Skip to main content

Bush email hacking a wake up call

By Christopher Wolf, Special to CNN
February 9, 2013 -- Updated 2248 GMT (0648 HKT)
President George H.W. Bush, left, and his son President George W. Bush appear at a World Series game in October 2010.
President George H.W. Bush, left, and his son President George W. Bush appear at a World Series game in October 2010.
STORY HIGHLIGHTS
  • Bush family e-mails were hacked, private contents posted online
  • Chris Wolf: Many offended, some amused, but all concerned about privacy
  • Wolf: Users have options already established to protect private information
  • Wolf: Use password for WiFi, use two-step verification for e-mail

Editor's note: Christopher Wolf leads the privacy and information management practice at Hogan Lovells US LLP and is the founder and co-chairman of the Future of Privacy Forum, a think tank dedicated to advancing privacy.

(CNN) -- When news broke that six e-mail accounts belonging to members of the Bush family were hacked and some of the contents posted online, reactions ranged from being offended to amusement.

Many people objected to the leak of family exchanges reflecting contingency planning for the funeral of President George H.W. Bush. If ever a family deserves privacy, it is when dealing with the death, or impending death, of a loved one.

Others seized on the semi-nude bathing self-portraits of President George W. Bush to resume ridicule not seen since he left office.

Christopher Wolf
Christopher Wolf

And virtually everyone took the episode as a warning that "this can happen to you."

Become a fan of CNNOpinion
Stay up to date on the latest opinion, analysis and conversations through social media. Join us at Facebook/CNNOpinion and follow us @CNNOpinion on Twitter. We welcome your ideas and comments.



The Bush family email hack comes on the heels of reports of hacking at universities and major newspapers, and it follows urgent government warnings against our fragile cybersecurity defenses.

So, do the average users of online e-mail and Web services simply have to assume that hacking will expose their personal messages and photos? Not necessarily.

New York Times says it was hacked
2011: What Chinese hackers look for

The recent spate of security breaches and the attention focused on them will mean that government and businesses will up their game even more to secure our information infrastructure. But the security reinforcement might take time.

In the meantime, people have options to protect their information and themselves. Privacy and data security is a shared responsibility, after all, and users have a role to play.

Some Web-based e-mail services like Google's Gmail offer tools to add an extra layer of protection. Gmail offers a two-step verification to add an extra layer of security.

Such protection erects a double gate against unwanted interception. Through two-step verification, in addition to user name and password, you enter a code that the e-mail provider will send via text, voice call or on a mobile app.

Two-step verification drastically reduces the chances of someone stealing the personal information from your e-mail account because hackers would have to not only get a password and your user name, they would also have to have access to the mobile phone to which the code is sent.

And while you are taking steps to secure your e-mail, you would be well-advised to make sure your WiFi connection is secure.

Wireless routers are ubiquitous, allowing you to share your internet connection and files around the house. But without securing your router, anyone within range can access the websites you visit and may be able to access your personal information. Securing your WiFi router with a password is an easy step to take, and it is often overlooked.

If you want to get a little more technical, take a look at whether the website you are using to transmit information is using HTTPS -- hypertext transfer protocol secure. HTTPS encrypts your data so that it cannot be intercepted during transmission.

You will find that your banking transactions almost always will be conducted through the HTTPS protocol. For an extra level of security, check to see if other websites you use offer HTTPS for transmission.

So instead of throwing up your hands that Web-based e-mail and online data transfers can never be secure, seek out and use the security tools that already exist.

And no matter what your political persuasion, thank the Bush family for the wake-up call.

Follow us on Twitter @CNNOpinion.

Join us on Facebook/CNNOpinion.

The opinions in this commentary are solely those of Christopher Wolf.

