Feeds

Napster partner urged to curb Nazi song swaps

Bertelsmann must act to ban racists, demand German authorities

  • alert
  • submit to reddit

The Power of One Infographic

German media giant Bertelsmann has said it will co-operate with the country's Constitutional Protection Office to eliminate neo-Nazi songs from Napster - but it's not sure what it can really do to help.

Yesterday, the CPO, an organisation set up to enforce German's strict anti-racism and anti-Nazi laws, warned that Napster's software makes it very easy for extreme right wing rock bands to publish their music. Nazi symbols and rhetoric are illegal in Germany.

"Napster is a particular challenge because with it, everyone has access to skinhead and Nazi music with its incitement to hatred and its appalling anti-Semitic content," a CPO spokesman said yesterday.

Interviewed by Infoworld after the CPO warning was issued, Bertelsmann e-commerce supremo Andreas Schmidt said his company would help. Napster's usage Ts&Cs prohibit the use of the service for the exchange of material likely to incite violence.

That makes it sound like stemming the flow of offensive material will be easy, but Schmidt was forced to admit that doing so in practice will be hard. With over 40 million users online, monitoring shared music files for racist content will be very hard indeed.

Metallica and other bands managed to track what they said were illegal copies of their music and inform Napster which users were posting those copies on the service. If they can do it, so can Bertelsmann, but it remains a tricky business, and there's nothing to stop racist posters signing on again under a new username.

What else can we do? the company asked. "Of course [applying Ts&Cs] is an unsatisfactory situation,'' said a Bertelsmann spokesman. "But the basic principle of the Internet is that every user can remain anonymous." ®

Mobile application security vulnerability report

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.