Ikea’s new Matter-over-Thread products were supposed to prove that the smart home could be cheap, accessible, and reliable. The highly anticipated line — which includes sensors, remotes, smart plugs, air-quality monitors, and smart bulbs — has most everything you need to build a smart home, with prices starting at $6. It’s an exciting idea, but it’s still not ready for primetime.
Technology
Protect your data before holiday shopping scams strike
NEWYou can now listen to Fox News articles!
The holiday season is the happiest and riskiest time of year to be online. As millions of us gear up for Black Friday and Cyber Monday deals, scammers do the same.
Every year, they target holiday shoppers with fake websites, “too-good-to-be-true” deals and scam emails that look identical to legitimate retailers. But here’s the part most people miss: scammers don’t just rely on luck. They already have your personal data before you even click “add to cart.”
From leaked email addresses to exposed phone numbers and home addresses, your personal information is being bought and sold by data brokers, companies that collect and resell detailed profiles about you. Those profiles are exactly what scammers use to send realistic “order confirmations,” fake delivery alerts and “urgent payment” texts during this holiday period and beyond.
Let’s unpack how this works and what you can do now to stay safe before the holiday chaos begins.
RETIREES LOSE MILLIONS TO FAKE HOLIDAY CHARITIES AS SCAMMERS EXPLOIT SEASONAL GENEROSITY
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Scammers ramp up fake websites and emails during the holiday shopping rush. (iStock)
Why scammers love the holiday season
November through December is a goldmine for cybercriminals. According to the CISA, reports of online shopping scams spike during this time of year and vary in their approaches. The reason? We let our guard down when we’re rushed, distracted or excited by a deal. Staying alert during the holiday season can help you avoid data exposure and financial losses. Here are some of the most common scams you should be aware of.
Phantom stores
The surge of promotions during the holiday season is the perfect time for “phantom stores” to thrive. It’s a fraudulent store that mimics the interface and products of a well-known brand. Once you purchase from such a website, you’ll never receive your order as the store doesn’t actually exist.
Real-world example: Fake IKEA websites appeared with URLs spelled “ikeaa-sale.com” and “ikea-blackfriday.shop,” mimicking the official ikea.com interface with copied product images, logos and discount banners.
They lured shoppers with huge discounts and clearance offers to steal credit card data. Eventually, they were reported and taken down, but the damage has been done.
What to do? Always check the URL of the store you shop at and only click links from the store’s official website or social media.
Delivery scams
According to recent research, some of the most popular shopping apps are selling your location data to third parties. It’s no surprise that you might receive fake delivery texts.
Your leaked data fuels realistic “order” and “delivery” scams online. (iStock)
MAJOR COMPANIES, INCLUDING GOOGLE AND DIOR, HIT BY MASSIVE SALESFORCE DATA BREACH
Real-world example: Temu is a popular app for scammers to mimic. They can easily find your contact information and order details to text “Your order couldn’t be delivered.” Each text contains a phishing link that can install malware on your device or steal your personal information.
What to do? Make sure the texts you receive come from a legit courier service and double-check it on the store’s website.
Fake order emails
Some scammers use sophisticated phishing tactics to lure victims. They engineer emails from well-known brands, use an urgent tone, place malicious links and urge you to click on your order status. In reality, there is no order status – they’re stealing your data.
Real-world example: Amazon is one of the biggest online retailers worldwide, and that makes the brand easy to mimic. Scammers send emails on behalf of Amazon to try to steal customers’ personal data because it’s highly likely that their victims have used Amazon, making it less suspicious. However, phishing emails have some telltale signs you can look out for.
What to do? Never click on any suspicious links and always check the sender’s contact information.
Unwanted data exposure
When you shop online, you should be aware of the data you share, including your contact information, shopping habits, credit card details and more. All stores collect some type of data about you. However, some companies collect more than you think.
Real-world example: The infamous Target controversy in 2012 revealed how big retailers use data analysis to predict your shopping behavior. The company collected shopping data and managed to produce a predictive model for soon-to-be mothers.
