Tag

Feedly Archives - Page 7 of 9 - Caudill Miller

Marvel and Stitcher announce a new podcast based on the Marvels comic miniseries

By News

Marvel and Stitcher announce a new podcast based on the Marvels comic miniseries originally published on The Verge


Marvel and Stitcher have announced their next superhero podcast partnership: a radio drama adaptation of Kurt Busiek and Alex Ross’ limited Marvels series, which sees news photographer Phil Sheldon trying to get by in the chaos of a superhero world. The podcast marks the third collaboration between Marvel and Stitcher, following Wolverine: The Long Night and its sequel Wolverine: The Lost Trail.

The scripted Marvels series is meant to coincide with the 25th anniversary of the comics series, and it will largely follow the same story, seeing Sheldon (and other ordinary, non-superpowered people) deal with the aftermath of an attempted invasion by the world-devouring Galactus and his battle with the Fantastic Four.

According to the announcement, the Marvels podcast will see these ordinary people “embark on an investigation to confirm or debunk one of the most super-powered conspiracy theories of all time.” It sounds like the show will be offering a more grounded, personal take on the superhero genre, much like the two Wolverine series, which looked to emulate modern podcasts like S-Town and Serial.

Much like the Wolverine shows, which starred The Hobbit’s Richard Armitage, Marvels will also feature a star-studded cast, with Clifford “Method Man” Smith as Ben Urich, AnnaSophia Robb as Marcia Hardesty, Ethan Peck as Mr. Fantastic, and Seth Barrish as Phil Sheldon. The podcast will launch this fall, and it will be exclusively available on Stitcher Premium until 2020.

The Folio Society’s next book brings Marvel’s Golden Age back to life

By News

The Folio Society’s next book brings Marvel’s Golden Age back to life originally published on The Verge


Image: Folio Society
The Folio Society has released a number of high-end editions of classic science fiction and fantasy novels over the years, including books by Ursula K. Le Guin, Robert Heinlein, Isaac Asimov, Philip K. Dick, George R.R. Martin, and more. Now, it’s taking on a new medium: comic books. This September, it’ll release Marvel: The Golden Age, 1939-1949, a compilation of the company’s classic comics.

The book is designed to celebrate the 80th anniversary of Marvel Comics #1. It’s now available for preorder, and it will retail for $225 when it’s released on September 25th. It’ll also come with a 64-page replica of that original comic.

The Folio Society’s books are aimed toward collectors and serious readers: its offerings aren’t paperbacks or hardcovers that you’ll find on the shelves of your local bookstore. They’re volumes that often come with special slipcovers and contain introductions from the authors or their contemporaries, as well as original artwork, all on high-quality paper. I’ve long been impressed with its offerings (and have bought a bunch over the years) because of the effort that’s put in and the art that the publisher includes with each one.

Folio Society editorial director Tom Walker tells The Verge that moving into comics is a “really thrilling new enterprise for us,” but he notes that “it doesn’t feel like virgin territory. Marvel Comics have been one of the great literary influences of the past century, and as I started to explore that world, I found the comic form had inspired so many of my own favorite writers, from Neil Gaiman to Margaret Atwood.”

Walker explains that the Folio Society wanted to anthologize the major Marvel eras, and its “aim was to allow readers to get closer to the Golden Age of Marvel Comics than they’ve ever been.” To assemble the book, the society partnered with Roy Thomas, the writer and editor who succeeded Stan Lee at Marvel Comics. He helped with the selection process for the book, which includes characters like Captain America, The Human Torch, and Namor, The Sub-Mariner.

Walker says that he’s most proud of the reproduction of Marvel Comics #1, which was based on an original copy from 1939 that it was able to track down. “We spent hours perfecting this, choosing the right grade of paper and finding ways to recreate the experience kids would have had picking this up from the newsstand for the first time.” The other comics included in the main volume are reproduced from “first-edition comics both from the Marvel archives and from major private collectors, in order to find the most pristine copies to offset,” Walker says.

