Email Security: Outsmart a Politician

Website design By BotEap.comAbout 20 years ago, my life was in transition. I worked full time for a non-profit agency for a couple of years. The work was exhausting and involved a lot of travel. My boss was a highly motivated man who had little interest in life outside of work and expected the rest of us to be the same.

Website design By BotEap.comI wasn’t there. I finished college, wrote a book, ended a bad relationship, and felt genuinely free for the first time in a long time. He wanted to work for property rights for poor South Africans, but he also wanted to play the guitar.

Website design By BotEap.comAround that time, I started listening to a popular British band called Radiohead. I remember telling a date, a teacher, that I liked them. She said, “Oh yeah. My eighth graders too.” That was our last date.

Website design By BotEap.comOne of the band’s great songs, featuring a searing solo from the incomparable guitarist Jonny Greenwood, contains the following lyrics:

Website design By BotEap.com You do it to yourself, you do it

Website design By BotEap.comAnd that’s what really hurts

Website design By BotEap.comDo you do it to yourself, only to you?

Website design By BotEap.comyou and no one else

Website design By BotEap.comI’d like to dedicate that song to Hillary Clinton, her campaign chairman John Podesta, and the Democratic National Committee…

Website design By BotEap.comhacked to pieces

Website design By BotEap.comHillary Clinton’s email problems are legendary.

Website design By BotEap.comFirst there was the private server on the base. Then the DNC’s emails were hacked, costing chairwoman Debbie Wasserman Schultz her job. And this month, the whistleblowing news organization WikiLeaks, which, contrary to media reports, is not pro-Trump but rabidly anti-Clinton, seized John Podesta’s personal emails.

Website design By BotEap.comRegardless of what you think about the content of these leaks (which, frankly, I find boring), the fact that these powerful people have been hacked so easily is staggering. What were they thinking? Didn’t they realize that email is just as safe as snail mail if a determined hacker is after it?

Website design By BotEap.comclearly not. Like Colin Powell, whose own private emails were hacked a while back, Podesta was using a commercial email provider: Gmail.

Website design By BotEap.comFor a famous person, using a free ad-supported email service like Google or Yahoo is like a platoon of marines driving around Mosul in a VW minibus. Someone is going to put holes in you.

Website design By BotEap.comThe Obama administration blames Russia for these hacks, which suits Hillary very well: she can deflect all the issues by focusing on the supposed threat to our national security and electoral sovereignty. But if a Russian did the trick, he could have been a 10 year old… because the technique used was the simplest and oldest trick in the book.

Website design By BotEap.comGo Phish

Website design By BotEap.comCybersecurity firm SecureWorks says the hacking method used to gain access to Podesta’s email account involved a link in an innocent-looking email doctored to appear to come from Google. The email asked Podesta to sign into his Google account by clicking a hyperlink, which he did.

Website design By BotEap.comWhen Podesta clicked on the link, he was taken to a fake Google landing page where he entered his username and password. With that, the hacker had access to all of his email history.

Website design By BotEap.comIt’s called “phishing.” Instead of a sophisticated brute force attack to crack Podesta’s password, the hacker tricked him into giving up his login details voluntarily.

Website design By BotEap.comIn other words, Podesta did it to himself. Just him and no one else.

Website design By BotEap.comAvoiding the email phishing hook

Website design By BotEap.comHow can you avoid the same fate? It is easier than you think:

  • When you receive an email asking you to log in to a website, be sure to check the link. All you have to do is hover your mouse over the link. Google’s real address ends in .com. That’s the last piece of text before the first backslash in the link that you see when you hover over it. This one ended in “tk,” which refers to the South Pacific island of Tokelau: a dead giveaway, if you’re looking, that is.

  • If you click on a link like Podesta’s, check the URL in the address bar of the web page you land on before doing anything else. If it ends in something other than the actual domain name of the correct publisher (ie Google.com), you’re being phished. The Podesta phishing link ended in “tk”, the last part of the address before the first backslash. That would have been clearly visible in your web browser’s address bar, again, if you’d been paying attention.

  • Don’t use free email for anything sensitive. Nothing from Google, Outlook, Yahoo, AOL, or Mail.com. In addition to being ridiculously easy to hack, they all mine your personal emails for information about you that can be used to target ads to you.
Website design By BotEap.comgo the last mile

Website design By BotEap.comTo be super safe, sign up for a secure email service like Protonmail or Tutanota. In addition to being securely encrypted and unreadable by the companies that host them, both are run by privacy zealots and are based in Europe, out of reach of American spies.

Website design By BotEap.comThere you have it. When it comes to email hacking, there is absolutely no need to do it yourself.

Leave a Reply

Your email address will not be published. Required fields are marked *