They sent out brochures with baby clothes, vouchers for baby formula and more before the customers even knew they were pregnant. Thankfully, modern shopping looks a bit different. You can opt out of certain data collection and exercise your right to remove personal information from websites that collect it.
What to do? Check what data the stores collect about you and request the removal of any private information you don’t want them to have.
THE TRUTH BEHIND THOSE MYSTERIOUS SHIPMENT EMAILS IN YOUR INBOX
How scammers find you
Imagine you’re browsing for gifts online. Within minutes, your activity generates data points – device info, IP address, browsing habits that feed into online databases. At the same time, data brokers already have your full profile: age, income, address history, family members and even shopping behavior. These profiles are sold to marketers and often leak into criminal databases.
That’s why scam calls, texts and emails often feel so “real.” They use your name, the right retailer, even your city. They’re not guessing. They’ve bought your digital footprint.
The “holiday cleanup” your data needs
Most people clear their browser cookies or delete old emails to “stay private.” But that’s like locking your front door while leaving all your personal documents on the lawn.
If you want to stop scammers from targeting you this holiday season, you need to remove your personal data from the source, the data broker databases that feed these scams.
That’s where a data removal service comes in. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.
Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.
Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.
Practical steps before you shop
To make sure your online shopping season stays stress-free and scam-free, here’s what CyberGuy recommends doing this week:
INSIDE A SCAMMER’S DAY AND HOW THEY TARGET YOU
1) Run a privacy scan with a data removal service
Before the holiday rush, remove your exposed data from data brokers. You’ll reduce the number of scam calls, emails and texts you get this season and protect your financial info before it’s too late.
Take control by removing personal data from broker databases before you shop. (iStock)
2) Secure your email
Use strong, unique passwords for each online store or service. Consider a password manager to simplify this.
Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.
Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.
3) Check for fake stores
Before clicking a social media ad or email, hover over the link. Legit retailers use secure “https://” URLs and their exact brand name – no extra words or letters.
4) Avoid public Wi-Fi
Don’t shop or enter payment info over public Wi-Fi in an airport, café or mall, for example. Scammers can easily intercept unencrypted traffic.
5) Use credit cards or PayPal – not debit cards
HACKERS TARGET ONLINE STORES WITH NEW ATTACK
Credit cards have stronger fraud protection and make it easier to dispute unauthorized charges.
6) Enable two-factor authentication (2FA)
Turn on 2FA for your email, bank and shopping accounts. Even if scammers get your password, they can’t log in without your second verification step.
7) Keep your software and apps updated
Cybercriminals often exploit outdated browsers or apps. Update your phone, computer and shopping apps before the holiday rush to close those security holes.
8) Monitor your bank and credit statements
Check your accounts daily during the shopping season. The faster you spot a suspicious charge, the easier it is to reverse and protect your funds.
Kurt’s key takeaways
Black Friday through Cyber Monday is the peak time for data harvesting. Every purchase, coupon code and sign-up adds to the profile that marketers and data brokers hold on you. That information can linger online for years, long after the sales end. The good news? It’s easier than ever to reclaim your privacy. By taking just a few minutes today, you can enjoy the holidays knowing your personal data is no longer on the open market.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
How confident are you that your personal data isn’t already fueling a scam this holiday season? Let us know by writing to us at Cyberguy.com.
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.
Copyright 2025 CyberGuy.com. All rights reserved.
Technology
Ikea tried to build a smart home for everyone — here’s why it’s not working yet
When I first got the Ikea devices in January, I had a lot of problems connecting them to my main platform, Apple Home. And it turned out I was not alone. Reddit forums and user reviews were full of reports of onboarding and connectivity issues. Many people were struggling to get devices connected to every smart home platform — from Apple Home to Google Home, and even Ikea’s own Dirigera hub. YouTuber Shane Whatley documented his experience trying to onboard to Apple Home in real time, and it’s fairly painful to watch.