The Folio Society says that the volume is the first in an ongoing partnership with Marvel Comics, and the next volume is set to come out sometime in the first half of 2020.

This Tesla Mod Turns a Model S Into a Mobile ‘Surveillance Station’

By News

This Tesla Mod Turns a Model S Into a Mobile ‘Surveillance Station’ originally published on Wired

Automatic license plate reader cameras are controversial enough when law enforcement deploys them, given that they can create a panopticon of transit throughout a city. Now, one hacker has found a way to put a sample of that power—for safety, he says, and for surveillance—into the hands of anyone with a Tesla and a few hundred dollars to spare.

At the Defcon hacker conference today, security researcher Truman Kain debuted what he calls the Surveillance Detection Scout. The DIY computer fits into the middle console of a Tesla Model S or Model 3, plugs into its dashboard USB port, and turns the car’s built-in cameras—the same dash and rearview cameras providing a 360-degree view used for Tesla’s Autopilot and Sentry features—into a system that spots, tracks, and stores license plates and faces over time. The tool uses open-source image recognition software to automatically put an alert on the Tesla’s display and the user’s phone if it repeatedly sees the same license plate. When the car is parked, it can track nearby faces to see which ones repeatedly appear. Kain says the intent is to offer a warning that someone might be preparing to steal the car, tamper with it, or break into the driver’s nearby home.

Despite the obvious privacy concerns, Kain pitches his invention primarily as a helpful tool for Tesla owners who rate above average on the paranoia spectrum. “It turns your Tesla into an AI-powered surveillance station,” Kain says. “It’s meant to be another set of eyes, to help out and tell you it’s seen a license plate following you over multiple days, or even multiple turns of a single trip.”

Kain, a consultant for the security firm Tevora, also isn’t oblivious to his creation’s creep factor. He says the Surveillance Detection Scout also demonstrates of the kind of surveillance the data that self-driving cars already collect could enable. If a large group of Surveillance Detection Scout users were to combine their license plate recognition data—a feature that Kain has purposefully left out of the software—the system could create a crowdsourced version of the same powerful surveillance provided by commercial automatic license plate reader systems, whose use by police has been banned in some states. “I’d be able to see everyone across the US, thousands of cars on this Surveillance Scout network,” Kain says. “So I think there’s a real ethical issue there.”

A Panopticon in Your Console

Roger Kisby/Redux

The Surveillance Detection Scout prototype, whose software Kain has made available on Github, works by capturing and analyzing the video from a Tesla’s three cameras—two on its sideview-mirrors and one forward-facing—on a $700 Nvidia Jetson Xavier mini-computer. It uses an open-source neural network framework called Darknet as its machine learning engine, along with ALPR Unconstrained for recognizing license plates and Facenet for tracking faces. Both of those programs are available for free on Github. The system also uses Google’s Open Images Dataset as training data.

“I’m not doing any cutting-edge AI,” Kain says. “I’m just applying what’s already freely available, off the shelf.” The software even identifies the make and model of cars it sees based on license plate lookups on the service FindByPlate.com. (Kain says it’s far harder to link license plates to actual names, and he doesn’t intend to include that data in his tool.)

Kain says he came up with the idea for his follower detection mechanism last year after he attended a talk on counter-surveillance at last year’s Defcon. He’d been thinking since he first bought his Tesla Model 3 about the gigabytes of video it collected and deleted, overwriting its video logs every hour. “I had a little bit of FOMO, thinking about how all this video is gone if I don’t do something with it,” Kain says.

“It’s essentially a surveillance camera on wheels, not providing anyone notice of that fact, mapping pieces of people’s paths through the cities they live in.”

Joesph Lorenzo Hall, CDT

After learning about a tool available on Github called Tesla USB that allows Tesla owners to store their video to an external drive indefinitely, Kain came up with the idea of combining that storage capability with image recognition to give his car features similar to the Nest camera in his home, which includes so-called “familiar face detection.” Beyond tracking license plates, the face detection element of his tool also functions as what he describes as an upgrade to Tesla’s existing Sentry security system, which starts recording when someone touches your car, and sets off an alarm if they attempt to break into it.

