25:
122:
276:
BlueJackQ is a website dedicated to bluejacking. The website contains a few bluejacking stories taken from the site's forum. The website also includes software that can be used for bluejacking and guides on how to bluejack which are slightly out of date but the basic principle still applies to most
230:
Bluejacking is usually not very harmful, except that bluejacked people generally don't know what has happened, and so may think that their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well. Bluejacking
255:
Disruptions are still possible, even in modern devices, by sending unsolicited pairing requests in rapid succession; this becomes disruptive because most systems display a full screen notification for every connection request, interrupting every other activity, especially on less powerful devices.
280:
The forums were opened on the
November 13, 2003 and has been the center of BluejackQ from the start. It currently has 4 moderators and has 20 different sections available to members. The areas included information about BluejackQ, reviews of mobile phones, media players, PDAs and Miscellaneous
134:
250:
than an attack. These messages can evoke either annoyance or amusement in the recipient. Users typically possess the ability to reject such messages, and this tactic is frequently employed in confined environments such as planes, trains, and buses. However, some forms of
207:
is, however, an extremely common shortening of "hijack', the act of taking over something. Ajack's original posts are hard to find, but references to the exploit are common in 2003 posts.
285:
was first released as a test version on
January 15, 2006, thus becoming the first bluejacking-related podcast. Podcasts 1, 2 and 3 featured three members of the forums.
175:
Bluetooth has a very limited range, usually around 10 metres (32.8 ft) on mobile phones, but laptops can reach up to 100 metres (328 ft) with powerful (
419:
141:
is being bluejacked by the
Siemens M75 pictured above. The text at the bottom of the screen reads "Add to contacts?" in Norwegian.
187:
Bluejacking was reportedly first carried out between 2001 and 2003 by a
Malaysian IT consultant who used his phone to advertise
465:
277:
makes of phone. Its forum has 4,000 registered users and 93,050 posts. The website has been featured in many news articles.
246:
to the software; rather, it is crafted to elicit a response from the user or add a new contact and can be seen as more of a
299:
The authentic bluejacking as described here is not the same exploit which was frequently depicted in the television series
89:
509:
168:
which typically contains a message in the name field (i.e., for bluedating) to another
Bluetooth-enabled device via the
61:
491:
108:
214:, except they describe bluejacking 44 Nokia 7650 phones instead of one, and the location is a garage, seemingly in
68:
301:
46:
75:
210:
Another user on the forum claims earlier discovery, reporting a near-identical story to that attributed to
42:
57:
157:
431:
252:
35:
218:, rather than a Malaysian Bank. Also, the message was an insult to Nokia owners rather than a
195:
phone owner in a
Malaysian bank. He also invented the name, which he claims is an amalgam of
8:
232:
82:
531:
377:
138:
536:
461:
408:
369:
381:
453:
395:
361:
445:
513:
495:
457:
349:
247:
409:
Do You Speak
American . Words That Shouldn't Be? . Sez Who? . Cyberspace | PBS
263:, which is the way in which mobile phones are illegally hacked via Bluetooth.
525:
506:
373:
219:
488:
323:
306:
260:
153:
16:
Sending of unsolicited messages over
Bluetooth to Bluetooth-enabled devices
281:
devices, general bluejacking threads and an off-topic area. The
BluejackQ
176:
121:
365:
318:
126:
192:
236:
196:
149:
24:
188:
133:
328:
282:
243:
215:
161:
432:"I did somthing that can be conciderd as a bluetooth rampage!"
350:"Mobile Phones as Computing Devices: The Viruses are Coming!"
165:
291:
203:, his username on Esato, a Sony Ericsson fan online forum.
169:
484:
482:
452:, Cambridge University Press, pp. 1–5, 2007-01-22,
129:
is bluejacking the Sony
Ericsson K600i pictured below.
507:
bluejackQ and jellyellie in the media - bluejackQ.com
479:
49:. Unsourced material may be challenged and removed.
347:
348:Dagon, D.; Martin, T.; Starner, T. (2004-01-01).
523:
288:The forums seem to have been unused since 2020.