While I waited for Ikea to figure out what was up, I tried some more creative troubleshooting in my home. The only (admittedly odd) fix I found was to force Apple Home not to use my main Home Hub, an Ethernet-connected Apple TV. Instead, I told it to use a HomePod, and was able to onboard an Ikea Bilresa button and a Grillplats smart plug that had repeatedly failed to connect. (Hat tip to Whatley for this idea.)
Why Apple would prefer I not use my high-powered, hardwired Home Hub is anyone’s guess. In any case, it didn’t last long. When I tried to add a Myggspray motion sensor as well, it failed. I then tried connecting the same Myggspray to Google Home using an Android phone, and it joined on the first try. Admittedly, I have a complicated network, but this points towards Apple causing issues, not my setup.
While Ikea said that “the products work seamlessly” for most customers, it did acknowledge the problems “some users” were experiencing. It published a troubleshooting page, and online forums quickly filled with advice on getting the gadgets connected. These range from simple “restart your phone” to the inexplicable “just leave it alone for a few days, and then it will work” to the more complicated “dive into your internet router’s network settings and enable IPv6” (Thread and Matter run over IPv6).
One intrepid smart home reviewer, A Smarter House, painstakingly combed through all the proposed fixes and tried as many as he could on as many platforms as possible. This excellent deep dive by the YouTuber and blogger goes through the issues and what he tried that worked. His conclusion: There is not a single problem, but multiple, and the problems differ depending on the platform you are using.
Over the last few weeks, Ikea has rolled out several updates to its Dirigera hub to improve Matter-over-Thread stability and updated the troubleshooting page with more potential fixes. Ikea initially pointed to “users’ varying and sometimes complicated home networking setups,” something that’s difficult to replicate in a lab. And sure, individual network setups are often problematic. But the widespread nature of the issues points to something bigger: a problem with the core promise of Matter.
Problems at the heart of the Matter
With Matter came the promise of compatibility with every ecosystem, from Apple Home and Amazon Alexa to Home Assistant and Google Home. The industry was watching Ikea’s rollout closely; it was the first time Matter devices had been tested at the scale the standard was designed for — inexpensive devices for lots of people that would just work.
“While Thread provides a robust and secure foundation at the network layer, optimizing the end-to-end experience requires ongoing collaboration across all these interconnected components.”
— Ann Olivo, Thread Group
But what has become clear since Matter’s enthusiastic launch is that Apple, Google, and Amazon are now fully focused on pursuing their own agendas. The cooperative spirit that defined the standard’s early development has stalled, and it’s every platform for itself in the race for users.
Matter is an interoperability standard, but interoperability with Matter devices is still largely elusive. Rather than being a plug-and-play solution for manufacturers — make a Matter device, and it will just work with any platform — there remains a huge onus on each manufacturer to ensure its devices work properly with each platform before release. Which is basically the same problem they had before Matter launched.
Only now manufacturers have a playbook to follow that supposedly makes their devices work with everyone — easy, right? Apparently not. My theory is that it’s how the platforms interact with the devices that is causing many of these problems — something manufacturers have no control over.

Thread is a low-power, IP-based wireless protocol for smart home devices. It operates locally as a self-healing mesh network and promises low latency. It uses Thread Border Routers to connect to other networks and the internet.
Matter-over-Thread devices use Matter as the application layer, a shared language that enables compatibility across different smart home platforms.
This was implicitly confirmed by Thread Group, the organization that runs the Thread protocol, when I asked for comment on the issues users were seeing with Ikea’s Matter devices. “A seamless onboarding experience relies on orchestrating multiple components and layers within the smart home ecosystem, including the mobile app, application protocol, network protocol, platform software, and hardware design,” Ann Olivo, VP of marketing for Thread Group, told me via email. “While Thread provides a robust and secure foundation at the network layer, optimizing the end-to-end experience requires ongoing collaboration across all these interconnected components.”
That’s not to say Thread is blameless here. The protocol is frustratingly obtuse, and there are still too few troubleshooting solutions. Thread Border Routers remain a major pain point. Having too many, not enough, or the wrong ones can cause onboarding and connectivity issues. That last one is down to the problem of multiple TBRs from different companies still not working together. In practice, this means many homes now have several Thread Border Routers — Apple TVs, Eero routers, Echos, Google TV Streamers — that don’t always cooperate.
