Skip to main content

Bush email hacking a wake up call

By Christopher Wolf, Special to CNN
February 9, 2013 -- Updated 2248 GMT (0648 HKT)
President George H.W. Bush, left, and his son President George W. Bush appear at a World Series game in October 2010.
President George H.W. Bush, left, and his son President George W. Bush appear at a World Series game in October 2010.
STORY HIGHLIGHTS
  • Bush family e-mails were hacked, private contents posted online
  • Chris Wolf: Many offended, some amused, but all concerned about privacy
  • Wolf: Users have options already established to protect private information
  • Wolf: Use password for WiFi, use two-step verification for e-mail

Editor's note: Christopher Wolf leads the privacy and information management practice at Hogan Lovells US LLP and is the founder and co-chairman of the Future of Privacy Forum, a think tank dedicated to advancing privacy.

(CNN) -- When news broke that six e-mail accounts belonging to members of the Bush family were hacked and some of the contents posted online, reactions ranged from being offended to amusement.

Many people objected to the leak of family exchanges reflecting contingency planning for the funeral of President George H.W. Bush. If ever a family deserves privacy, it is when dealing with the death, or impending death, of a loved one.

Others seized on the semi-nude bathing self-portraits of President George W. Bush to resume ridicule not seen since he left office.

Christopher Wolf
Christopher Wolf

And virtually everyone took the episode as a warning that "this can happen to you."

Become a fan of CNNOpinion
Stay up to date on the latest opinion, analysis and conversations through social media. Join us at Facebook/CNNOpinion and follow us @CNNOpinion on Twitter. We welcome your ideas and comments.



The Bush family email hack comes on the heels of reports of hacking at universities and major newspapers, and it follows urgent government warnings against our fragile cybersecurity defenses.

So, do the average users of online e-mail and Web services simply have to assume that hacking will expose their personal messages and photos? Not necessarily.

New York Times says it was hacked
2011: What Chinese hackers look for

The recent spate of security breaches and the attention focused on them will mean that government and businesses will up their game even more to secure our information infrastructure. But the security reinforcement might take time.

In the meantime, people have options to protect their information and themselves. Privacy and data security is a shared responsibility, after all, and users have a role to play.

Some Web-based e-mail services like Google's Gmail offer tools to add an extra layer of protection. Gmail offers a two-step verification to add an extra layer of security.

Such protection erects a double gate against unwanted interception. Through two-step verification, in addition to user name and password, you enter a code that the e-mail provider will send via text, voice call or on a mobile app.

Two-step verification drastically reduces the chances of someone stealing the personal information from your e-mail account because hackers would have to not only get a password and your user name, they would also have to have access to the mobile phone to which the code is sent.

And while you are taking steps to secure your e-mail, you would be well-advised to make sure your WiFi connection is secure.

Wireless routers are ubiquitous, allowing you to share your internet connection and files around the house. But without securing your router, anyone within range can access the websites you visit and may be able to access your personal information. Securing your WiFi router with a password is an easy step to take, and it is often overlooked.

If you want to get a little more technical, take a look at whether the website you are using to transmit information is using HTTPS -- hypertext transfer protocol secure. HTTPS encrypts your data so that it cannot be intercepted during transmission.

You will find that your banking transactions almost always will be conducted through the HTTPS protocol. For an extra level of security, check to see if other websites you use offer HTTPS for transmission.

So instead of throwing up your hands that Web-based e-mail and online data transfers can never be secure, seek out and use the security tools that already exist.

And no matter what your political persuasion, thank the Bush family for the wake-up call.

Follow us on Twitter @CNNOpinion.

Join us on Facebook/CNNOpinion.

The opinions in this commentary are solely those of Christopher Wolf.

