Skip to main content

Bush email hacking a wake up call

By Christopher Wolf, Special to CNN
updated 5:48 PM EST, Sat February 9, 2013
President George H.W. Bush, left, and his son President George W. Bush appear at a World Series game in October 2010.
President George H.W. Bush, left, and his son President George W. Bush appear at a World Series game in October 2010.
STORY HIGHLIGHTS
  • Bush family e-mails were hacked, private contents posted online
  • Chris Wolf: Many offended, some amused, but all concerned about privacy
  • Wolf: Users have options already established to protect private information
  • Wolf: Use password for WiFi, use two-step verification for e-mail

Editor's note: Christopher Wolf leads the privacy and information management practice at Hogan Lovells US LLP and is the founder and co-chairman of the Future of Privacy Forum, a think tank dedicated to advancing privacy.

(CNN) -- When news broke that six e-mail accounts belonging to members of the Bush family were hacked and some of the contents posted online, reactions ranged from being offended to amusement.

Many people objected to the leak of family exchanges reflecting contingency planning for the funeral of President George H.W. Bush. If ever a family deserves privacy, it is when dealing with the death, or impending death, of a loved one.

Others seized on the semi-nude bathing self-portraits of President George W. Bush to resume ridicule not seen since he left office.

Christopher Wolf
Christopher Wolf

And virtually everyone took the episode as a warning that "this can happen to you."

Become a fan of CNNOpinion
Stay up to date on the latest opinion, analysis and conversations through social media. Join us at Facebook/CNNOpinion and follow us @CNNOpinion on Twitter. We welcome your ideas and comments.



The Bush family email hack comes on the heels of reports of hacking at universities and major newspapers, and it follows urgent government warnings against our fragile cybersecurity defenses.

So, do the average users of online e-mail and Web services simply have to assume that hacking will expose their personal messages and photos? Not necessarily.

New York Times says it was hacked
2011: What Chinese hackers look for

The recent spate of security breaches and the attention focused on them will mean that government and businesses will up their game even more to secure our information infrastructure. But the security reinforcement might take time.

In the meantime, people have options to protect their information and themselves. Privacy and data security is a shared responsibility, after all, and users have a role to play.

Some Web-based e-mail services like Google's Gmail offer tools to add an extra layer of protection. Gmail offers a two-step verification to add an extra layer of security.

Such protection erects a double gate against unwanted interception. Through two-step verification, in addition to user name and password, you enter a code that the e-mail provider will send via text, voice call or on a mobile app.

Two-step verification drastically reduces the chances of someone stealing the personal information from your e-mail account because hackers would have to not only get a password and your user name, they would also have to have access to the mobile phone to which the code is sent.

And while you are taking steps to secure your e-mail, you would be well-advised to make sure your WiFi connection is secure.

Wireless routers are ubiquitous, allowing you to share your internet connection and files around the house. But without securing your router, anyone within range can access the websites you visit and may be able to access your personal information. Securing your WiFi router with a password is an easy step to take, and it is often overlooked.

If you want to get a little more technical, take a look at whether the website you are using to transmit information is using HTTPS -- hypertext transfer protocol secure. HTTPS encrypts your data so that it cannot be intercepted during transmission.

You will find that your banking transactions almost always will be conducted through the HTTPS protocol. For an extra level of security, check to see if other websites you use offer HTTPS for transmission.

So instead of throwing up your hands that Web-based e-mail and online data transfers can never be secure, seek out and use the security tools that already exist.

And no matter what your political persuasion, thank the Bush family for the wake-up call.

Follow us on Twitter @CNNOpinion.

Join us on Facebook/CNNOpinion.

The opinions in this commentary are solely those of Christopher Wolf.

