Skip to main content

Bush email hacking a wake up call

By Christopher Wolf, Special to CNN
February 9, 2013 -- Updated 2248 GMT (0648 HKT)
President George H.W. Bush, left, and his son President George W. Bush appear at a World Series game in October 2010.
President George H.W. Bush, left, and his son President George W. Bush appear at a World Series game in October 2010.
STORY HIGHLIGHTS
  • Bush family e-mails were hacked, private contents posted online
  • Chris Wolf: Many offended, some amused, but all concerned about privacy
  • Wolf: Users have options already established to protect private information
  • Wolf: Use password for WiFi, use two-step verification for e-mail

Editor's note: Christopher Wolf leads the privacy and information management practice at Hogan Lovells US LLP and is the founder and co-chairman of the Future of Privacy Forum, a think tank dedicated to advancing privacy.

(CNN) -- When news broke that six e-mail accounts belonging to members of the Bush family were hacked and some of the contents posted online, reactions ranged from being offended to amusement.

Many people objected to the leak of family exchanges reflecting contingency planning for the funeral of President George H.W. Bush. If ever a family deserves privacy, it is when dealing with the death, or impending death, of a loved one.

Others seized on the semi-nude bathing self-portraits of President George W. Bush to resume ridicule not seen since he left office.

Christopher Wolf
Christopher Wolf

And virtually everyone took the episode as a warning that "this can happen to you."

Become a fan of CNNOpinion
Stay up to date on the latest opinion, analysis and conversations through social media. Join us at Facebook/CNNOpinion and follow us @CNNOpinion on Twitter. We welcome your ideas and comments.



The Bush family email hack comes on the heels of reports of hacking at universities and major newspapers, and it follows urgent government warnings against our fragile cybersecurity defenses.

So, do the average users of online e-mail and Web services simply have to assume that hacking will expose their personal messages and photos? Not necessarily.

New York Times says it was hacked
2011: What Chinese hackers look for

The recent spate of security breaches and the attention focused on them will mean that government and businesses will up their game even more to secure our information infrastructure. But the security reinforcement might take time.

In the meantime, people have options to protect their information and themselves. Privacy and data security is a shared responsibility, after all, and users have a role to play.

Some Web-based e-mail services like Google's Gmail offer tools to add an extra layer of protection. Gmail offers a two-step verification to add an extra layer of security.

Such protection erects a double gate against unwanted interception. Through two-step verification, in addition to user name and password, you enter a code that the e-mail provider will send via text, voice call or on a mobile app.

Two-step verification drastically reduces the chances of someone stealing the personal information from your e-mail account because hackers would have to not only get a password and your user name, they would also have to have access to the mobile phone to which the code is sent.

And while you are taking steps to secure your e-mail, you would be well-advised to make sure your WiFi connection is secure.

Wireless routers are ubiquitous, allowing you to share your internet connection and files around the house. But without securing your router, anyone within range can access the websites you visit and may be able to access your personal information. Securing your WiFi router with a password is an easy step to take, and it is often overlooked.

If you want to get a little more technical, take a look at whether the website you are using to transmit information is using HTTPS -- hypertext transfer protocol secure. HTTPS encrypts your data so that it cannot be intercepted during transmission.

You will find that your banking transactions almost always will be conducted through the HTTPS protocol. For an extra level of security, check to see if other websites you use offer HTTPS for transmission.

So instead of throwing up your hands that Web-based e-mail and online data transfers can never be secure, seek out and use the security tools that already exist.

And no matter what your political persuasion, thank the Bush family for the wake-up call.

Follow us on Twitter @CNNOpinion.

Join us on Facebook/CNNOpinion.

The opinions in this commentary are solely those of Christopher Wolf.

