Knowledge

Bluejacking

Source 📝

25: 122: 276:
BlueJackQ is a website dedicated to bluejacking. The website contains a few bluejacking stories taken from the site's forum. The website also includes software that can be used for bluejacking and guides on how to bluejack which are slightly out of date but the basic principle still applies to most
230:
Bluejacking is usually not very harmful, except that bluejacked people generally don't know what has happened, and so may think that their phone is malfunctioning. Usually, a bluejacker will only send a text message, but with modern phones it's possible to send images or sounds as well. Bluejacking
255:
Disruptions are still possible, even in modern devices, by sending unsolicited pairing requests in rapid succession; this becomes disruptive because most systems display a full screen notification for every connection request, interrupting every other activity, especially on less powerful devices.
280:
The forums were opened on the November 13, 2003 and has been the center of BluejackQ from the start. It currently has 4 moderators and has 20 different sections available to members. The areas included information about BluejackQ, reviews of mobile phones, media players, PDAs and Miscellaneous
134: 250:
than an attack. These messages can evoke either annoyance or amusement in the recipient. Users typically possess the ability to reject such messages, and this tactic is frequently employed in confined environments such as planes, trains, and buses. However, some forms of
207:
is, however, an extremely common shortening of "hijack', the act of taking over something. Ajack's original posts are hard to find, but references to the exploit are common in 2003 posts.
285:
was first released as a test version on January 15, 2006, thus becoming the first bluejacking-related podcast. Podcasts 1, 2 and 3 featured three members of the forums.
175:
Bluetooth has a very limited range, usually around 10 metres (32.8 ft) on mobile phones, but laptops can reach up to 100 metres (328 ft) with powerful (
419: 141:
is being bluejacked by the Siemens M75 pictured above. The text at the bottom of the screen reads "Add to contacts?" in Norwegian.
187:
Bluejacking was reportedly first carried out between 2001 and 2003 by a Malaysian IT consultant who used his phone to advertise
465: 277:
makes of phone. Its forum has 4,000 registered users and 93,050 posts. The website has been featured in many news articles.
246:
to the software; rather, it is crafted to elicit a response from the user or add a new contact and can be seen as more of a
299:
The authentic bluejacking as described here is not the same exploit which was frequently depicted in the television series
89: 509: 168:
which typically contains a message in the name field (i.e., for bluedating) to another Bluetooth-enabled device via the
61: 491: 108: 214:, except they describe bluejacking 44 Nokia 7650 phones instead of one, and the location is a garage, seemingly in 68: 301: 46: 75: 210:
Another user on the forum claims earlier discovery, reporting a near-identical story to that attributed to
42: 57: 157: 431: 252: 35: 218:, rather than a Malaysian Bank. Also, the message was an insult to Nokia owners rather than a 195:
phone owner in a Malaysian bank. He also invented the name, which he claims is an amalgam of
8: 232: 82: 531: 377: 138: 536: 461: 408: 369: 381: 453: 395: 361: 445: 513: 495: 457: 349: 247: 409:
Do You Speak American . Words That Shouldn't Be? . Sez Who? . Cyberspace | PBS
263:, which is the way in which mobile phones are illegally hacked via Bluetooth. 525: 506: 373: 219: 488: 323: 306: 260: 153: 16:
Sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices
281:
devices, general bluejacking threads and an off-topic area. The BluejackQ
176: 121: 365: 318: 126: 192: 236: 196: 149: 24: 188: 133: 328: 282: 243: 215: 161: 432:"I did somthing that can be conciderd as a bluetooth rampage!" 350:"Mobile Phones as Computing Devices: The Viruses are Coming!" 165: 291: 203:, his username on Esato, a Sony Ericsson fan online forum. 169: 484: 482: 452:, Cambridge University Press, pp. 1–5, 2007-01-22, 129:
is bluejacking the Sony Ericsson K600i pictured below.
507:
bluejackQ and jellyellie in the media - bluejackQ.com
479: 49:. Unsourced material may be challenged and removed. 347: 348:Dagon, D.; Martin, T.; Starner, T. (2004-01-01). 523: 288:The forums seem to have been unused since 2020. 242:The actual message itself doesn't deploy any 148:is the sending of unsolicited messages over 109:Learn how and when to remove this message 307:different and more invasive capabilities 132: 120: 524: 152:to Bluetooth-enabled devices such as 47:adding citations to reliable sources 18: 305:; that fictional exploit portrayed 13: 259:Bluejacking is also confused with 14: 548: 396:"Bluejacking 'a harmless prank'" 23: 34:needs additional citations for 500: 438: 424: 420:Bluejacking ‘a harmless prank' 413: 402: 388: 341: 1: 334: 458:10.1017/cbo9781139168564.001 271: 266: 7: 489:bluejackQ.com :: Index 446:"Introduction and overview" 312: 10: 553: 182: 512:October 5, 2006, at the 494:October 5, 2006, at the 354:IEEE Pervasive Computing 225: 292:Fictional reference in 450:Educational Leadership 142: 130: 235:campaigns to promote 136: 124: 366:10.1109/MPRV.2004.21 43:improve this article 398:. 25 November 2003. 233:guerrilla marketing 139:Sony Ericsson K600i 302:Person of Interest 294:Person of Interest 143: 131: 467:978-0-521-68512-2 231:has been used in 179:) transmitters. 119: 118: 111: 93: 544: 516: 504: 498: 486: 477: 476: 475: 474: 442: 436: 435: 428: 422: 417: 411: 406: 400: 399: 392: 386: 385: 345: 162:laptop computers 114: 107: 103: 100: 94: 92: 51: 27: 19: 552: 551: 547: 546: 545: 543: 542: 541: 522: 521: 520: 519: 514:Wayback Machine 505: 501: 496:Wayback Machine 487: 480: 472: 470: 468: 444: 443: 439: 430: 429: 425: 418: 414: 407: 403: 394: 393: 389: 346: 342: 337: 315: 297: 274: 269: 228: 222:advertisement. 185: 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 550: 540: 539: 534: 518: 517: 499: 478: 466: 437: 423: 412: 401: 387: 339: 338: 336: 333: 332: 331: 326: 321: 314: 311: 296: 290: 273: 270: 268: 265: 227: 224: 184: 181: 117: 116: 31: 29: 22: 15: 9: 6: 4: 3: 2: 549: 538: 535: 533: 530: 529: 527: 515: 511: 508: 503: 497: 493: 490: 485: 483: 469: 463: 459: 455: 451: 447: 441: 433: 427: 421: 416: 410: 405: 397: 391: 383: 379: 375: 371: 367: 363: 359: 355: 351: 344: 340: 330: 327: 325: 322: 320: 317: 316: 310: 308: 304: 303: 295: 289: 286: 284: 278: 264: 262: 257: 254: 249: 245: 240: 238: 234: 223: 221: 220:Sony Ericsson 217: 213: 208: 206: 202: 198: 194: 190: 180: 178: 173: 171: 167: 163: 159: 155: 154:mobile phones 151: 147: 140: 135: 128: 123: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 58:"Bluejacking" 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 502: 471:, retrieved 449: 440: 426: 415: 404: 390: 360:(4): 11–15. 357: 353: 343: 324:Bluesnarfing 300: 298: 293: 287: 279: 275: 261:Bluesnarfing 258: 241: 229: 211: 209: 204: 200: 191:to a single 186: 174: 172:protocol. 164:, sending a 145: 144: 105: 99:January 2008 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 319:Bluebugging 146:Bluejacking 127:Siemens M75 526:Categories 473:2024-02-16 335:References 237:advergames 193:Nokia 7650 69:newspapers 532:Bluetooth 374:1536-1268 272:BluejackQ 267:Companies 197:Bluetooth 150:Bluetooth 537:Spamming 510:Archived 492:Archived 382:14224399 313:See also 189:Ericsson 329:AirDrop 283:podcast 244:malware 216:Denmark 205:Jacking 183:Origins 177:Class 1 83:scholar 464:  380:  372:  85:  78:  71:  64:  56:  378:S2CID 248:prank 226:Usage 212:Ajack 201:ajack 166:vCard 137:This 125:This 90:JSTOR 76:books 462:ISBN 370:ISSN 199:and 170:OBEX 158:PDAs 62:news 454:doi 362:doi 253:DoS 239:. 160:or 45:by 528:: 481:^ 460:, 448:, 376:. 368:. 356:. 352:. 309:. 156:, 456:: 434:. 384:. 364:: 358:3 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Bluejacking"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message

Siemens M75

Sony Ericsson K600i
Bluetooth
mobile phones
PDAs
laptop computers
vCard
OBEX
Class 1
Ericsson
Nokia 7650
Bluetooth
Denmark
Sony Ericsson
guerrilla marketing
advergames
malware

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.