You are on page 1of 6

How Bluetooth Surveillance Works

Page 1 of 6

How Bluetooth Surveillance Works
Inside this Article
1. How Bluetooth Surveillance Works 2. Bluetooth Discoverability 3. Bluetooth Positioning and Tracking

How Bluetooth Surveillance Works
If you were to randomly pick up a piece of electronics equipment in your house, there's a reasonable chance that it has Bluetooth capabilities, especially if the gadget in question is fairly new. Whether it's a cell phone, smartphone, laptop, printer or keyboard, Bluetooth wireless technology has made life easier for those of us with too many electronics on our hands. Bluetooth devices get rid of frustrating wires and expensive adapters by using short-range radio signals to connect devices to each other and send information back and forth.

If you own a Bluetooth device, can someone trace your activity

Bluetooth is especially common in mobile phones, which make up more
http://10.5.4.102/hsw/bluetooth_surveillance.htm 6/30/2010

laptops at the latter. Any Bluetooth device can communicate with up to seven other devices at a time. This allows other Bluetooth phones to locate you. Bluetooth Discoverability Before we dive into Bluetooth surveillance. Bluetooth headsets. for example.which has some people concerned. although simply a harmless prank. and you've kept your phone with you and left Bluetooth on "discoverable" mode. In fact. It reads: "We know where you are. read on. we'll want to take a look at how Bluetooth itself works and understand what makes the technology traceable. http://10. Security has long been an issue with this technology -. Because Bluetooth devices are to some degree traceable.this allows you to keep your phone in your pocket. 2.perhaps the shopping district of a big city.5. The phrase Bluetooth surveillance might conjure up images of Big Brother in George Orwell's dystopian novel of the future. though.bluejacking. right? Such a thing is possible. so headsets and other Bluetooth accessories use very little in the way of batteries. phones usually operate at the former.4. allows Bluetooth users to send out unsolicited messages to nearby devices.htm 6/30/2010 . for instance. and who would use it? Can it be used for good or for evil? To learn about Bluetooth surveillance and whether or not you should remain discoverable. As you linger in front of a shoe store and consider a new pair. the concept of Bluetooth surveillance has been introduced into the tech world.a technology that can search for and locate other devices that also have Bluetooth -.How Bluetooth Surveillance Works Page 2 of 6 than 60 percent of the Bluetooth market . transmit calls from your phone to the headset in your ear -.102/hsw/bluetooth_surveillance. It's also helpful to drivers wanting to cruise around hands-free . Having fun shopping?" Sounds like something out of a movie. and it's happened before. The band is unlicensed for low-power use. it's the very nature of Bluetooth -. While any two Bluetooth devices can share data at a range between 10 and 100 meters (33 and 328 feet). Bluetooth devices use the free." but is that really the idea? How does Bluetooth surveillance work. Maybe you're just doing some casual window shopping. scientific and medical devices. "1984. Imagine. backpack or handbag while walking around.4gigahertz radio band known as ISM . your phone beeps: Someone's sent you a text message. talking a walk through a crowded area -. which stands for industrial.

102/hsw/bluetooth_surveillance. Every device has its own address. After you turn any Bluetooth-capable device on.4.10. where you can select whether or not your phone or laptop is visible to others within the area. If several Bluetooth devices are set on discoverable mode. while the last three bytes (67:89:10) are assigned by the manufacturer. The first three bytes (01:23:45) are assigned to the specific manufacturer of the device.htm 6/30/2010 . a unique 48-bit identifier with six bytes of information that might look like this: 01:23:45:67:89. or is there a simpler way? To learn how a Bluetooth surveillance network is set up. So how could someone track your movement if you left your phone on discoverable? Would they have to follow you around all day long.5. Since many terms related to Bluetooth surveillance use some variation of the Bluetooth brand name. they all have the ability to search for and locate each other. read the next page. http://10. it helps to get a few sorted out." This information is typically found in the "settings" option of a device's control panel. These make each device entirely unique. so long as they remain within range. the most basic security feature on it is the ability to go into one of two modes: "discoverable" or "non-discoverable.How Bluetooth Surveillance Works Page 3 of 6 Keeping a Bluetooth device in "discoverable" mode allows other gadgets with Bluetooth to locate it within a certain range.

How Bluetooth Surveillance Works Page 4 of 6 Bluejacking. even though the name implies it. changes or copies information from a person's phone. More serious infringements of bluesnarfing include taking over someone's phone and using it to make phone calls. send text messages or surf the Web. won't harm or steal anyone's information. such as a phone book.102/hsw/bluetooth_surveillance. The term is simply a hybrid of Bluetooth and "ajack. which would easily blow your cover. a prank that involves sending fellow Bluetooth users unsolicited text messages. on the other hand. Could shopping mall stores do this to track http://10.5.4. Bluesnarfing. Bluejacking. which is most likely a 10 -meter (33-foot) circle around you.htm 6/30/2010 . doesn't actually have anything to do with hijacking. happens when an attacker reads. Bluetooth Positioning and Tracking Locating several Bluetooth users with a typical mobile phone is relatively simple: You just turn on your phone and search for every discoverable device. although potentially irritating to users who don't want any part of the joke. address book or calendar. Setting up a network of Bluetooth receivers that record the locations of spec Bluetooth surveillance possible. If you wanted to track a specific address." the username of the Malaysian IT who discovered the glitch and spread the news over the Internet. you'd have to visually locate that person's physical device and follow it around all day. But you could only monitor the people moving in and out of your Bluetooth's range.

htm 6/30/2010 . The point of installing the system was not to put the zoo's patrons under surveillance or to see which exhibitions people went to more often.5. A shopping mall. A parent could attach a "Bluetag" onto a child. Each Bluetooth receiver acts like any regular Bluetooth device: It searches for every device within range. Still. recording and sending any data back to a single address. if you're concerned that someone might be able to track you down via Bluetooth. So how have people used this system to track people? One of the earliest uses of Bluetooth positioning and tracking technology is the Aalborg Zoo. Although it wouldn't present a perfectly accurate description of a person's movement.How Bluetooth Surveillance Works Page 5 of 6 Creating a Bluetooth surveillance network solves this problem. As he walked toward the street.4. Instead. five receivers with a radius of 20 meters (66 feet) would be needed to track that person's movement. unless you've chosen to include your name or some other personally identifiable information in the name of your phone. Some people worry about others using this sort of technology illegally and maliciously. the largest zoological garden in Denmark. the second for the next 20 meters. If several Bluetooth-enabled receivers are strategically placed to cover a large area. store owners could analyze shopper's behavior and change advertisement positions accordingly without anyone ever knowing. special "Bluetags" were made available to prevent parents from losing valuable belongings that tend to wander off -. the first receiver would track him for the length of the first 20 meters. It's difficult for someone to use Bluetooth to identify you in particular. smart phone or PDA. http://10. the best defense is to make your device non-discoverable to others when not using it. could install a Bluetooth surveillance system throughout its entire area to monitor the movements of Bluetooth owners.102/hsw/bluetooth_surveillance.their children. and Bluetooth receivers around the zoo would track the child's movement. the system could create a general map of his path and even compare how long someone stays in a certain area. for example. With this knowledge. If a person walked down a 100-meter-long (328-foot-long) street and each Bluetooth receiver had a range of 10 meters. they can track the positions of any discoverable device. and so on for the length of the street.

How Bluetooth Surveillance Works Page 6 of 6 http://10.5.htm 6/30/2010 .102/hsw/bluetooth_surveillance.4.