ADVERTISEMENT
Part of complete coverage on
April 23, 2014 -- Updated 1641 GMT (0041 HKT)
Robert Hickey says most new housing development is high-end, catering to high-earners.
April 23, 2014 -- Updated 1317 GMT (2117 HKT)
Alexander Motyl says as Russian President Putin snarled at Ukraine, his foreign minister was signing a conciliatory accord with the West. Whatever the game, the accord is a major stand down by Russia
April 23, 2014 -- Updated 1229 GMT (2029 HKT)
Les Abend says at every turn, the stowaway teen defied the odds of discovery and survival. What pilot would have thought to look for a person in the wheel well?
April 24, 2014 -- Updated 1104 GMT (1904 HKT)
Q & A with artist Rachel Sussman on her new book of photographs, "The Oldest Living Things in the World."
April 22, 2014 -- Updated 1958 GMT (0358 HKT)
Martin Blaser says the overuse of antibiotics threatens to deplete our bodies of "good" microbes, leaving us vulnerable to an unstoppable plague--an "antibiotic winter"
April 22, 2014 -- Updated 1737 GMT (0137 HKT)
John Sutter asks: Is it possible to eat meat in modern-day America and consider yourself an environmentalist without being a hypocrite?
April 22, 2014 -- Updated 1538 GMT (2338 HKT)
Sally Kohn notes that Meb Keflezighi rightly was called an American after he won the Boston Marathon, but his status in the U.S. once was questioned
April 22, 2014 -- Updated 1256 GMT (2056 HKT)
Denis Hayes and Scott Denman say on this Earth Day, the dawn of the Solar Age is already upon us and the Atomic Age of nuclear power is in decline
April 21, 2014 -- Updated 2036 GMT (0436 HKT)
Retired Coast Guard officer James Loy says a ship captain bears huge responsibility.
April 21, 2014 -- Updated 1708 GMT (0108 HKT)
Peter Bergen says the latest strikes are part of an aggressive U.S. effort to target militants, including a bomb maker
April 21, 2014 -- Updated 1345 GMT (2145 HKT)
Cynthia Lummis and Peter Welch say 16 agencies carry out national intelligence, and their budgets are top secret. We need to know how they are spending our money.
April 21, 2014 -- Updated 1235 GMT (2035 HKT)
Julian Zelizer says President Obama knows more than anyone that he has much at stake in the midterm elections.
April 22, 2014 -- Updated 1255 GMT (2055 HKT)
Eric Sanderson says if you really want to strike a blow for the environment--and your health--this Earth Day, work to get cars out of cities and create transportation alternatives
April 21, 2014 -- Updated 1408 GMT (2208 HKT)
Bruce Barcott looks at the dramatic differences in marijuana laws in Colorado and Louisiana
April 18, 2014 -- Updated 2047 GMT (0447 HKT)
Jim Bell says NASA's latest discovery supports the notion that habitable worlds are probably common in the galaxy.
April 18, 2014 -- Updated 1817 GMT (0217 HKT)
Jay Parini says even the Gospels skip the actual Resurrection and are sketchy on the appearances that followed.
April 18, 2014 -- Updated 1752 GMT (0152 HKT)
Graham Allison says if an unchecked and emboldened Russia foments conflict in a nation like Latvia, a NATO member, the West would have to defend it.
April 18, 2014 -- Updated 1311 GMT (2111 HKT)
John Sutter: Bad news, guys -- the pangolin we adopted is missing.
April 21, 2014 -- Updated 1825 GMT (0225 HKT)
Ben Wildavsky says we need a better way to determine whether colleges are turning out graduates with superior education and abilities.
April 18, 2014 -- Updated 1026 GMT (1826 HKT)
Charles Maclin, program manager working on the search and recovery of Malaysia Flight 370, explains how it works.
April 18, 2014 -- Updated 1250 GMT (2050 HKT)
Jill Koyama says Michael Bloomberg is right to tackle gun violence, but we need to go beyond piecemeal state legislation.
April 17, 2014 -- Updated 1845 GMT (0245 HKT)
Michael Bloomberg and Shannon Watts say Americans are ready for sensible gun laws, but politicians are cowed by the NRA. Everytown for Gun Safety will prove the NRA is not that powerful.
ADVERTISEMENT