The original internet worm, the Morris Worm (circa 1988) - decompiled source code is attached - could conceivably serve as a base for writing an updated version. Fix it with a online password database/directory based upon a keylogger and isp (I'd lay money on there being no more than 100-odd passwords used by the bulk of people on any isp - which would alter regionally) and use pretty much any of the windows vulnerabilities that keep getting found (on that note has anyone utilized the various explorer hacks?). Obviously alter the code enough to get it past the major anti-virus programs and obfuscate the hell out of it.
A good use would be to delete data held under various legislation worldwide by isp's to enable their internet browsing to be monitored and the data used as evidence. In that respect, a website "could" be envisaged where users would log in to target their own data. Obviously there would be serious concerns about security in that respect, but it would be useful. Another idea would be to search out and identify the specific products/machines being used in this effort by LE and target them.
A good use would be to delete data held under various legislation worldwide by isp's to enable their internet browsing to be monitored and the data used as evidence. In that respect, a website "could" be envisaged where users would log in to target their own data. Obviously there would be serious concerns about security in that respect, but it would be useful. Another idea would be to search out and identify the specific products/machines being used in this effort by LE and target them.



