Units 1-3 - Collaborative Discussion 1

Ethics in Computing: The Malware Disruption Case

This three-week collaborative discussion examines ethical dilemmas in computing through the ACM Malware Disruption case study, exploring the conflict between following professional codes of conduct and taking immediate action to protect the public from cyber threats.

Initial Post

The Malware Disruption case study (ACM, N.D.) presents a difficult ethical conflict between following the rules and protecting the public. On one side, the hosting company, Rogue Services, clearly violated the ACM Code of Ethics. By ignoring requests to take down malicious software and hiding behind a "no matter what" uptime pledge, they failed to "avoid harm" (Principle 1.2) and did not contribute to the "public good" (Principle 3.1) (ACM, 2018).

However, the response from the security vendors and government agencies is more complicated. To stop Rogue Services, they released a worm, which is a piece of software designed to spread through a network, to crash Rogue's systems. While this action successfully stopped the spam and ransomware, it technically violated Principle 2.8, which states that professionals should access computing resources only when authorized (ACM, 2018). The security team did not have permission to access Rogue's machines, even though Rogue was acting maliciously.

This type of action is often called "active defense" or "hacking back." While it solved the immediate problem, it sets a risky precedent. Holzer and Lerums (2016) argue that private entities taking the law into their own hands can lead to an escalation of conflict without proper legal oversight. If professionals start ignoring rules like Principle 2.8 because they believe the "ends justify the means," it could damage the trust that is essential to the computing profession.

Ultimately, while the worm was designed carefully to limit collateral damage (upholding the spirit of minimizing harm), the decision to bypass legal channels creates an ethical grey area. It suggests that when the law is too slow, technical force is an acceptable solution, which is a dangerous view for the industry to adopt.

References

  • ACM (2018) ACM Code of Ethics and Professional Conduct. Available from: https://www.acm.org/code-of-ethics [Accessed 4 December 2025].
  • ACM (N.D.) Case Study: Malware Disruption. Available from: https://www.acm.org/code-of-ethics/case-studies/malware-disruption [Accessed 4 December 2025].
  • Holzer, C. T. & Lerums, J. E. (2016) 'The Ethics of Hacking Back', 2016 IEEE Symposium on Technologies for Homeland Security (HST). Waltham, MA, 10-11 May. IEEE.

Summary Post

Participating in this discussion has clarified that technical skills must be paired with strong ethical judgment. My analysis of the Malware Disruption case (ACM, N.D.) highlighted the danger of prioritizing immediate results over due process. While stopping the malware was a positive outcome, the use of a worm by private entities raised serious concerns about vigilantism in cyberspace.

This theme was echoed in other case studies discussed in the forum, such as the Medical Implant risks. Across these different scenarios, a common thread is the tension between business goals (like uptime or speed) and the safety of the user.

A key takeaway for me is the alignment between the ACM Code of Ethics (ACM, 2018) and the BCS Code of Conduct (BCS, 2021). Both frameworks make it clear that the public interest must come first. However, the discussions showed that applying this is difficult in the real world. For example, in the malware case, protecting the public good (Principle 3.1) seemed to conflict with the rule against unauthorized access (Principle 2.8).

Holzer and Lerums (2016) warn that bypassing established rules to "hack back" can destabilize the internet. Moving forward, I understand that ethical behavior is not just about following a checklist, but about making difficult decisions that maintain public trust in the profession. I intend to use these codes as a guide to ensure my future work prioritizes accountability and legal transparency over quick fixes.

References

  • ACM (2018) ACM Code of Ethics and Professional Conduct. Available from: https://www.acm.org/code-of-ethics [Accessed 4 December 2025].
  • ACM (N.D.) Case Study: Malware Disruption. Available from: https://www.acm.org/code-of-ethics/case-studies/malware-disruption [Accessed 4 December 2025].
  • BCS (2021) BCS Code of Conduct for members. Available from: https://www.bcs.org/membership-and-registrations/become-a-member/bcs-code-of-conduct [Accessed 4 December 2025].
  • Holzer, C. T. & Lerums, J. E. (2016) 'The Ethics of Hacking Back', 2016 IEEE Symposium on Technologies for Homeland Security (HST). Waltham, MA, 10-11 May. IEEE.
Source Artifacts | 📝 Initial Post | 📝 Summary Post
Email
GitHub
LinkedIn