ADVERTISEMENT
Part of complete coverage on
updated 3:18 PM EDT, Thu April 24, 2014
Frida Ghitis says as violence claims three U.S. doctors, the temptation is to despair, but aid to Afghanistan has made it a much better place
updated 2:33 PM EDT, Thu April 24, 2014
Ruben Navarrette says in California, Asian-Americans are against the use of racial criteria in public colleges.
updated 2:44 PM EDT, Thu April 24, 2014
Heidi Schlumpf says if the Pope did tell an Argentinian woman married to a divorced man that she could take Communion, it may signify a softening of church rules on the divorced and sacraments
updated 12:29 PM EDT, Thu April 24, 2014
Norcross, Georgia, Chief of Police Warren Summers says the new law that allows guns in bars, churches and schools will have unintended dangerous consequences.
updated 1:42 PM EDT, Thu April 24, 2014
Mel Robbins says social media is often ruled by haters, and people can be brutally honest.
updated 12:44 PM EDT, Thu April 24, 2014
Mike Downey says the golf purists can take a hike; the game needs radical changes to win back fans and players.
updated 12:41 PM EDT, Wed April 23, 2014
Robert Hickey says most new housing development is high-end, catering to high-earners.
updated 9:17 AM EDT, Wed April 23, 2014
Alexander Motyl says as Russian President Putin snarled at Ukraine, his foreign minister was signing a conciliatory accord with the West. Whatever the game, the accord is a major stand down by Russia
updated 8:29 AM EDT, Wed April 23, 2014
Les Abend says at every turn, the stowaway teen defied the odds of discovery and survival. What pilot would have thought to look for a person in the wheel well?
updated 7:04 AM EDT, Thu April 24, 2014
Q & A with artist Rachel Sussman on her new book of photographs, "The Oldest Living Things in the World."
updated 3:58 PM EDT, Tue April 22, 2014
Martin Blaser says the overuse of antibiotics threatens to deplete our bodies of "good" microbes, leaving us vulnerable to an unstoppable plague--an "antibiotic winter"
updated 1:37 PM EDT, Tue April 22, 2014
John Sutter asks: Is it possible to eat meat in modern-day America and consider yourself an environmentalist without being a hypocrite?
updated 11:38 AM EDT, Tue April 22, 2014
Sally Kohn notes that Meb Keflezighi rightly was called an American after he won the Boston Marathon, but his status in the U.S. once was questioned
updated 8:56 AM EDT, Tue April 22, 2014
Denis Hayes and Scott Denman say on this Earth Day, the dawn of the Solar Age is already upon us and the Atomic Age of nuclear power is in decline
updated 4:36 PM EDT, Mon April 21, 2014
Retired Coast Guard officer James Loy says a ship captain bears huge responsibility.
updated 1:08 PM EDT, Mon April 21, 2014
Peter Bergen says the latest strikes are part of an aggressive U.S. effort to target militants, including a bomb maker
updated 9:45 AM EDT, Mon April 21, 2014
Cynthia Lummis and Peter Welch say 16 agencies carry out national intelligence, and their budgets are top secret. We need to know how they are spending our money.
updated 8:35 AM EDT, Mon April 21, 2014
Julian Zelizer says President Obama knows more than anyone that he has much at stake in the midterm elections.
updated 8:55 AM EDT, Tue April 22, 2014
Eric Sanderson says if you really want to strike a blow for the environment--and your health--this Earth Day, work to get cars out of cities and create transportation alternatives
updated 10:08 AM EDT, Mon April 21, 2014
Bruce Barcott looks at the dramatic differences in marijuana laws in Colorado and Louisiana
updated 4:47 PM EDT, Fri April 18, 2014
Jim Bell says NASA's latest discovery supports the notion that habitable worlds are probably common in the galaxy.
updated 2:17 PM EDT, Fri April 18, 2014
Jay Parini says even the Gospels skip the actual Resurrection and are sketchy on the appearances that followed.
updated 1:52 PM EDT, Fri April 18, 2014
Graham Allison says if an unchecked and emboldened Russia foments conflict in a nation like Latvia, a NATO member, the West would have to defend it.
updated 9:11 AM EDT, Fri April 18, 2014
John Sutter: Bad news, guys -- the pangolin we adopted is missing.
updated 2:25 PM EDT, Mon April 21, 2014
Ben Wildavsky says we need a better way to determine whether colleges are turning out graduates with superior education and abilities.
updated 6:26 AM EDT, Fri April 18, 2014
Charles Maclin, program manager working on the search and recovery of Malaysia Flight 370, explains how it works.
updated 8:50 AM EDT, Fri April 18, 2014
Jill Koyama says Michael Bloomberg is right to tackle gun violence, but we need to go beyond piecemeal state legislation.
updated 2:45 PM EDT, Thu April 17, 2014
Michael Bloomberg and Shannon Watts say Americans are ready for sensible gun laws, but politicians are cowed by the NRA. Everytown for Gun Safety will prove the NRA is not that powerful.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT