Disaster victims' sensitive information exposed through FEMA data breach

The breach shared more than 20 different and unnecessary data fields with an unnamed contractor tied to the disaster agency

Outside shot of FEMA headquarters

America's Federal Emergency Management Agency (FEMA) has leaked personal addresses and banking information of 2.3 million disaster survivors in a data breach.

The agency leaked records of people affected by Hurricanes Irma, Harvey and Maria from 2017 to an unnamed outside contractor. It's common practice for the agency to share data with outside contractors, however, "FEMA provided more information than was necessary," said Lizzie Litzow, press secretary for FEMA.

The security breach occurred because of an error in a program used to place victims of disasters in temporary housing, according to the findings of the Office of the Inspector General.

The unnecessarily shared data included home addresses, birth dates and in most cases sensitive details about banking accounts belonging to the victims.

Advertisement - Article continues below

The breach could threaten the survivors with identity theft and fraud, according to the original watchdog report.

'Since the discovery of this issue, FEMA has taken aggressive measures to correct this error," said Litzow. "FEMA is no longer sharing unnecessary data with the contractor and has conducted a detailed review of the contractor's information system."

"FEMA has also worked with the contractor to remove the unnecessary data from the system and updated its contract to ensure compliance with Department of Homeland Security (DHS) cybersecurity and information-sharing standards," she added.

The Inspector General's report told FEMA it needs to install controls to ensure that the data would not continue to be shared with the contractor in question and also be certain that information shared is wiped from the contractor's systems.

"One can see how best practices in how a data leakage should be handled - notify the general public, have an action plan to resolve the issue and next steps what to do to not repeat the same mistake," said Boris Cipot, senior security engineer at Synopsys. "However, it also shows how bad decisions in database structures can lead to such disasters."

"When handling sensitive data, special care and a lot of thought has to be given to selecting which data can be accessed and which should not be accessible by systems. As said, it is good that they will now go and remove data that should not be shared, but this could be avoided if this selection was made earlier."

The report was originally published on 15 March but only recently came to light.

Of the 2.3 million people affected, 1.8 million had their bank details leaked with a further 725,000 had just their home addresses leaked, according to a Department of Homeland Security official who commented under the condition of anonymity.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now



Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
wifi & hotspots

Industrial Wi-Fi 6 trial reveals blistering speeds

5 Dec 2019

Five signs that it’s time to retire IT kit

29 Nov 2019