Bluetooth Is A Wireless Technology Computer Science Essay


This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

Bluetooth is a wireless technology which is used to exchange information over short range of distances by making use of short-wavelength radio transmissions. This technology is used in mobile as well as fixed devices. It enables the connection of several devices at the same time.

Given that the Bluetooth has been used for a long time, there exist several flaws in the system. These flaws have been subject to different types of attacks over time, vulnerable to hacking. which makes the technology very

Types of Bluetooth hacking:


The first most popular attack on Bluetooth enables devices is Bluejacking. This type of attack enables unknown people to send unwanted messages or electronic business cards to Bluetooth enabled mobile phones. The attackers modify the procedure for card passing so as to make the message to be sent to appear as a business card and then send the business card to a nearby mobile phone which is Bluetooth enabled.

Bluejacking tools are very easy to use and these messages can be shooted in crowdy places for examples in shopping malls. Some people even use the bluejacking technique to send commercial advertisement messages to people passing nearby.


The Bluesnarfing attack is much more damaging to the bluejacking technique as it enables you to wirelessly connect to to Bluetooth enables mobile phones without any knowledge from the owner and copy their the mobile phone's address book, their sms messages, their call logs and some more advanced features enable you to to update the directory of the mobile by adding new contacts in the mobile phones.

Most bluesnarfing tools are downloaded as JAR files. Bluesnarfing works, as does bluejacking, through the mechanism for exchanging business cards. Using the OBEX protocol, which is commonly used for such exchanges, the bluesnarfing software connects to a target Bluetooth device via Bluetooth's OBEX Push profile. Then, however, instead of pushing a business card, it pulls, using a "get" request for files with known names, such as the phonebook file (telecom/pb.vcf) or the calendar file (telecom/cal.vcs).


The Bluebugging attack is more powerful than the bluejacking and bluesnarfing attacks. It allows the attacker to take complete control of your mobile phone without the user knowing anything about it. They can make phone calls, listen to conversations where the phone is located. Bluesanrfing capabilities also exist in bluebugging tools like copying the phone book and the the phone's call list.

What factors make the Bluetooth technology vulnerable?

Previous Bluetooth enabled devices contined many flaws.

Users use pins which are short in length and easy to find out.

Users accepting pairing blindly from unknows sources.

Motivated hackers who want to gain valuable information.

People leaving their Bluetooth permanently on.

How to Bluejack

1. Find a busy place where lots of mobile phones might be, such as shopping centres, trains, bars or cinemas

2. Create a new entry in your phone's address book like 'Hi you've been bluejacked'. Attach a picture if you want to.

3. Search the area for other Bluetooth phones to contact and choose one.

4. Send your message. They then receive the message, 'Hi you've been bluejacked'.

5. Keep a look out for when your 'victim' gets the message and the puzzled look on their face.

Comparison between Bluetooth Hacking Tools:


Source File


Complexity/Ease of Use



Types of attack


Super Bluetooth Hack 1.6

Jar File



Find Bluetooth enabled devices.

Copy Phone Book, Copy SMS messages.

Copy Logs (Dialled, Received calls).

Make calls .

Retrieve Mobile Information.

For Hacking


Pairing Required


Jar File



Scan for Bluetooth enabled devices.

Access logs.

For proof of concept, educational, audit and testing purposes only.


Pairing Required

Works only on old version of mobile phones


Jar file



Scan for Bluetooth enabled devices.

Shoot messages.

For marketing/commercial puposes


Pairing Required

Magic Blue Hack

Jar File



Scan for Bluetooth enabled devices.

Send Messages

Read Phone Book.

For Hacking


Pairing Required



For Hacking



Security Tips to prevent attacks on mobile phones:

Enable Passcode Lock on Your phone

The most basic precaution you can take is to enable passcode lock and set it to automatically engage after a brief period of inactivity. By default, a passcode is not required to unlock the phone. Most people would put off this security measure for ease of use and convenience. However, the truth is that once you have it enabled, it becomes second nature and you would not notice any difference. It is recommended that you set a strong passcode. In the event of a physical theft, this will increase the effort required to compromise your phone.

Disable Features That Could Be Accessed Without Entering the Passcode

This would prevent the use of applications from your phone without your knowledge.

Disable geotagging on the phone.

This will prevent attackers find out where you are located.

Erase All the Data Before Return, Repair, or Resale of Your phone.

Erase all confidential information so that attackers cannt retrieve your personal information.

Regularly Update the phone's Firmware or Operating system.

This will nebale you to get the latest security features for your mobile phones.

Disable Bluetooth When Not in Use

Disabling Bluetooth when not in use will prevent attackers from getting access to you phone when not in use.

Writing Services

Essay Writing

Find out how the very best essay writing service can help you accomplish more and achieve higher marks today.

Assignment Writing Service

From complicated assignments to tricky tasks, our experts can tackle virtually any question thrown at them.

Dissertation Writing Service

A dissertation (also known as a thesis or research project) is probably the most important piece of work for any student! From full dissertations to individual chapters, we’re on hand to support you.

Coursework Writing Service

Our expert qualified writers can help you get your coursework right first time, every time.

Dissertation Proposal Service

The first step to completing a dissertation is to create a proposal that talks about what you wish to do. Our experts can design suitable methodologies - perfect to help you get started with a dissertation.

Report Writing

Reports for any audience. Perfectly structured, professionally written, and tailored to suit your exact requirements.

Essay Skeleton Answer Service

If you’re just looking for some help to get started on an essay, our outline service provides you with a perfect essay plan.

Marking & Proofreading Service

Not sure if your work is hitting the mark? Struggling to get feedback from your lecturer? Our premium marking service was created just for you - get the feedback you deserve now.

Exam Revision

Exams can be one of the most stressful experiences you’ll ever have! Revision is key, and we’re here to help. With custom created revision notes and exam answers, you’ll never feel underprepared again.