Skip to main content

Bush email hacking a wake up call

By Christopher Wolf, Special to CNN
February 9, 2013 -- Updated 2248 GMT (0648 HKT)
President George H.W. Bush, left, and his son President George W. Bush appear at a World Series game in October 2010.
President George H.W. Bush, left, and his son President George W. Bush appear at a World Series game in October 2010.
STORY HIGHLIGHTS
  • Bush family e-mails were hacked, private contents posted online
  • Chris Wolf: Many offended, some amused, but all concerned about privacy
  • Wolf: Users have options already established to protect private information
  • Wolf: Use password for WiFi, use two-step verification for e-mail

Editor's note: Christopher Wolf leads the privacy and information management practice at Hogan Lovells US LLP and is the founder and co-chairman of the Future of Privacy Forum, a think tank dedicated to advancing privacy.

(CNN) -- When news broke that six e-mail accounts belonging to members of the Bush family were hacked and some of the contents posted online, reactions ranged from being offended to amusement.

Many people objected to the leak of family exchanges reflecting contingency planning for the funeral of President George H.W. Bush. If ever a family deserves privacy, it is when dealing with the death, or impending death, of a loved one.

Others seized on the semi-nude bathing self-portraits of President George W. Bush to resume ridicule not seen since he left office.

Christopher Wolf
Christopher Wolf

And virtually everyone took the episode as a warning that "this can happen to you."

Become a fan of CNNOpinion
Stay up to date on the latest opinion, analysis and conversations through social media. Join us at Facebook/CNNOpinion and follow us @CNNOpinion on Twitter. We welcome your ideas and comments.



The Bush family email hack comes on the heels of reports of hacking at universities and major newspapers, and it follows urgent government warnings against our fragile cybersecurity defenses.

So, do the average users of online e-mail and Web services simply have to assume that hacking will expose their personal messages and photos? Not necessarily.

New York Times says it was hacked
2011: What Chinese hackers look for

The recent spate of security breaches and the attention focused on them will mean that government and businesses will up their game even more to secure our information infrastructure. But the security reinforcement might take time.

In the meantime, people have options to protect their information and themselves. Privacy and data security is a shared responsibility, after all, and users have a role to play.

Some Web-based e-mail services like Google's Gmail offer tools to add an extra layer of protection. Gmail offers a two-step verification to add an extra layer of security.

Such protection erects a double gate against unwanted interception. Through two-step verification, in addition to user name and password, you enter a code that the e-mail provider will send via text, voice call or on a mobile app.

Two-step verification drastically reduces the chances of someone stealing the personal information from your e-mail account because hackers would have to not only get a password and your user name, they would also have to have access to the mobile phone to which the code is sent.

And while you are taking steps to secure your e-mail, you would be well-advised to make sure your WiFi connection is secure.

Wireless routers are ubiquitous, allowing you to share your internet connection and files around the house. But without securing your router, anyone within range can access the websites you visit and may be able to access your personal information. Securing your WiFi router with a password is an easy step to take, and it is often overlooked.

If you want to get a little more technical, take a look at whether the website you are using to transmit information is using HTTPS -- hypertext transfer protocol secure. HTTPS encrypts your data so that it cannot be intercepted during transmission.

You will find that your banking transactions almost always will be conducted through the HTTPS protocol. For an extra level of security, check to see if other websites you use offer HTTPS for transmission.

So instead of throwing up your hands that Web-based e-mail and online data transfers can never be secure, seek out and use the security tools that already exist.

And no matter what your political persuasion, thank the Bush family for the wake-up call.

Follow us on Twitter @CNNOpinion.

Join us on Facebook/CNNOpinion.

The opinions in this commentary are solely those of Christopher Wolf.

ADVERTISEMENT
Part of complete coverage on
October 31, 2014 -- Updated 1819 GMT (0219 HKT)
As a woman whose parents had cancer, I have quite a few things to say about dying with dignity.
October 31, 2014 -- Updated 1304 GMT (2104 HKT)
David Gergen says he'll have a special eye on a few particular races in Tuesday's midterms that may tell us about our long-term future.
October 31, 2014 -- Updated 1452 GMT (2252 HKT)
What's behind the uptick in clown sightings? And why the fascination with them? It could be about the economy.
October 31, 2014 -- Updated 1301 GMT (2101 HKT)
Midterm elections don't usually have the same excitement as presidential elections. That should change, writes Sally Kohn.
October 30, 2014 -- Updated 1539 GMT (2339 HKT)
Mike Downey says the Giants and the Royals both lived through long title droughts. What teams are waiting for a win?
October 30, 2014 -- Updated 1832 GMT (0232 HKT)
Mel Robbins says if a man wants to talk to a woman on the street, he should follow 3 basic rules.
October 29, 2014 -- Updated 2103 GMT (0503 HKT)
Peter Bergen and David Sterman say more terrorism plots are disrupted by families than by NSA surveillance.
October 29, 2014 -- Updated 2125 GMT (0525 HKT)
Time magazine has clearly kicked up a hornet's nest with its downright insulting cover headlined "Rotten Apples," says Donna Brazile.
October 29, 2014 -- Updated 2055 GMT (0455 HKT)
Leroy Chiao says the failure of the launch is painful but won't stop the trend toward commercializing space.
October 29, 2014 -- Updated 1145 GMT (1945 HKT)
Timothy Stanley: Though Jeb Bush has something to offer, another Bush-Clinton race would be a step backward.
October 28, 2014 -- Updated 1237 GMT (2037 HKT)
Errol Louis says forced to choose between narrow political advantage and the public good, the governors showed they are willing to take the easy way out over Ebola.
October 27, 2014 -- Updated 1803 GMT (0203 HKT)
Eric Liu says with our family and friends and neighbors, each one of us must decide what kind of civilization we expect in the United States. It's our responsibility to set tone and standards, with our laws and norms
October 27, 2014 -- Updated 1145 GMT (1945 HKT)
Sally Kohn says the UNC report highlights how some colleges exploit student athletes while offering little in return
October 26, 2014 -- Updated 1904 GMT (0304 HKT)
Terrorists don't represent Islam, but Muslims must step up efforts to counter some of the bigotry within the world of Islam, says Fareed Zakaria
October 24, 2014 -- Updated 1302 GMT (2102 HKT)
Scott Yates says extending Daylight Saving Time could save energy, reduce heart attacks and get you more sleep
October 27, 2014 -- Updated 0032 GMT (0832 HKT)
Reza Aslan says the interplay between beliefs and actions is a lot more complicated than critics of Islam portray
ADVERTISEMENT