By stitching together a patchwork of public code, Kain’s 4-inch-cubed box can recognize license plate numbers and faces from the car’s video stream and alert the car’s owner if it spots repeated plates or faces in that data. It uses the software integration tool If This Then That to send alerts. By default, the system will notify the driver if it sees the same car following for every minute over a five-minute span, though Kain says the settings can be adjusted to the driver’s preference. The notifications have about a one-minute delay, Kain says, because of the time a Tesla’s cameras take to record a video file. And for now, users have to set up their own web server for it to work, though Kain says he may offer simpler web-based logins on his own server in the future.

“A Surveillance Camera on Wheels”

Kain proposes some scenarios where his system could do some good: confidential sources meeting with a journalist, or anyone else who has reason to believe they’re being followed or targeted by snoops. “If it helps keeps someone safe, that’s great,” Kain says. “If it lets me know that someone’s sneaking around my car, that’s also great.”

The Surveillance Detection Scout, however, faces not just ethical issues but also legal ones, says Joseph Lorenzo Hall, the chief technologist with the Center for Democracy and Technology. State laws against automatic license place readers, even for private use, would likely make it illegal in Alaska, Georgia, Maine and New Hampshire. Its facial recognition features make it illegal in Illinois.

“Is it a slippery slope? Potentially.”

Surveillance Detection Scout Creator Truman Kain

Laws aside, Hall argues that Kain’s invention could have unintended consequences and serious privacy implications. Confrontations could result from false positives, he says, if a driver mistakenly believes they’re being followed by someone who happens to have the same commute. “I’m worried about the subjective judgment a human would make from this technological system,” says Hall. “That could result in people pulling guns on each other when there’s really nothing to worry about.”

Hall also worries more broadly worry about the widespread form of AI-enabled surveillance that the system represents, particularly if its users tweaked Kain’s code to share their data with each other. “You’re going to have very rich records of people’s movements,” Hall says. “It’s essentially a surveillance camera on wheels, not providing anyone notice of that fact, mapping pieces of people’s paths through the cities they live in.”

Even more troubling, Hall says, would be the potential for law enforcement to gain access to the data, either through some sort of incentive to drivers—just as local police in some cities have subsidized Amazon’s Ring home surveillance cameras as a way to access their data—or by compelling users to share it with subpoenas.

Kain says he’s aware of those concerns, and built his system in part to demonstrate the possibilities of self-driving cars’ video surveillance before a shady commercial startup could do it first—one that might aggregate the data between users rather than keep it separated. A new era of ubiquitous self-driving car video data collection is coming, he says, and that much of it may end up on centralized repositories.

But he also admits that someone could easily tweak his code to enable data sharing between users, taking a big step toward the very future he warns about. “It would be trivial for someone to build that in if they have any development experience,” Kain says. “Is it a slippery slope? Potentially.”


More Great WIRED Stories

A Teen Hacker Found Bugs in School Software That Affects Millions

By News

A Teen Hacker Found Bugs in School Software That Affects Millions originally published on Wired

A few short decades ago, the archetypal hacker was a bored teenager breaking into his school’s network to change grades, à la Ferris Bueller. So today, when cybersecurity has become the domain of state-sponsored spy agencies and multibillion dollar companies, it may be refreshing to know that the high school hacker lives on—as do the glaring vulnerabilities in school software.

At the Defcon hacker conference in Las Vegas today, 18-year-old Bill Demirkapi presented his findings from three years of after-school hacking that began when he was a high school freshman. Demirkapi would poke around the web interfaces of two common pieces of software, sold by tech firms Blackboard and Follett and used by his own school. In both cases, he found serious bugs that would allow a hacker to gain deep access to student data. In Blackboard’s case in particular, Demirkapi found 5 million vulnerable records for students and teachers, including student grades, immunization records, cafeteria balance, schedules, cryptographically hashed passwords, and photos.