ADVERTISEMENT
Part of complete coverage on
December 27, 2014 -- Updated 0127 GMT (0927 HKT)
The ability to manipulate media and technology has increasingly become a critical strategic resource, says Jeff Yang.
December 26, 2014 -- Updated 1617 GMT (0017 HKT)
Today's politicians should follow Ronald Reagan's advice and invest in science, research and development, Fareed Zakaria says.
December 26, 2014 -- Updated 1319 GMT (2119 HKT)
Artificial intelligence does not need to be malevolent to be catastrophically dangerous to humanity, writes Greg Scoblete.
December 26, 2014 -- Updated 1505 GMT (2305 HKT)
Historian Douglas Brinkley says a showing of Sony's film in Austin helped keep the city weird -- and spotlighted the heroes who stood up for free expression
December 26, 2014 -- Updated 1303 GMT (2103 HKT)
Tanya Odom that by calling only on women at his press conference, the President made clear why women and people of color should be more visible in boardrooms and conferences
December 27, 2014 -- Updated 2327 GMT (0727 HKT)
When oil spills happen, researchers are faced with the difficult choice of whether to use chemical dispersants, authors say
December 25, 2014 -- Updated 0633 GMT (1433 HKT)
Danny Cevallos says the legislature didn't have to get involved in regulating how people greet each other
December 23, 2014 -- Updated 2312 GMT (0712 HKT)
Marc Harrold suggests a way to move forward after the deaths of NYPD officers Wenjian Liu and Rafael Ramos.
December 24, 2014 -- Updated 1336 GMT (2136 HKT)
Simon Moya-Smith says Mah-hi-vist Goodblanket, who was killed by law enforcement officers, deserves justice.
December 24, 2014 -- Updated 1914 GMT (0314 HKT)
Val Lauder says that for 1,700 years, people have been debating when, and how, to celebrate Christmas
December 23, 2014 -- Updated 2027 GMT (0427 HKT)
Raphael Sperry says architects should change their ethics code to ban involvement in designing torture chambers
December 24, 2014 -- Updated 0335 GMT (1135 HKT)
Paul Callan says Sony is right to call for blocking the tweeting of private emails stolen by hackers
December 23, 2014 -- Updated 1257 GMT (2057 HKT)
As Christmas arrives, eyes turn naturally toward Bethlehem. But have we got our history of Christmas right? Jay Parini explores.
December 23, 2014 -- Updated 0429 GMT (1229 HKT)
The late Joe Cocker somehow found himself among the rock 'n' roll aristocracy who showed up in Woodstock to help administer a collective blessing upon a generation.
December 23, 2014 -- Updated 2115 GMT (0515 HKT)
History may not judge Obama kindly on Syria or even Iraq. But for a lame duck president, he seems to have quacking left to do, says Aaron Miller.
December 23, 2014 -- Updated 1811 GMT (0211 HKT)
Terrorism and WMD -- it's easy to understand why these consistently make the headlines. But small arms can be devastating too, says Rachel Stohl.
December 22, 2014 -- Updated 1808 GMT (0208 HKT)
Ever since "Bridge-gate" threatened to derail Chris Christie's chances for 2016, Jeb Bush has been hinting he might run. Julian Zelizer looks at why he could win.
December 20, 2014 -- Updated 1853 GMT (0253 HKT)
New York's decision to ban hydraulic fracturing was more about politics than good environmental policy, argues Jeremy Carl.
December 20, 2014 -- Updated 2019 GMT (0419 HKT)
On perhaps this year's most compelling drama, the credits have yet to roll. But we still need to learn some cyber lessons to protect America, suggest John McCain.
December 22, 2014 -- Updated 2239 GMT (0639 HKT)
Conservatives know easing the trade embargo with Cuba is good for America. They should just admit it, says Fareed Zakaria.
December 20, 2014 -- Updated 0112 GMT (0912 HKT)
We're a world away from Pakistan in geography, but not in sentiment, writes Donna Brazile.
December 19, 2014 -- Updated 1709 GMT (0109 HKT)
How about a world where we have murderers but no murders? The police still chase down criminals who commit murder, we have trials and justice is handed out...but no one dies.
December 18, 2014 -- Updated 2345 GMT (0745 HKT)
The U.S. must respond to North Korea's alleged hacking of Sony, says Christian Whiton. Failing to do so will only embolden it.
December 19, 2014 -- Updated 2134 GMT (0534 HKT)
President Obama has been flexing his executive muscles lately despite Democrat's losses, writes Gloria Borger
ADVERTISEMENT