Skip to main content

Bush email hacking a wake up call

By Christopher Wolf, Special to CNN
February 9, 2013 -- Updated 2248 GMT (0648 HKT)
President George H.W. Bush, left, and his son President George W. Bush appear at a World Series game in October 2010.
President George H.W. Bush, left, and his son President George W. Bush appear at a World Series game in October 2010.
STORY HIGHLIGHTS
  • Bush family e-mails were hacked, private contents posted online
  • Chris Wolf: Many offended, some amused, but all concerned about privacy
  • Wolf: Users have options already established to protect private information
  • Wolf: Use password for WiFi, use two-step verification for e-mail

Editor's note: Christopher Wolf leads the privacy and information management practice at Hogan Lovells US LLP and is the founder and co-chairman of the Future of Privacy Forum, a think tank dedicated to advancing privacy.

(CNN) -- When news broke that six e-mail accounts belonging to members of the Bush family were hacked and some of the contents posted online, reactions ranged from being offended to amusement.

Many people objected to the leak of family exchanges reflecting contingency planning for the funeral of President George H.W. Bush. If ever a family deserves privacy, it is when dealing with the death, or impending death, of a loved one.

Others seized on the semi-nude bathing self-portraits of President George W. Bush to resume ridicule not seen since he left office.

Christopher Wolf
Christopher Wolf

And virtually everyone took the episode as a warning that "this can happen to you."

Become a fan of CNNOpinion
Stay up to date on the latest opinion, analysis and conversations through social media. Join us at Facebook/CNNOpinion and follow us @CNNOpinion on Twitter. We welcome your ideas and comments.



The Bush family email hack comes on the heels of reports of hacking at universities and major newspapers, and it follows urgent government warnings against our fragile cybersecurity defenses.

So, do the average users of online e-mail and Web services simply have to assume that hacking will expose their personal messages and photos? Not necessarily.

New York Times says it was hacked
2011: What Chinese hackers look for

The recent spate of security breaches and the attention focused on them will mean that government and businesses will up their game even more to secure our information infrastructure. But the security reinforcement might take time.

In the meantime, people have options to protect their information and themselves. Privacy and data security is a shared responsibility, after all, and users have a role to play.

Some Web-based e-mail services like Google's Gmail offer tools to add an extra layer of protection. Gmail offers a two-step verification to add an extra layer of security.

Such protection erects a double gate against unwanted interception. Through two-step verification, in addition to user name and password, you enter a code that the e-mail provider will send via text, voice call or on a mobile app.

Two-step verification drastically reduces the chances of someone stealing the personal information from your e-mail account because hackers would have to not only get a password and your user name, they would also have to have access to the mobile phone to which the code is sent.

And while you are taking steps to secure your e-mail, you would be well-advised to make sure your WiFi connection is secure.

Wireless routers are ubiquitous, allowing you to share your internet connection and files around the house. But without securing your router, anyone within range can access the websites you visit and may be able to access your personal information. Securing your WiFi router with a password is an easy step to take, and it is often overlooked.

If you want to get a little more technical, take a look at whether the website you are using to transmit information is using HTTPS -- hypertext transfer protocol secure. HTTPS encrypts your data so that it cannot be intercepted during transmission.

You will find that your banking transactions almost always will be conducted through the HTTPS protocol. For an extra level of security, check to see if other websites you use offer HTTPS for transmission.

So instead of throwing up your hands that Web-based e-mail and online data transfers can never be secure, seek out and use the security tools that already exist.

And no matter what your political persuasion, thank the Bush family for the wake-up call.

Follow us on Twitter @CNNOpinion.

Join us on Facebook/CNNOpinion.

The opinions in this commentary are solely those of Christopher Wolf.

ADVERTISEMENT
Part of complete coverage on
August 22, 2014 -- Updated 2145 GMT (0545 HKT)
It apparently has worked for France, say Peter Bergen and Emily Schneider, but carries uncomfortable risks. When it comes to kidnappings, nations face grim options.
August 22, 2014 -- Updated 1231 GMT (2031 HKT)
James Dawes says calling ISIS evil over and over again could very well make it harder to stop them.
August 23, 2014 -- Updated 1617 GMT (0017 HKT)
John Bare says the Ice Bucket Challenge signals a new kind of activism and peer-to-peer fund-raising.
August 22, 2014 -- Updated 2231 GMT (0631 HKT)
As the inquiry into the shooting of Michael Brown continues, critics question the prosecutor's impartiality.
August 22, 2014 -- Updated 2247 GMT (0647 HKT)
Newt Gingrich says it's troubling that a vicious group like ISIS can recruit so many young men from Britain.
August 22, 2014 -- Updated 1223 GMT (2023 HKT)
Retired Lt. Gen. Mark Hertling says he learned that the territory ISIS wants to control is amazingly complex.
August 21, 2014 -- Updated 1450 GMT (2250 HKT)
David Weinberger says Twitter and other social networks have been vested with a responsibility, and a trust, they did not ask for.
August 22, 2014 -- Updated 1103 GMT (1903 HKT)
John Inazu says the slogan "We are Ferguson" is meant to express empathy and solidarity. It's not true: Not all of us live in those circumstances. But we all made them.
August 20, 2014 -- Updated 1951 GMT (0351 HKT)
Cerue Garlo says Liberia is desperate for help amid a Ebola outbreak that has touched every aspect of life.
August 21, 2014 -- Updated 1742 GMT (0142 HKT)
Eric Liu says Republicans who want to restrict voting may win now, but the party will suffer in the long term.
August 21, 2014 -- Updated 1538 GMT (2338 HKT)
Jay Parini: Jesus, Pope and now researchers agree: Wealth decreases our ability to sympathize with the poor.
August 21, 2014 -- Updated 1200 GMT (2000 HKT)
Judy Melinek offers a medical examiner's perspective on what happens when police kill people like Michael Brown.
August 19, 2014 -- Updated 2203 GMT (0603 HKT)
It used to be billy clubs, fire hoses and snarling German shepherds. Now it's armored personnel carriers and flash-bang grenades, writes Kara Dansky.
August 20, 2014 -- Updated 1727 GMT (0127 HKT)
Maria Haberfeld: People who are unfamiliar with police work can reasonably ask, why was an unarmed man shot so many times, and why was deadly force used at all?
August 18, 2014 -- Updated 2152 GMT (0552 HKT)
Ruben Navarrette notes that this fall, minority students will outnumber white students at America's public schools.
August 19, 2014 -- Updated 2121 GMT (0521 HKT)
Humans have driven to extinction four marine mammal species in modern times. As you read this, we are on the brink of losing the fifth, write three experts.
August 18, 2014 -- Updated 2006 GMT (0406 HKT)
Pepper Schwartz asks why young women are so entranced with Kardashian, who's putting together a 352-page book of selfies
ADVERTISEMENT