Demirkapi points out that if he, then a bored 16-year-old motivated only by his own curiosity, could so easily access these corporate databases, his story doesn’t reflect well on the broader security of the companies holding millions of students’ personal information.”The access I had was pretty much anything the school had,” Demirkapi says. “The state of cybersecurity in education software is really bad, and not enough people are paying attention to it.”

5,000 Schools, 5 Million Records

Demirkapi found a series of common web bugs in Blackboard’s Community Engagement software and Follett’s Student Information System, including so-called SQL-injection and cross-site-scripting vulnerabilities. For Blackboard, those bugs ultimately allowed access to a database that contained 24 categories of data, everything from phone numbers to discipline records, bus routes, and attendance records—though not every school seemed to store data in every field. Only 34,000 of the records included immunization history, for instance. More than 5,000 schools appeared to be included in the data, with roughly 5 million individual records in total, including students, teachers, and other staff.

In Follett’s software, Demirkapi says he found bugs that would have given a hacker access to student data like grade point average, special education status, number of suspensions, and passwords. Unlike in Blackboard’s software, those passwords were stored unencrypted, in fully readable form. By the time Demirkapi had gained that level of access to Follett’s software, however, he was two years into his hacking escapades and slightly better informed about legal dangers like the Computer Fraud and Abuse Act, which forbids gaining unauthorized access to a company’s network. So while he says he checked the data about himself and a friend who gave him permission, to verify that the bugs led to access, he didn’t explore further or enumerate the total number of vulnerable records, as he had with Blackboard. “I was a little stupider in the 10th grade,” he says of his earlier explorations.

When WIRED reached out to Blackboard and Follett, Follett’s senior vice president of technology George Gatsis expressed his thanks to Demirkapi for helping the company identify its bugs, which he says were fixed by July of 2018. “We were happy to work with Bill and grateful he was wiling to work through those things with us,” Gatsis says. But Gatsis also claimed that even with the security flaws he exploited, Demirkapi could never have accessed Follett data other than his own. Demirkapi counters that he “100 percent had access to other people’s data,” and says he even showed Follett’s engineers the password of the friend who had let him access his information.

Blackboard also thanked Demirkapi, but argued that based on its analysis no one else had accessed those records through the vulnerability he exposed. “We commend Bill Demirkapi for bringing these vulnerabilities to our attention and for striving to be part of a solution to improve our products’ security and protect our client’s personal information,” reads a statement from a Blackboard spokesperson. “We have addressed several issues that were brought to our attention by Mr. Demirkapi and have no indication that these vulnerabilities were exploited or that any clients’ personal information was accessed by Mr. Demirkapi or any other unauthorized party.

Advanced Persistent Teen

Demirkapi says he started digging up the two companies’ security flaws out of a combination of teenage boredom and an ambition to learn more about cybersecurity and web-based hacking. “I have a passion to, I guess, break things,” Demirkapi says. “I really wanted to learn about web application testing, so I thought, well, how cool would it be to test on my own school’s grading system?”

Demirkapi notes that, unlike Ferris Bueller, he never actually tried to change students’ grades. which would have required a deeper level of access to Blackboard’s network. He did, in a separate incident, exploit flaws in a college admission software to change his admission status to “accepted” in the database of Worcester Polytechnic Institute, a college he had applied to. A spokesperson for the college said that change alone wouldn’t have been enough to admit him.

“These companies say they’re secure, that they do audits, but don’t take the necessary steps to protect themselves from threats.”

Teen Hacker Bill Demirkapi

After Demirkapi began to find bugs in Blackboard and Follett’s software, he says he struggled to get the companies to take him seriously. In the winter of 2016, he initially tried to contact Follett by asking his school’s director of technology to contact the company on his behalf. But as Demirkapi remembers it, she told him the company had dismissed his concerns. He says he later sent messages himself to Blackboard and Follett via email and Follette’s contact page. Blackboard initially thanked him for his note and said it would investigate, but didn’t follow up. Follett ignored him altogether.