Additionally, Ikea may have shot itself in the foot by releasing its line of smart bulbs weeks after the remotes and sensors (they’re still not widely available). The latter are battery-powered, the former mains-powered. Thread is a low-power mesh network that relies on mains-powered repeaters to route signals. If you bought battery-powered buttons and sensors but have no mains-powered devices, that could be why you’ve seen devices drop off the network.
What is Ikea doing about it?

In 2024, the Connectivity Standards Alliance (the organization behind Matter) had to set up an interoperability lab to help manufacturers test their devices across all platforms. Whether Ikea took advantage of this or just took the promise of platform interoperability at face value isn’t clear. But either way, it now has a big mess to clean up.
The company is scrambling to improve reliability through software updates to its Dirigera hub, focused on improving Thread network performance and Matter onboarding stability. These include optimizing network communication and implementing “better cleanup of network settings after configuration changes, and fixes for connectivity disruptions that could cause device onboarding to fail,” according to David Granath, range manager at Ikea, who is leading the development of its smart home products. “In addition, we had an issue where outdated IPv6 network addresses could linger after configuration changes, such as turning IPv6 off on the WiFi router.”
You don’t need Ikea’s hub or app to onboard Matter devices — you should be able to just use your platform’s app. But the new Thread reset function in Ikea’s Home Smart app, which the company says “helps to rebuild the local Thread mesh if devices or border routers have fallen out of sync,” did help with some of my issues. Additionally, a Thread network check tool (iOS only) that shows your Thread network and which border routers are part of it is also useful. (There are a few other apps that offer this, too.)
Ikea’s stumble reveals a fundamental problem with Matter’s promise that you can build a device once and trust the platforms to handle the rest
Over the last week, I worked with Ikea and these new tools to troubleshoot my setup, and tried resetting and re-adding several devices, along with a new Bilresa button Ikea sent.
I got the new button connected to Apple Home on the first try, and yes — I cheered. I was also finally able to add the Timmerflotte temperature sensor to the Dirigera hub, and I had my first successful attempt at using Ikea devices with multi-admin (which lets you share devices across platforms), adding the Grillplats smart plug from Apple Home into Google Home.
However, an existing Kajplats lightbulb and Myggspray motion sensor still wouldn’t connect to Apple Home — giving me the now familiar “Unable to Add Accessory: Operation timed out” alert after about three minutes of trying to connect. But I was able to set up both of those in Google Home.
Ikea’s efforts may have improved things, but connecting devices still remains hit or miss. Even if it resolves the problems — and it looks like it’s moving in the right direction — Ikea’s stumble reveals a fundamental problem with Matter’s promise that you can build a device once and trust the platforms to handle the rest.
Until the major players prioritize interoperability, every manufacturer risks ending up where Ikea is now, scrambling for solutions in a sea of problems. Users who don’t turn to places like Reddit and YouTube for help will simply return their gadgets and move on. And the smart home will remain stuck in the early-adopter phase that Matter was supposed to leave behind.
While it’s clear there are ways to onboard these devices and keep them connected, the current experience is poor — not because any one company is failing, but because all of them are. And that’s not good news for Matter. Ultimately, what or who is at fault isn’t really the point; the point is that Matter promised it would just work, and it just doesn’t.
Technology
Do you know the true cost of identity theft?
NEWYou can now listen to Fox News articles!
Identity theft tied to major data broker breaches has cost Americans more than $20 billion over the past decade, according to a 2026 report from the U.S. Senate Joint Economic Committee.
That figure comes from just four breaches: Equifax (2017), Exactis (2018), National Public Data (2023) and TransUnion (2025). The estimate applies federal identity-theft loss data, including a typical loss of about $200 per victim, across hundreds of millions of exposed records.
The result is a multibillion-dollar total. It’s also a narrow one. The calculation shows reported financial losses. It doesn’t account for damaged credit files, delayed loan approvals, higher borrowing costs or the hours consumers spend restoring their financial records after misuse.
