DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Amber Group breaks silence on unsecured storage bucket; NatSec minister suggests TechCrunch reporter may have violated CyberCrime Act

Posted on February 21, 2021 by Dissent

The Gleaner reports a follow-up on an unsecured storage server  exposing personal information and COVID-related information of travelers to Jamaica. The exposed bucket was first reported by Zack Whittaker of TechCrunch on February 17:

The storage server, hosted on Amazon Web Services, was set to public. It’s not known for how long the data was unprotected, but contained more than 70,000 negative COVID-19 lab results, over 425,000 immigration documents authorizing travel to the island — which included the traveler’s name, date of birth and passport numbers — and over 250,000 quarantine orders dating back to June 2020, when Jamaica reopened its borders to visitors after the pandemic’s first wave. The server also contained more than 440,000 images of travelers’ signatures.

Whittaker provided additional details on their investigation and attempts at responsible disclosure in a subsequent thread on Twitter.

Today, The Gleaner reports:

Amber has not said how many files were exposed, although Senator Matthew Samuda, minister without portfolio in the security ministry, said Friday in a Nationwide Radio interview that “just under 700” persons were impacted.

“Having gone through the initial vulnerability, he would have seen metadata. If he wants to classify that as personal data that’s up to him. If he went further than that, then, that would a breach of the Cybercrimes Act,” Samuda said of TechCrunch writer Zack Whittaker, reiterating that impacted persons have been notified.

There’s a lot more that you can read on The Gleaner, but that last sentence above stopped me cold.

When asked if he had any response or comment on the statement by Minister Samuda about his actions, Whittaker told DataBreaches.net, “I plan to respond in time.”

If the minister is suggesting a reporter engaged in investigative journalism for the public good is violating Jamaica’s Cybercrimes Act, then the minister is engaging in an incredibly dangerous precedent: threatening journalists with criminal charges for investigating and reporting on matters of public concern. What does he think will happen the next time a journalist or white hat researcher finds Jamaicans’ data exposed? Will they responsibly disclose to Jamaican entities or will they just keep it to themselves and not let Jamaica know for fear of hassles or criminal charges?  Even just his statement may have a chilling effect on responsible disclosure.

This leak occurred on the Jamaican government’s cloud server. They need to own it fully, and thank Whittaker and TechCrunch for their responsible disclosure. Threats — however subtle or matter-of-factly stated — are inappropriate.

This blogger has been on the receiving end of legal threats from both foreign and domestic entities for reporting on leaks or dumped data. I am not worried for Zack Whittaker, a highly ethical journalist, or TechCrunch.  I am, however, concerned that once again we see journalists being threatened with criminal charges for committing journalism.

Stop shooting the messenger.

 

 

 

 

 


Related:

  • 'Trickery and f...ery': Agency under fire over senior manager's 'serious' privacy breach
  • Little Rock Psychologist Indicted by Federal Grand Jury for Defrauding Medicare and Arkansas Blue Cross Blue Shield
  • Software companies must be held liable for British economic security, say MPs
  • Russia arrests young cybersecurity entrepreneur on treason charges
  • UK privacy regulator has seen ‘collapse in enforcement activity,’ rights coalition says
  • SEC Voluntarily Dismisses SolarWinds Litigation
Category: Commentaries and AnalysesGovernment SectorHealth DataNon-U.S.

Post navigation

← NurseryCam discloses a breach
Watermark takes action after data security breach potentially affects people in 10 states →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Defense Bill Would Require New Cyber Requirements for Some DoD Telecom Contracts
  • Tell the truth, or someone will tell it for you — Trumbull County, Ohio edition
  • US Posts $10 Million Bounty for Iranian Hackers
  • South Korea police raid e-commerce giant Coupang over data leak; govt schedules hearing
  • FinCEN Report: Reported Ransomware Incidents and Payments Reached All-Time High in 2023
  • Leavenworth, Kansas cyberattack disrupts city services
  • They’ve escaped a lot of media attention, but Anubis RaaS is a threat to the medical sector (1)
  • “In the most expedient time possible…”
  • Portugal updates cybercrime law to exempt security researchers
  • LockBit 5’s “new secure blog domain” infra leaked already

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • FTC Denies Petition from SpyFone App CEO to Vacate 2021 Order
  • Privacy concerns raised as Grok AI found to be a stalker’s best friend
  • PRIVACY—S.D. Cal.: Employee did not waive privacy right in personal email data on company provided laptop, (Dec 5, 2025)
  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: Dissent.73
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.