Open systems, open data, and open-source software provide a means to promote greater transparency, public trust, and user participation. But what happens when adversaries can abuse the same systems?
After all, any system that’s open to everyone is also open to those who wish to use it for malicious intent.
Time and time again, we have seen how the open-source ecosystems like npm or GitHub have been abused to spread malware. We have also seen how public WiFi hotspots can be tempting sites for attackers and reports of Russian actors live streaming webcams that should remain hidden.
Similarly, public safety systems that are designed to protect and safeguard citizens from adversaries have been misused by the very adversaries to do the opposite.