
Nếu bạn nhặt ngẫu nhiên một thiết bị điện tử trong nhà , rất có thể nó có khả năng Bluetooth , đặc biệt nếu thiết bị được đề cập là khá mới. Cho dù đó là điện thoại di động , điện thoại thông minh , máy tính xách tay , máy in hay bàn phím , công nghệ không dây Bluetooth đã giúp cuộc sống của chúng ta trở nên dễ dàng hơn với những người có quá nhiều thiết bị điện tử trên tay. Các thiết bị Bluetooth loại bỏ những sợi dây khó chịu và bộ điều hợp đắt tiền bằng cách sử dụng tín hiệu vô tuyến tầm ngắn để kết nối các thiết bị với nhau và gửi thông tin qua lại.
Bluetooth đặc biệt phổ biến trong điện thoại di động, chiếm hơn 60% thị trường Bluetooth [nguồn: Bialoglowy ]. Ví dụ: tai nghe Bluetooth truyền cuộc gọi từ điện thoại đến tai nghe trong tai - điều này cho phép bạn giữ điện thoại trong túi, ba lô hoặc túi xách khi đi bộ xung quanh. Nó cũng hữu ích cho những người lái xe muốn di chuyển rảnh tay [nguồn: Bajarin ].
Tuy nhiên, hãy tưởng tượng, đang nói chuyện đi bộ qua một khu vực đông đúc - có lẽ là khu mua sắm của một thành phố lớn. Có thể bạn chỉ đang thực hiện một số hoạt động mua sắm thông thường trên cửa sổ và bạn đã giữ điện thoại bên mình và để Bluetooth ở chế độ "có thể phát hiện". Điều này cho phép các điện thoại Bluetooth khác xác định vị trí của bạn. Khi bạn nán lại trước cửa hàng giày và xem xét một đôi mới, điện thoại của bạn phát ra tiếng bíp: Ai đó đã gửi cho bạn một tin nhắn văn bản. Nó có nội dung: "Chúng tôi biết bạn đang ở đâu. Mua sắm vui vẻ chứ?" Nghe giống như một cái gì đó trong một bộ phim, phải không?
Một điều như vậy là có thể, và nó đã xảy ra trước đây. Trên thực tế, đó là bản chất của Bluetooth - một công nghệ có thể tìm kiếm và định vị các thiết bị khác cũng có Bluetooth - khiến một số người lo ngại. Bảo mật từ lâu đã là một vấn đề với công nghệ này - chẳng hạn như bluejacking , mặc dù chỉ đơn giản là một trò đùa vô hại, cho phép người dùng Bluetooth gửi các tin nhắn không mong muốn đến các thiết bị lân cận. Bởi vì các thiết bị Bluetooth có thể theo dõi ở một mức độ nào đó, khái niệm giám sát Bluetooth đã được đưa vào thế giới công nghệ.
The phrase Bluetooth surveillance might conjure up images of Big Brother in George Orwell's dystopian novel of the future, "1984," but is that really the idea? How does Bluetooth surveillance work, and who would use it? Can it be used for good or for evil? To learn about Bluetooth surveillance and whether or not you should remain discoverable, read on.
Bluetooth Discoverability

Before we dive into Bluetooth surveillance, we'll want to take a look at how Bluetooth itself works and understand what makes the technology traceable. Bluetooth devices use the free, 2.4-gigahertz radio band known as ISM, which stands for industrial, scientific and medical devices. The band is unlicensed for low-power use, so headsets and other Bluetooth accessories use very little in the way of batteries. While any two Bluetooth devices can share data at a range between 10 and 100 meters (33 and 328 feet), phones usually operate at the former, laptops at the latter. Any Bluetooth device can communicate with up to seven other devices at a time.
After you turn any Bluetooth-capable device on, the most basic security feature on it is the ability to go into one of two modes: "discoverable" or "non-discoverable." This information is typically found in the "settings" option of a device's control panel, where you can select whether or not your phone or laptop is visible to others within the area.
If several Bluetooth devices are set on discoverable mode, they all have the ability to search for and locate each other, so long as they remain within range. Every device has its own address, a unique 48-bit identifier with six bytes of information that might look like this: 01:23:45:67:89.10. The first three bytes (01:23:45) are assigned to the specific manufacturer of the device, while the last three bytes (67:89:10) are assigned by the manufacturer. These make each device entirely unique.
So how could someone track your movement if you left your phone on discoverable? Would they have to follow you around all day long, or is there a simpler way? To learn how a Bluetooth surveillance network is set up, keep reading.
