  • Promotional: Outbound link farming.

An Example Walkthrough

Let's assume we are using platform U, come upon a post P by author A, and find two very similar looking threads CT1 and CT2. We apply the framework to Comment #1 in CT1:

Framework Dimension Dimension Consideration Evaluation Outcome
Content Does the topic divert from the content topic? Yes, diversion from world economics to personal finances.
Does it direct users elsewhere (links/off-platform)? No
Interactions Does it present duplicated text from same/different author? Yes, CT1 and CT2 reveal identical first comments.
Does it have unusually high engagement? Yes, compared to surrounding legitimate comments.
Does it direct users to other content via replies? Yes, mentions a <named individual>'s website.
Account Does username or profile look suspicious/similar? Unknown (further investigation needed)
Recent account creation timestamp? No
Does profile picture have external matches? No
CT1
Thread Analysis: Pattern identification
Conclusion: Detected threads exhibit multiple characteristics commonly associated with coordinated spam behavior.
What Comes Next?

After walking through an application of the framework, one may wonder "Why are there 'so many' uncaught cases?". Moving forward, we will explore:

  • T&S #2: A Rationale for Uncaught Spam in UGVC
  • T&S #3: A Person-driven Evaluation Framework
  • T&S #4-#7: Computer-driven frameworks, Open Source projects, and Industry Overviews.

Disclosures & Footnotes:
  1. Worked in Trust & Safety (7 years).
  2. Handphone, cellphone, smartphone, tablet and other comparable devices.
  3. Revenue estimates based on eMarketer data (EOY 2024).
  4. Community guidelines (P1) and private enforcement docs (P2) often differ in granularity.
  5. “So many” is a subjective term; one case can satisfy the threshold for some analysts.