"Good" worms and human rights

The extent of Internet censorship in countries like China is regularly tested, but the testing methods used from within a censored country can entail risk for humans. A benevolent worm can be used for testing instead: the worm's self-replication, long the bane of suggested benevolent viruses and worms, is shown to be essential here. We describe the design of this benevolent worm, along with some other related applications for it. A technical, ethical, and legal analysis is provided.

[1]  Robert N. M. Watson,et al.  Ignoring the Great Firewall of China , 2006, Privacy Enhancing Technologies.

[2]  John Aycock Computer Viruses and Malware (Advances in Information Security) , 2006 .

[3]  John F. Shoch,et al.  The “worm” programs—early experience with a distributed computation , 1982, CACM.

[4]  Daniel C. DuVarney,et al.  Using predators to combat worms and viruses: a simulation-based study , 2004, 20th Annual Computer Security Applications Conference.

[5]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[6]  Hiroshi Toyoizumi,et al.  Predators: good will mobile codes combat against computer viruses , 2002, NSPW '02.

[7]  Jose Nazario,et al.  Defense and Detection Strategies against Internet Worms , 2003 .

[8]  A. Maurushat The benevolent health worm: comparing Western human rights-based ethics and Confucian duty-based moral philosophy , 2008, Ethics and Information Technology.

[9]  Michael S. Chase,et al.  You've Got Dissent!: Chinese Dissident Use of the Internet and Beijing's Counter-Strategies , 2002 .

[10]  Ronald J. Deibert,et al.  Internet Filtering in China in 2004-2005: A Country Study , 2005 .

[11]  John Aycock,et al.  ANONYMOUS AND MALICIOUS , 2005 .

[12]  Fred Cohen,et al.  Computer viruses—theory and experiments , 1990 .

[13]  Jedidiah R. Crandall,et al.  ConceptDoppler: a weather tracker for internet censorship , 2007, CCS '07.

[14]  Frederick B. Cohen,et al.  A short course on computer viruses (2nd ed.) , 1994 .

[15]  P. V. Oorschot,et al.  Internet Geolocation and Evasion , 2006 .

[16]  Mark A. Ludwig The Giant Black Book Of Computer Viruses , 1995 .

[17]  Benjamin Edelman,et al.  Internet Filtering in China , 2003, IEEE Internet Comput..

[18]  Jun Xu,et al.  WORM vs. WORM: preliminary study of an active counter-attack mechanism , 2004, WORM '04.

[19]  John Aycock,et al.  Computer Viruses and Malware , 2006, Advances in Information Security.

[20]  C. Petersen,et al.  National Security and Fundamental Freedoms: Hong Kong's Article 23 Under Scrutiny , 2010 .

[21]  O. Initiative Internet Filtering in China in 2004-2005 , 2005 .