Feeds

Credit card squeeze looms for pirate music sites

Unverified by Visa

Intelligent flash storage arrays

It isn't just Wikileaks that's being squeezed by credit card companies - pirate music sites are also feeling the pinch.

The UK has spawned more digital music services than any other country, but it's still easy and risk-free to pick up unlicensed music. So after years of unsuccessfully trying to modify our behaviour, and being obliged to play whack-a-mole with pirates in the courts, copyright enforcement forces are going for the wallet.

The City of London police say they will now be notifying Visa and Mastercard and their banks of persistent infringers, to try and prevent pirate sites getting card payment facilities. The initiative is at the request of IFPI, the global sound recording lobby group.

You can argue that all unlicensed sites are parasitic - they don't put anything back to the artists. Many don't ask the downloader for money - they support themselves via the ubiquitous crack whore advertising webcam 1:1s, or agencies offering "Russian brides". Lovely. But a few others, such as MP3fiesta or legalsounds.com are pay sites, actively soliciting your credit card payments. The latter offers music for nine cents a song and albums for 90 cents (55p).

There's a catch. They don't pay anything back to the creators, even though money has changed hands - so it's hard to think of anything that better defines "parasitic". (In the case of sites based Russia, because it's outside the copyright system, there are no reciprocal arrangements, so royalties never reach the talent.)

Mastercard said last year it was willing to take a "proactive" approach to infringers. Cyber-locker sites such as Rapidshare, Megaupload and Hotfile are the music enforcement agencies' biggest concern.

These currently offer a "premium" (faster) option via payment services such as PayPal and Moneybookers, and while PayPal has listed Rapidshare as a rogue site in the past, it seems to have relented. For such lockers, PayPal looks a lot like a single point of failure. ®

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.