Feeds

Pop stars back 'Three Strokes' policy

They're not strikes, honest

Security for virtualized datacentres

Another day, another joint statement from a bunch of artists.

This one comes from a number of signed artists who say they aren't the Featured Artists Coalition (but most of them are). The er, FAC members now say they too want a "graduated response" to internet copyright infringement, and have persuaded Lily Allen to sign up to it. And George Michael, too. But these aren't Strikes so much as Slaps, or maybe even Tickles.

In keeping with the shambolic events of the past fortnight, FAC says the statement that came from last night's FAC meeting isn't an official FAC statement. Er, OK. It recommends sending two warnings to a file sharer, then as a final step throttling the infringer's connection down to a slow speed.

"It's utterly impractical for infringers to be able to download any media file, in fact all they'll be able to do is send basic emails and have functional web access. Having just that for three months as a sanction is some kind of a stick, not the ultimate sanction of cutting people off from the internet - we remain opposed to that," said Billy Bragg.

So most of the "enforcement" strategy (and the quasi-legal bureaucracy necessary to implement it) will be in place, with the music business spending earnings that could otherwise go on investment on paralegal monitoring and letter-writing. The only difference from Mandelson's proposal is that the sanction is a bit of a wet fart. As veterans of the original Napster will recall, file sharing over dial-up speed connections isn't impossible, it's just slower.

UK Music, which represents a broader range of views from the business (managers, composers, musicians, publishers, labels) told us today it's policy of a 5-step "temporary suspension" was unchanged.

So why bother at all, we asked Jeremy Silver, FAC's chairman this morning, via email. Why have any strikes, or strokes? Why not two or four? Or none at all? He promised to call us back.

Five of the Featured Artist Coalition's eight "advisors" are music managers, who provided the inspiration for the spontaneous outpouring of concern. The group is a collection of wrinkly millionaires, youngsters (signed up to the advisory managers' management companies) and sign-anything stalwarts like Billy Bragg and davefromblur. Surely it won't be long before you can buy "Joint Statement" stationary pre-printed with their signatures?

The saga began with a declaration three weeks ago in the style of the Tooting Liberation Front, which appended the name of BASCA, the British Composers Society and Authors, without their approval. Lily Allen fired back. But apart from providing some comedy value, what was the point? It all looks like an opportunity missed.

While there's some merit in not making hardcore infringers into victims - it's a role they're absolutely dying to play, because bullies need to feel bullied - there's even more merit in not focusing on enforcement at all. Like backing the creation of new, paying markets from technology rather than arguing about sanctions - in other words, backing schemes that make money from sound recordings in new ways.

"Where is the licensed filesharing site?," asked one poster on the message board of newsletter Record of the Day. "Lily, bang down the doors of EMI and Universal Music Publishing and ask them why they haven't licensed Virgin Media's download service yet. Annie, ask Sony why I can't buy the entire Eurythmics catalogue as mp3s in one click - yet I can get it for free by typing Eurythmics discography torrent into Google."

So instead of pandering, it could have highlighted the major labels' anti-revenue strategy. FAC appears to lack the vision to do that, and is stuck in a philosophical no man's land where it can't enforce effectively, but it can't articulate the alternative to enforcement effectively, either.

Perhaps that's a good thing. Who says creators should speak with one voice, anyway? It's one of the few privileged places in society where you're not obliged to toe anybody's line. It's creepy to expect them to. ®

Andrew warmly welcomes your comments.

Choosing a cloud hosting partner with confidence

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.