242:The actual message itself doesn't deploy any
148:is the sending of unsolicited messages over
109:Learn how and when to remove this message
307:different and more invasive capabilities
132:
120:
524:
152:to Bluetooth-enabled devices such as
47:adding citations to reliable sources
18:
305:; that fictional exploit portrayed
13:
259:Bluejacking is also confused with
14:
548:
396:"Bluejacking 'a harmless prank'"
23:
34:needs additional citations for
500:
438:
424:
420:Bluejacking ‘a harmless prank'
413:
402:
388:
341:
1:
334:
458:10.1017/cbo9781139168564.001
271:
266:
7:
489:bluejackQ.com :: Index
446:"Introduction and overview"
312:
10:
553:
182:
512:October 5, 2006, at the
494:October 5, 2006, at the
354:IEEE Pervasive Computing
225:
292:Fictional reference in
450:Educational Leadership
142:
130:
235:campaigns to promote
136:
124:
366:10.1109/MPRV.2004.21
43:improve this article
398:. 25 November 2003.
233:guerrilla marketing
139:Sony Ericsson K600i
302:Person of Interest
294:Person of Interest
143:
131:
467:978-0-521-68512-2
231:has been used in
179:) transmitters.
119:
118:
111:
93:
544:
516:
504:
498:
486:
477:
476:
475:
474:
442:
436:
435:
428:
422:
417:
411:
406:
400:
399:
392:
386:
385:
345:
162:laptop computers
114:
107:
103:
100:
94:
92:
51:
27:
19:
552:
551:
547:
546:
545:
543:
542:
541:
522:
521:
520:
519:
514:Wayback Machine
505:
501:
496:Wayback Machine
487:
480:
472:
470:
468:
444:
443:
439:
430:
429:
425:
418:
414:
407:
403:
394:
393:
389:
346:
342:
337:
315:
297:
274:
269:
228:
222:advertisement.
185:
115:
104:
98:
95:
52:
50:
40:
28:
17:
12:
11:
5:
550:
540:
539:
534:
518:
517:
499:
478:
466:
437:
423:
412:
401:
387:
339:
338:
336:
333:
332:
331:
326:
321:
314:
311:
296:
290:
273:
270:
268:
265:
227:
224:
184:
181:
117:
116:
31:
29:
22:
15:
9:
6:
4:
3:
2:
549:
538:
535:
533:
530:
529:
527:
515:
511:
508:
503:
497:
493:
490:
485:
483:
469:
463:
459:
455:
451:
447:
441:
433:
427:
421:
416:
410:
405:
397:
391:
383:
379:
375:
371:
367:
363:
359:
355:
351:
344:
340:
330:
327:
325:
322:
320:
317:
316:
310:
308:
304:
303:
295:
289:
286:
284:
278:
264:
262:
257:
254:
249:
245:
240:
238:
234:
223:
221:
220:Sony Ericsson
217:
213:
208:
206:
202:
198:
194:
190:
180:
178:
173:
171:
167:
163:
159:
155:
154:mobile phones
151:
147:
140:
135:
128:
123:
113:
110:
102:
91:
88:
84:
81:
77:
74:
70:
67:
63:
60: –
59:
58:"Bluejacking"
55:
54:Find sources:
48:
44:
38:
37:
32:This article
30:
26:
21:
20:
502:
471:, retrieved
449:
440:
426:
415:
404:
390:
360:(4): 11–15.
357:
353:
343:
324:Bluesnarfing
300:
298:
293:
287:
279:
275:
261:Bluesnarfing
258:
241:
229:
211:
209:
204:
200:
191:to a single
186:
174:
172:protocol.
164:, sending a
145:
144:
105:
99:January 2008
96:
86:
79:
72:
65:
53:
41:Please help
36:verification
33:
319:Bluebugging
146:Bluejacking
127:Siemens M75
526:Categories
473:2024-02-16
335:References
237:advergames
193:Nokia 7650
69:newspapers
532:Bluetooth
374:1536-1268
272:BluejackQ
267:Companies
197:Bluetooth
150:Bluetooth
537:Spamming
510:Archived
492:Archived
382:14224399
313:See also
189:Ericsson
329:AirDrop
283:podcast
244:malware
216:Denmark
205:Jacking
183:Origins
177:Class 1
83:scholar
464:
380:
372:
85:
78:
71:
64:
56:
378:S2CID
248:prank
226:Usage
212:Ajack
201:ajack
166:vCard
137:This
125:This
90:JSTOR
76:books
462:ISBN
370:ISSN
199:and
170:OBEX
158:PDAs
62:news
454:doi
362:doi
253:DoS
239:.
160:or
45:by
528::
481:^
460:,
448:,
376:.
368:.
356:.
352:.
309:.
156:,
456::
434:.
384:.
364::
358:3
112:)
106:(
101:)
97:(
87:·
80:·
73:·
66:·
39:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.