So a few months later, Demirkapi took a more typical approach for a juvenile hacker. Among Follett’s bugs, he found that could add a “group resource” to his school’s account, a file that would be available to all users and, more importantly for Demirkapi, that would trigger a push notification with the resource’s name to everyone in his school district who had Follett’s Aspen app installed. Demirkapi sent a message reading “Hello from Bill Demirkapi :)” out to thousands of parents, teachers, and students.

That stunt got him suspended from school for two days. “It was really immature of me to do that, but I didn’t know any other way to get in touch with a company that wasn’t open to contact,” Demirkapi says.

If It Weren’t for That Meddling Kid

Over the course 2018, after Demirkapi enlisted the help of his school district’s director of technology and Carnegie Mellon’s CERT Coordination Center, he says the companies finally began to listen. With Blackboard, whose sensitive data he had accessed in the process of testing the software’s security, he worked out a contract that stated the company wouldn’t sue him, and in return he’d keep the company’s vulnerabilities secret until they were fixed—after refusing an initial draft in which Blackboard tried to prevent him from telling anyone even after the patches went through.

Even now that both companies have fixed the software flaws Demirkapi found, he says that his work should worry anyone who cares about the security of student data. “It doesn’t seem like there’s any interest in this from the security field, because the incentives just aren’t very high,” he says, pointing out that neither Blackboard nor Follett has a bug bounty program for rewarding security researchers who find and their vulnerabilities. “These companies say they’re secure, that they do audits, but don’t take the necessary steps to protect themselves from threats.”

Some months after his Blackboard vulnerability disclosures, Demirkapi noticed that Blackboard had posted a job opening for a new chief information security officer. Demirkapi jokes that he briefly considered applying. Instead, he’s going to try college.


More Great WIRED Stories

Blackmagic announces Pocket Cinema Camera 6K

By News

Blackmagic announces Pocket Cinema Camera 6K originally published on The Verge


Blackmagic Design has revealed its latest compact camera for cinematography, the Pocket Cinema Camera 6K. It looks pretty similar to the 4K camera introduced last year, which is to say that it looks like a Minolta SLR from 1993, but it has a bigger sensor — it shoots in Super 35 format (similar to APS-C) with a resolution of 6144 x 3456.

Resolution aside, the switch to Super 35 will allow for much better low-light performance and control over depth of field. The 6K camera also uses Canon’s EF lens mount, rather than the 4K’s Micro Four Thirds, and Blackmagic is claiming 13 stops of dynamic range with dual native ISO of 400 and 25,600.


The Pocket Cinema Camera 6K has a lot of connectivity: mini XLR, full-size HDMI, USB-C, DC power, mic input, and headphone output. The camera is largely operated by the same five-inch touchscreen as the 4K model. It can shoot up to 50 fps at 6144 x 3456 16:9, 60 fps at 6144 x 2560 2.4:1, or 120 fps at 2.8K 2868 x 1512 17:9.

The Pocket Cinema Camera 6K is available right now, priced at $2,495 — almost twice as much as Blackmagic’s 4K model.

Who Owns Your Wireless Service? Crooks Do.

By News

Who Owns Your Wireless Service? Crooks Do. originally published on Krebs on Security

Incessantly annoying and fraudulent robocalls. Corrupt wireless company employees taking hundreds of thousands of dollars in bribes to unlock and hijack mobile phone service. Wireless providers selling real-time customer location data, despite repeated promises to the contrary. A noticeable uptick in SIM-swapping attacks that lead to multi-million dollar cyberheists.

If you are somehow under the impression that you — the customer — are in control over the security, privacy and integrity of your mobile phone service, think again. And you’d be forgiven if you assumed the major wireless carriers or federal regulators had their hands firmly on the wheel.