Bluetooth Positioning and Tracking

Locating several Bluetooth users with a typical mobile phone is relatively simple: You just turn on your phone and search for every discoverable device. But you could only monitor the people moving in and out of your Bluetooth's range, which is most likely a 10-meter (33-foot) circle around you. If you wanted to track a specific address, you'd have to visually locate that person's physical device and follow it around all day, which would easily blow your cover.
Creating a Bluetooth surveillance network solves this problem. If several Bluetooth-enabled receivers are strategically placed to cover a large area, they can track the positions of any discoverable device, recording and sending any data back to a single address. Each Bluetooth receiver acts like any regular Bluetooth device: It searches for every device within range. If a person walked down a 100-meter-long (328-foot-long) street and each Bluetooth receiver had a range of 10 meters, five receivers with a radius of 20 meters (66 feet) would be needed to track that person's movement. As he walked toward the street, the first receiver would track him for the length of the first 20 meters, the second for the next 20 meters, and so on for the length of the street.
So how have people used this system to track people? One of the earliest uses of Bluetooth positioning and tracking technology is the Aalborg Zoo, the largest zoological garden in Denmark. The point of installing the system was not to put the zoo's patrons under surveillance or to see which exhibitions people went to more often. Instead, special "Bluetags" were made available to prevent parents from losing valuable belongings that tend to wander off -- their children. A parent could attach a "Bluetag" onto a child, and Bluetooth receivers around the zoo would track the child's movement.
Some people worry about others using this sort of technology illegally and maliciously. A shopping mall, for example, could install a Bluetooth surveillance system throughout its entire area to monitor the movements of Bluetooth owners. Although it wouldn't present a perfectly accurate description of a person's movement, the system could create a general map of his path and even compare how long someone stays in a certain area. With this knowledge, store owners could analyze shopper's behavior and change advertisement positions accordingly without anyone ever knowing.
It's difficult for someone to use Bluetooth to identify you in particular, unless you've chosen to include your name or some other personally identifiable information in the name of your phone, smart phone or PDA . Still, if you're concerned that someone might be able to track you down via Bluetooth, the best defense is to make your device non-discoverable to others when not using it.
Bluetooth Lingo
Since many terms related to Bluetooth surveillance use some variation of the Bluetooth brand name, it helps to get a few sorted out.
Bluejacking, a prank that involves sending fellow Bluetooth users unsolicited text messages, doesn't actually have anything to do with hijacking, even though the name implies it. The term is simply a hybrid of Bluetooth and "ajack," the username of the Malaysian IT who discovered the glitch and spread the news over the Internet.
Bluejacking, although potentially irritating to users who don't want any part of the joke, won't harm or steal anyone's information. Bluesnarfing, on the other hand, happens when an attacker reads, changes or copies information from a person's phone, such as a phone book, address book or calendar. More serious infringements of bluesnarfing include taking over someone's phone and using it to make phone calls, send text messages or surf the Web.
Originally Published: Jul 28, 2008
Bluetooth Surveillance FAQ
Can you track someone through Bluetooth?
Can Bluetooth be used for spying?
Can someone connect to my Bluetooth without me knowing?
What is Bluetooth surveillance?
Can Bluetooth detect proximity?
Lots More Information
Related Articles
- How Bluetooth Works
- Top 5 Bluetooth Gadgets
- How Cell Phones Work
- How Radio Works
- What is bluejacking?
- How Spies Work
- How Hackers Work
- How Wiretapping Works
- Is the FBI reading my e-mail?
- Is your workplace tracking your computer activities?
More Great Links
- Bluetooth.com
Sources
- Bialoglowy, Marek. "Bluetooth security review." Security Focus. April 25, 2005. (July 14, 2008). http://www.securityfocus.com/infocus/1830
- Hallberg, Josef, Marcus Nilsson and Kåre Synnes. "Bluetooth positioning." Luleå University of Technology: Centre for Distance-spanning Technology, Department of Computer Science and Electrical Engineering. (July 21, 2008). http://media.csee.ltu.se/publications/2002/hallberg02bluetooth.pdf
- Kostakos, Vassilis and Panos Kostakos. "Intelligence gathering by capturing the social processes within prisons." University of Bath: Department of Computer Science, Department of European Studies and Modern Languages. (July 14, 2008). http://arxiv.org/ftp/arxiv/papers/0804/0804.3064.pdf
- Pogue, David. "Bluetooth and the end of audio wiring." New York Times. Aug. 16, 2007. (July 14, 2008). http://www.nytimes.com/2007/08/16/technology/circuits/16pogue.html?scp=1&sq=bluetooth&st=cse