So where does that leave you?
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
HOW DEBIT CARD FRAUD CAN HAPPEN WITHOUT USING THE CARD
Massive data breaches at Equifax, Exactis, National Public Data and TransUnion exposed personal information that criminals later used for identity theft and financial fraud. (Nastasic/Getty Images)
What this median leaves out
The $200 figure used in the federal estimate is a median. It marks the midpoint of reported identity theft losses collected by the FTC. Many cases fall above it. FTC Consumer Sentinel data shows that losses swing widely depending on how the fraud happens. When money is moved through bank transfers or payment apps, reported median losses are markedly higher than in cases involving unauthorized credit card charges.
Loan or lease fraud can leave you with balances that need formal disputes before lenders correct the record. Reversing a charge doesn’t automatically restore a credit file. Accounts opened in your name can generate hard inquiries.
Missed payments linked to fraudulent loans can appear before the account is identified as fraudulent. And lenders reviewing a mortgage or auto application evaluate the report as it exists at that time. A $200 median captures a reported dollar amount. It falls short of showing how identity misuse can stifle borrowing terms or access to credit later.
The time cost of identity theft
After identity theft, the first step the FTC directs you to take is to file a report at IdentityTheft.gov. That generates a recovery plan and an identity theft report, which can be used to dispute fraudulent accounts. This is your starting point, and not anywhere close to a resolution.
Victims are instructed to contact each affected creditor directly, close or freeze compromised accounts and request written confirmation that the account was fraudulent. If a new line of credit was opened, that often requires submitting more documentation, completing affidavits and following up until the lender updates its reporting to the credit bureaus.
The FTC also advises placing a fraud alert with one of the three nationwide credit bureaus, which must notify the others. A credit freeze must be placed separately with each bureau. If you later apply for credit, they must temporarily lift the freeze before lenders can access your credit report. The Identity Theft Resource Center (ITRC) reports that victims frequently spend weeks resolving cases involving new account fraud. Complex cases can stretch even longer, especially when collection agencies become involved or when fraudulent tax returns trigger IRS identity verification.
1 BILLION IDENTITY RECORDS EXPOSED IN ID VERIFICATION DATA LEAK
An identity theft victim in Albany, New York, looks over documents he’s gathered. Victims of identity theft frequently spend weeks disputing fraudulent accounts, contacting lenders and restoring their credit reports after stolen data is misused. (John Carl D’Annibale/Albany Times Union via Getty Images)
During that period, you may be gathering records, mailing certified letters, waiting on hold with creditors or tracking dispute deadlines. The process moves at the pace of institutional review. All this time required to repair records is part of the cost of your stolen identity.
Earlier this year, a 57-year-old woman in Los Alamitos, California, discovered her identity had been stolen after receiving a voicemail from a Hertz rental location in Miami asking when she planned to return a Mercedes-Benz. She had never rented the vehicle, reported $78,500 in losses and spent nearly 10 days trying to recover from a single stolen ID.
Here’s where identity theft becomes more expensive
In its March 2025 Consumer Sentinel Network release, the FTC said consumers lost more than $12.5 billion to fraud in 2024, a 25% increase from 2023. Identity theft made up a large share of those reports. When misuse goes undetected, it spreads.
A stolen Social Security number can be used to open multiple accounts over time. Hard inquiries appear across different credit bureaus. New lenders and collection agencies show up, and each additional account adds another dispute you need to resolve. Identity theft often doesn’t stop after the first incident.
The ITRC says 31.5% of general consumer victims were targeted twice in a year, and 24.6% were hit three times last year. Even though fewer people reported a first-time identity theft, repeat targeting is becoming more common. Once your information is exposed, it can be used again. Losses can grow fast, too.
The same ITRC report found that more than 20% of victims reported losses exceeding $100,000. As the fraud spreads, so does the cleanup. What starts as a single unauthorized account can turn into disputes with lenders, credit bureaus and collection agencies. That buildup over time is where identity theft becomes more expensive.
