DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Amber Group breaks silence on unsecured storage bucket; NatSec minister suggests TechCrunch reporter may have violated CyberCrime Act

Posted on February 21, 2021 by Dissent

The Gleaner reports a follow-up on an unsecured storage server  exposing personal information and COVID-related information of travelers to Jamaica. The exposed bucket was first reported by Zack Whittaker of TechCrunch on February 17:

The storage server, hosted on Amazon Web Services, was set to public. It’s not known for how long the data was unprotected, but contained more than 70,000 negative COVID-19 lab results, over 425,000 immigration documents authorizing travel to the island — which included the traveler’s name, date of birth and passport numbers — and over 250,000 quarantine orders dating back to June 2020, when Jamaica reopened its borders to visitors after the pandemic’s first wave. The server also contained more than 440,000 images of travelers’ signatures.

Whittaker provided additional details on their investigation and attempts at responsible disclosure in a subsequent thread on Twitter.

Today, The Gleaner reports:

Amber has not said how many files were exposed, although Senator Matthew Samuda, minister without portfolio in the security ministry, said Friday in a Nationwide Radio interview that “just under 700” persons were impacted.

“Having gone through the initial vulnerability, he would have seen metadata. If he wants to classify that as personal data that’s up to him. If he went further than that, then, that would a breach of the Cybercrimes Act,” Samuda said of TechCrunch writer Zack Whittaker, reiterating that impacted persons have been notified.

There’s a lot more that you can read on The Gleaner, but that last sentence above stopped me cold.

When asked if he had any response or comment on the statement by Minister Samuda about his actions, Whittaker told DataBreaches.net, “I plan to respond in time.”

If the minister is suggesting a reporter engaged in investigative journalism for the public good is violating Jamaica’s Cybercrimes Act, then the minister is engaging in an incredibly dangerous precedent: threatening journalists with criminal charges for investigating and reporting on matters of public concern. What does he think will happen the next time a journalist or white hat researcher finds Jamaicans’ data exposed? Will they responsibly disclose to Jamaican entities or will they just keep it to themselves and not let Jamaica know for fear of hassles or criminal charges?  Even just his statement may have a chilling effect on responsible disclosure.

This leak occurred on the Jamaican government’s cloud server. They need to own it fully, and thank Whittaker and TechCrunch for their responsible disclosure. Threats — however subtle or matter-of-factly stated — are inappropriate.

This blogger has been on the receiving end of legal threats from both foreign and domestic entities for reporting on leaks or dumped data. I am not worried for Zack Whittaker, a highly ethical journalist, or TechCrunch.  I am, however, concerned that once again we see journalists being threatened with criminal charges for committing journalism.

Stop shooting the messenger.

 

 

 

 

 

Category: Commentaries and AnalysesGovernment SectorHealth DataNon-U.S.

Post navigation

← NurseryCam discloses a breach
Watermark takes action after data security breach potentially affects people in 10 states →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.