No, a series of recent court cases and unfortunate developments highlight the sad reality that the wireless industry today has all but ceded control over this vital national resource to cybercriminals, scammers, corrupt employees and plain old corporate greed.

On Tuesday, Google announced that an unceasing deluge of automated robocalls had doomed a feature of its Google Voice service that sends transcripts of voicemails via text message.

Google said “certain carriers” are blocking the delivery of these messages because all too often the transcripts resulted from unsolicited robocalls, and that as a result the feature would be discontinued by Aug. 9. This is especially rich given that one big reason people use Google Voice in the first place is to screen unwanted communications from robocalls, mainly because the major wireless carriers have shown themselves incapable or else unwilling to do much to stem the tide of robocalls targeting their customers.

AT&T in particular has had a rough month. In July, the Electronic Frontier Foundation (EFF) filed a class action lawsuit on behalf of AT&T customers in California to stop the telecom giant and two data location aggregators from allowing numerous entities — including bounty hunters, car dealerships, landlords and stalkers — to access wireless customers’ real-time locations without authorization.

And on Monday, the U.S. Justice Department revealed that a Pakistani man was arrested and extradited to the United States to face charges of bribing numerous AT&T call-center employees to install malicious software and unauthorized hardware as part of a scheme to fraudulently unlock cell phones.

Ars Technica reports the scam resulted in millions of phones being removed from AT&T service and/or payment plans, and that the accused allegedly paid insiders hundreds of thousands of dollars to assist in the process.

We should all probably be thankful that the defendant in this case wasn’t using his considerable access to aid criminals who specialize in conducting unauthorized SIM swaps, an extraordinarily invasive form of fraud in which scammers bribe or trick employees at mobile phone stores into seizing control of the target’s phone number and diverting all texts and phone calls to the attacker’s mobile device.

Late last month, a federal judge in New York rejected a request by AT&T to dismiss a $224 million lawsuit over a SIM-swapping incident that led to $24 million in stolen cryptocurrency.

The defendant in that case, 21-year-old Manhattan resident Nicholas Truglia, is alleged to have stolen more than $80 million from victims of SIM swapping, but he is only one of many individuals involved in this incredibly easy, increasingly common and lucrative scheme. The plaintiff in that case alleges that he was SIM-swapped on two different occasions, both allegedly involving crooked or else clueless employees at AT&T wireless stores.

And let’s not forget about all the times various hackers figured out ways to remotely use a carrier’s own internal systems for looking up personal and account information on wireless subscribers.

So what the fresh hell is going on here? And is there any hope that lawmakers or regulators will do anything about these persistent problems? Gigi Sohn, a distinguished fellow at the Georgetown Institute for Technology Law and Policy, said the answer — at least in this administration — is probably a big “no.”

“The takeaway here is the complete and total abdication of any oversight of the mobile wireless industry,” Sohn told KrebsOnSecurity. “Our enforcement agencies aren’t doing anything on these topics right now, and we have a complete and total breakdown of oversight of these incredibly powerful and important companies.”

Aaron Mackey, a staff attorney at the EFF, said that on the location data-sharing issue, federal law already bars the wireless carriers from sharing this with third parties without the expressed consent of consumers.

“What we’ve seen is the Federal Communications Commission (FCC) is well aware of this ongoing behavior about location data sales,” Mackey said. “The FCC has said it’s under investigation, but there has been no public action taken yet and this has been going on for more than a year. The major wireless carriers are not only violating federal law, but they’re also putting people in harm’s way. There are countless stories of folks being able to pretend to be law enforcement and gaining access to information they can use to assault and harass people based on the carriers making location data available to a host of third parties.”

On the issue of illegal SIM swaps, Wired recently ran a column pointing to a solution that many carriers in Africa have implemented which makes it much more difficult for SIM swap thieves to ply their craft.