How identity theft protection and credit monitoring can help
If you rely on occasional credit checks or alerts from a single bank, you’re only seeing activity tied to one account. If fraud appears elsewhere, it may not surface until a lender flags it.
Identity protection services can track activity across all three major credit bureaus and alert you to new inquiries or accounts as they appear. Some also scan breach datasets for exposed personal identifiers, including Social Security numbers and email addresses. Earlier alerts mean fewer fraudulent accounts can accumulate before you step in.
5 MYTHS ABOUT IDENTITY THEFT THAT PUT YOUR DATA AT RISK
Identity theft tied to major data broker breaches has cost Americans more than $20 billion over the past decade, according to a Senate report. (Sara Diggins/The Austin American-Statesman via Getty Images)
Many services provide three-bureau credit monitoring and real-time alerts when there are changes to your credit report. Some also scan known data breach records for exposed personal information and connect members with fraud resolution specialists who help with documentation and disputes. Certain plans include identity theft insurance that can help cover eligible recovery costs, subject to policy limits.
Monitoring does not prevent every identity theft attempt. It can reduce how far fraud spreads and how long it takes to contain it.
See my tips and best picks on Best Identity Theft Protection at Cyberguy.com.
Kurt’s key takeaways
The numbers tied to major data broker breaches show just how expensive stolen information can become. A single exposed record may seem harmless at first, but once that information spreads through the data broker ecosystem, it can resurface again and again. For many victims, the real damage is not just the money lost. It is the time spent disputing accounts, repairing credit files and trying to stop fraud from spreading further. Identity theft rarely happens in one clean event. It often unfolds slowly as criminals reuse the same stolen details across multiple lenders, services and databases. The good news is that you are not powerless. Monitoring your credit, limiting how widely your personal information appears online and responding quickly to alerts can reduce the damage if your information is misused. The earlier you catch suspicious activity, the easier it is to stop it before it spreads.
Have you ever checked your credit report or searched your name online and found information about yourself that surprised you? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
The Live Nation trial restarts with a ‘velvet hammer’
After a chaotic week following the Justice Department’s mid-trial settlement with Live Nation-Ticketmaster, the antitrust trial picked back up surprisingly smoothly on Monday — this time, with dozens of states leading the case.
This isn’t the outcome the states originally wanted. Out of concerns about being able to effectively take over the case and fear that the jury would be prejudiced by the shakeup, they requested a mistrial, which would have restarted the court battle at an unknown future date. But an irritated Judge Arun Subramanian seemed likely to deny the request, and once the states figured out how to retain the DOJ’s expert witness and were able to quickly hire up, they withdrew their mistrial motion. After the new faces were introduced, the trial restarted from roughly where it left off more than a week ago, with testimony that included how Live Nation deployed its “velvet hammer” against rivals.
Subramanian welcomed the jurors back from their “spring break” and asked if they had read or encountered any news about the case when they were out, which is forbidden by the jury instructions. They either shook their heads or remained silent. He reminded the jurors that the US had resolved its claims, as had a handful of states, but the rest were proceeding to trial. Jurors shouldn’t make any inferences from the fact those parties are no longer in the case, he said.
With the DOJ out of the picture, the lawyers who questioned early witnesses were gone, replaced by a new team co-led by Jonathan Hatch, an attorney from the New York AG’s office, and Jeffrey Kessler of Winston & Strawn, who represented college athletes in the landmark Supreme Court antitrust case against the NCAA over compensation.
The states’ attorneys picked up questioning of Jay Marciano, the COO of AEG, a competitor to Live Nation on multiple fronts. While Hatch refreshed jurors on parts of Marciano’s prior testimony, it was otherwise a fairly standard examination. Marciano testified about ticketing models he prefers in Europe, where multiple ticketing services often work at a venue, unlike the norm in the US where venues tend to accept exclusive ticketing contracts, often from Ticketmaster.