ADVERTISEMENT
Part of complete coverage on
April 17, 2014 -- Updated 1845 GMT (0245 HKT)
Michael Bloomberg and Shannon Watts say Americans are ready for sensible gun laws, but politicians are cowed by the NRA. Everytown for Gun Safety will prove the NRA is not that powerful.
April 17, 2014 -- Updated 1328 GMT (2128 HKT)
Ruben Navarrette says Steve Israel is right: Some Republicans encourage anti-Latino prejudice. But that kind of bias is not limited to the GOP.
April 16, 2014 -- Updated 2323 GMT (0723 HKT)
Peggy Drexler counts the ways Phyllis Schlafly's argument that lower pay for women helps them nab a husband is ridiculous.
April 16, 2014 -- Updated 1642 GMT (0042 HKT)
Rick McGahey says Rep. Paul Ryan is signaling his presidential ambitions by appealing to hard core Republican values
April 16, 2014 -- Updated 1539 GMT (2339 HKT)
Paul Saffo says current Google Glasses are doomed to become eBay collectibles, but they are only the leading edge of a surge in wearable tech that will change our lives
April 15, 2014 -- Updated 1849 GMT (0249 HKT)
Kathleen Blee says the KKK and white power or neo-Nazi groups give haters the purpose and urgency to use violence.
April 16, 2014 -- Updated 1156 GMT (1956 HKT)
Sen. Sheldon Whitehouse and Rep. Henry Waxman say read deep, and you'll see the federal Keystone pipeline report spells out the pipeline is bad news
April 16, 2014 -- Updated 1153 GMT (1953 HKT)
Frida Ghitis says President Obama needs to stop making empty threats against Russia and consider other options
April 15, 2014 -- Updated 2129 GMT (0529 HKT)
Peter Bergen and David Sterman say the Kansas Jewish Center killings are part of a string of lethal violence in the U.S. that outstrips al Qaeda-influenced attacks. Why don't we pay more attention?
April 15, 2014 -- Updated 1641 GMT (0041 HKT)
Danny Cevallos says families of the passengers on Malaysian Airlines Flight 370 need legal counsel
April 14, 2014 -- Updated 1523 GMT (2323 HKT)
David Frum says Russia is on a rampage of mischief while Western leaders and Western alliances charged with keeping the peace hem and haw
April 14, 2014 -- Updated 1156 GMT (1956 HKT)
Most adults make the mistakes of hitting the snooze button and of checking emails first thing in the morning, writes Mel Robbins
April 14, 2014 -- Updated 1754 GMT (0154 HKT)
David Wheeler says as middle-class careers continue to disappear, we need a monthly cash payment to everyone
April 14, 2014 -- Updated 1155 GMT (1955 HKT)
Democrats need to show more political spine when it comes to the issue of taxes.
April 14, 2014 -- Updated 1555 GMT (2355 HKT)
Donna Brazile recalls the 50th Anniversary of the Civil Rights Act as four presidents honored the heroes of the movement and Lyndon Johnson, who signed the law
April 14, 2014 -- Updated 1317 GMT (2117 HKT)
Elmer Smith remembers Chuck Stone, the legendary journalist from Philadelphia who was known as a thorn in the side of police and an advocate for the little guy
April 13, 2014 -- Updated 1856 GMT (0256 HKT)
Al Franken says Comcast, the nation's largest cable provider, wants to acquire Time Warner Cable, the nation's second-largest cable provider. Should we be concerned?
April 11, 2014 -- Updated 1522 GMT (2322 HKT)
Philip Cook and Kristin Goss says the Pennsylvania stabbing attack, which caused grave injury -- but not death, carries a lesson on guns for policymakers
April 11, 2014 -- Updated 1906 GMT (0306 HKT)
Wikipedia lists 105 football movies, but all too many of them are forgettable, writes Mike Downey
April 11, 2014 -- Updated 1432 GMT (2232 HKT)
John Sutter and hundreds of iReporters set out to run marathons after the bombings -- and learned a lot about the culture of running
April 11, 2014 -- Updated 1649 GMT (0049 HKT)
Timothy Stanley says it was cowardly to withdraw the offer of an honorary degree to Ayaan Hirsi Ali. The university should have done its homework on her narrow views and not made the offer
April 11, 2014 -- Updated 1416 GMT (2216 HKT)
Al Awlaki
Almost three years after his death in a 2011 CIA drone strike in Yemen, Anwar al-Awlaki continues to inspire violent jihadist extremists in the U.S, writes Peter Bergen
April 12, 2014 -- Updated 0121 GMT (0921 HKT)
David Bianculli says Colbert is a smart, funny interviewer, but ditching his blowhard persona to take over the mainstream late-night role may cost him fans
April 10, 2014 -- Updated 1731 GMT (0131 HKT)
Rep. Paul Ryan says the Republican budget places its trust in the people, not in Washington
April 10, 2014 -- Updated 2128 GMT (0528 HKT)
Aaron David Miller says Obama isn't to blame for Kerry's lack of progress in resolving Mideast talks
April 14, 2014 -- Updated 1522 GMT (2322 HKT)
David Weinberger says beyond focusing on the horrors of the attack a year ago, it's worth remembering the lessons it taught about strength, the dangers of idle speculation and Boston's solidarity
April 10, 2014 -- Updated 1632 GMT (0032 HKT)
Katherine Newman says the motive for the school stabbing attack in Pennsylvania is not yet known, but research on such rampages turns up similarities in suspects and circumstances
April 9, 2014 -- Updated 1839 GMT (0239 HKT)
Wendy Townsend says the Rattlesnake Roundup -- where thousands of pounds of snakes are killed and tormented -- is barbaric
ADVERTISEMENT