“The carrier would set up a system to let the bank query phone records for any recent SIM swaps associated with a bank account before they carried out a money transfer,” wrote Wired’s Andy Greenberg in April. “If a SIM swap had occurred in, say, the last two or three days, the transfer would be blocked. Because SIM swap victims can typically see within minutes that their phone has been disabled, that window of time let them report the crime before fraudsters could take advantage.”

So far, there is zero indication that the U.S.-based mobile carriers are paying any attention.

In terms of combating the deluge of robocalls, Sohn says we already have a workable approach to arresting these nuisance calls: It’s an authentication procedure known as “SHAKEN/STIR,” and it is premised on the idea that every phone has a certificate of authenticity attached to it that can be used to validate if the call is indeed originating from the number it appears to be calling from.

Under a SHAKEN/STIR regime, anyone who is spoofing their number (and most of these robocalls are spoofed to appear as though they come from a number that is in the same prefix as yours) gets automatically blocked.

Unfortunately, Sohn said, the FCC has allowed the wireless carriers to adopt this approach voluntarily. And — shocker — most of them haven’t, or else they are charging a premium for it.

“The FCC could make the carriers provide robocall apps for free to customers, but they’re not,” Sohn said. “The carriers instead are turning around and charging customers extra for this service. There was a fairly strong anti-robocalls bill that passed the House, but it’s now stuck in the legislative graveyard that is the Senate.”

What about the prospects of any kind of major overhaul to the privacy laws in this country that might give consumers more say over who can access their private data and what recourse they may have when companies entrusted with that information screw up?

Sohn said there are few signs that anyone in Congress is seriously championing consumer privacy as a major legislative issue. Most of the nascent efforts to bring privacy laws in the United States into the 21st Century she said are interminably bogged down on two sticky issues: Federal preemption of stronger state laws, and the ability of consumers to bring a private right of civil action in the courts against companies that violate those provisions.

“It’s way past time we had a federal privacy bill,” Sohn said. “Companies like Facebook and others are practically begging for some type of regulatory framework on consumer privacy, yet this congress can’t manage to put something together. To me it’s incredible we don’t even have a discussion draft yet. There’s not even a bill that’s being discussed and debated. That is really pitiful, and the closer we get to elections, the less likely it becomes because nobody wants to do anything that upsets their corporate contributions. And, frankly, that’s shameful.”

Atlanta United to play Minnesota United in U.S. Open Cup final

By News

Atlanta United to play Minnesota United in U.S. Open Cup final originally published on Dirty South Soccer – All Posts

MLS: Minnesota United FC at Atlanta United FC
Brett Davis-USA TODAY Sports
The cup final matchup is set

After Atlanta United dispatched Orlando City 2-0 from the U.S. Open Cup in the first semi-final played Tuesday, Minnesota United punched its ticket the next night ewith a 2-1 win over the Portland Timbers.

Last month, Atlanta drew first priority to host the final if they were to get there, and indeed Mercedes-Benz Stadium will host its second cup final in as many years—albeit different cups. The U.S. Open Cup final will take place on August 27 at 8 p.m.

It’s an interesting matchup in that not only is it a rematch from a game earlier this season that Atlanta won 3-0, but it pits the two “Uniteds” that joined the league together against one another. Having experienced two very different paths to get to this point, the two clubs arrive in similarly upward trajectories. While Atlanta United was busy winning MLS Cup and nearly claiming a double with a Supporters Shield title, Minnesota were stuck in first gear—enduring a coaching change and personnel revamp. But the pivot worked, and now Minnesota are on the rise, currently placed second in the conference standings—just like Atlanta—and playing some fun, direct attacking soccer.

The Rundown: Creative agencies face a perfect storm

By News

The Rundown: Creative agencies face a perfect storm originally published on Digiday

The shutdown of Barton F. Graf is yet another sign of the times for creative agencies. The shop, which was founded just under a decade ago, has been one of the darlings of the creative agency world. It will close its doors later this year. Founder Gerry Graf, speaking to Ad Age, said the closure was due to “a perfect storm.”