On cross examination, Marciano spoke to an incident the jury heard about early in the trial: a call between the Barclays Center’s then-CEO and Live Nation CEO Michael Rapino, who responded to an attempt to abandon Ticketmaster by saying it would be harder for the arena to get concerts with the new UBS Arena nearby. While Barclays interpreted this as a threat to protect Ticketmaster, Marciano affirmed that it’s common as a concert promoter to play venues against each other to get more favorable terms, and that the UBS Arena likely would attract artists away from Barclays as the new venue in town.
Live Nation’s president of US concerts, Robert Roux, addressed a separate allegation: that Live Nation uses its broad control over US amphitheaters to maintain its monopoly power, leaving no other real options for artists looking to play large outdoor venues. Through Live Nation’s own business presentations, plaintiff attorney Josh Hafenbrack demonstrated that the company made big strides to gain power over four of the top five amphitheaters in the US by ticket sales between 2016 and now. A 2018 presentation showed a largely highlighted list of the top 100 amps worldwide, with the green highlights representing the 62 Live Nation owned, operated, or exclusively booked venues at the time. Since then, Roux confirmed, the company has added several more on that list.
Live Nation denies it acted anticompetitively, and argues the states ignore other kinds of venues that compete for the same shows. But Roux wrote in a 2015 email that many non-superstar artists come in wanting to play amphitheaters — many of which, evidence shown in court has suggested, are controlled or exclusively booked by Live Nation. He also wrote that in those cases, there was “room for tighter negotiations and deals.”
“Either we are together or we are competitors”
Other emails described how Live Nation thinks about its competition when contemplating otherwise lucrative deals. In a 2018 email exchange, Rapino questioned why Live Nation should give shows to a promoter in the South it considered acquiring, Red Mountain Entertainment, before it actually owned it. Roux wrote at the time that the message to Red Mountain should be, “Either we are together or we are competitors.” He described the approach as a “velvet hammer.” On the witness stand, Roux said the message wasn’t meant to “antagonize” the promoter, but to be firm and send a clear message. In a separate exchange that mentioned Red Mountain, Roux wrote that Live Nation shouldn’t get “complacent” and “let small guys encroach from the edges.” Roux said the comment was a general one, and not specific to the promoter. Live Nation acquired Red Mountain in 2018.
In 2020, Rapino advised Roux against letting Radio Disney and concert promoter Superfly into a Live Nation venue, even after they offered a contract that would yield at least $400,000 in profit for Live Nation for renting out the amp. One executive had raised a concern about allowing a third-party promoter into the amp, even though the “money is great.”
Finally, Roux testified that Live Nation’s profits per fan have multiplied in recent years, with profitability in large amps, a key market in the case, growing more than other venue categories between 2019 and 2024. Before certain costs were factored in, the company made $386 million in profit from large amps in 2024, nearly triple the amount it made in that segment in 2019.
Besides the delay in the case while the states’ team sorted out its next moves absent the DOJ, there wasn’t a noticeable change in the flow of trial and how the new litigators operated, compared to the first week of trial. The case is still expected to run several more weeks, though both sides said they’ve worked to trim their witness lists to help make up for lost time. Toward the end of this week, one of the trial’s most high-profile witnesses is expected to take the stand: Live Nation’s CEO.
-
Oklahoma1 week ago
OSSAA unveils Class 6A-2A basketball state tournament brackets, schedule
-
Oklahoma3 days agoFamily rallies around Oklahoma father after head-on crash
-
Michigan1 week agoOperation BBQ Relief helping with Southwest Michigan tornado recovery
-
Nebraska5 days agoWildfire forces immediate evacuation order for Farnam residents
-
Southeast1 week ago‘90 Day Fiancé’ alum’s boyfriend on trial for attempted murder over wild ‘Boca Bash’ accusations
-
Health1 week agoAncient herb known as ‘nature’s Valium’ touted for improving sleep and anxiety
-
Connecticut1 week agoExclusive | Ex-CBS anchor Josh Elliott back on Connecticut dating scene after ugly Liz Cho split
-
Georgia2 days agoHow ICE plans for a detention warehouse pushed a Georgia town to fight back | CNN Politics