But that storm shouldn’t come as a surprise; it’s been brewing for a while. Barton F. Graf, like other agencies, was hit hard by the ongoing movement from clients towards more project-based work. That’s a tough pivot for agencies like this one, which was built on models that prized agency of record work. 

And agency models, despite lots of loud and public calls for “innovation,” haven’t really evolved much at all. Agencies are typically based on an FTE model, where they’re paid according to the level and number of employees needed to service a client’s business, with (hopefully) a margin added on top.

A labor-based model doesn’t really work in a market like this one. Clients want to pay less money overall, marketing is still considered a cost-center, and they’re likelier to only want to pay for things they can’t do themselves. That means, in many cases, the money agencies are charging won’t cover their costs, let alone garner a profit.

How much of this is the agencies’ own fault? Some say it’s a mindset that they’d always get paid for the services that are coming back to bite them. At least a few agency CEOs and former execs have said to me that agencies for too long charged clients too much for work they could have done with less. That meant clients, sick and tired of that kind of financial arrangement (and under pressure from their bosses) are understandably looking to save money.

Some agencies have attempted to evolve. Some of them tried to make products themselves, leading to an explosion in “agency IP” projects a few years ago, with little in the way of tangible results. Some are offering to co-create and co-invest, thus having more of a hand in making and growing the client’s products and businesses. Many will survive, especially newer ones accustomed to working in this new way. But for pure creative agencies who are unwilling or unable to make significant and drastic shifts in their models, it seems like the end is nigh. 

David Droga, who sold his agency to Accenture Interactive just a few months ago, says agencies should ensure they’re selling more than just a “big idea”. “It’s one thing for us to want great and grand ambitious creative thinking that positions a brand. But our fees are one chunk of that. It’s not all. There are things that a consumer experiences about the brand that don’t touch a creative agency,” he told Digiday previously. “Blue-chip brands give AORs fees of $10 million or $15 million. But the people who are controlling the customer experience, they’re getting paid an ongoing fee of $100 million a year. I don’t need that number, but what I want is to be that important and that influential. I want CMOs to love us and CEOs to love us as well.” — Shareen Pathak

The subscriber is always right? 
There’s no shortage of data encouraging news publishers to lean into consumer revenue. But there’s also ample proof that relying on readers for direct revenue means managing a completely different kind of relationship than many publishers are used to.

This week has already offered examples of both. 

On Wednesday, The Guardian announced it had broken even for the first time in years, thanks largely to growth in its membership ranks and donations. The British news publisher said it now has over 655,000 paying supporters across print and digital around the world, who get perks such as free access to Guardian events, depending on the tier of membership. An additional 300,000 people gave to The Guardian via one-off donations.

But it wasn’t all good news for reader revenue this week. On Monday, the #CancelNYT began trending on Twitter after a handful of Twitter users took issue with the way the newspaper framed a speech on gun violence given by President Donald Trump. Within hours, a mixture of Times subscribers and gleeful conservatives were tweeting that they were tired of the publisher’s handling of the president’s racist rhetoric and provocations. Some framed the headline as the straw that broke the camel’s back, placed atop everything from the paper’s employment of conservative columnist Bret Stephens to a decision to accept advertising that attacked Congresswoman Rashida Tlaib

Grandstanding on Twitter is easy, and canceling a newspaper subscription can be notoriously hard, but it appears that some people did follow through. The paper admitted to the Columbia Journalism Review that it had experienced a “higher number of cancellations than is typical” following the incident.  

The Times is held to an unusually high standard because it is regarded by many as a standard-bearer for American journalism. But the dust-up confirms that news publishers, particularly those focused on growing subscriptions, have to think intently about the expectations of their subscribers, and how that relationship can be managed. 

Newspapers have decided to embrace the idea that they are bulwarks of democracy and community vitality. That’s an admirable responsibility, but people expect different things from their idols.  — Max Willens

The post The Rundown: Creative agencies face a perfect storm appeared first on Digiday.