You are on page 1of 15

A Technical Seminar Report

on

BLUEJACKING

Submitted In Partial fulfillment of the requirements for award of Degree

BACHELOR OF TECHNOLOGY

in

COMPUTER SCIENCE AND ENGINEERING (AI&ML)

by

ADABALA HIMA DHARANI

(207R1A6601)

CMR TECHNICAL CAMPUS


UGC-AUTONOMOUS, Accredited by NBA, NAAC.
Permanently Affiliated to JNTUH, Approved by AICTE, New Delhi Kandlakoya
(V), Medchal Road, Hyderabad-501401.
2020-2024
CMR TECHNICAL CAMPUS
UGC-AUTONOMOUS, Accredited by NBA, NAAC.
Permanently Affiliated to JNTUH, Approved by AICTE, New Delhi
Kandlakoya (V), Medchal Road, Hyderabad-501401.

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING (AI&ML)

CERTIFICATE

This is to certify that the Seminar Report entitled with "BLUEJACKING" is a record of
bonafide work carried out by ADABALA HIMA DHARANI with bearing hall ticket number
207R1A6601 during the academic year 2023-24 in partial fulfillment of the award of the degree of
Bachelor of Technology in Computer Science and Engineering (AI&ML).

Seminar Coordinator Head of the Department

Mr. Sk. Sharif Dr. S Rao Chintalapudi


ACKNOWLEDGEMENT
First and foremost, I wish to express our deep and sincere feeling of gratitude towards our great
institution, CMR Technical Campus for providing us with opportunity of fulfillment of our long
cherished goal of becoming BACHELOR OF TECHNOLOGY IN COMPUTER SCIENCE AND
ENGINEERING(AI&ML). I am very much thankful to our Director Dr. A. Rajireddy. Head of the
Department Dr. S Rao Chintalapudi having provided me an excellent academic atmosphere in the
institution. I also thank our seminar guide Ms. R. Swathi for extending her support in completion of
Technical Seminar Report. We would like to express our sincere gratitude to our Chairman Shri. C.
Gopal Reddy for his encouragement throughout the course of this seminar.

I also thank all the staff members and friends who assisted me.

A HIMA DHARANI

207R1A6601
ABSTRACT
Bluetooth is a wireless technology that provides short range communications.Blutooth consist of

very limited range;usually around 10 meters on mobile phones, but for laptops it can reach up to

100 meters with powerful transmitters. Bluetooth is for synchronizing email,sending messages,or

connecting to a remote headset.Sending of unsolicited messages over Bluetooth-enabled devices

such as mobile phones,PDA’s or laptop computers via the OBEX protocol is called bluejacking.

This message transmitting attack resembles spam and phishing attacks conducted against email

users. Bluejacking is a form of cyberbullying. It’s not illegal, but it can be used to send out spam

or viruses. You’ll never see the sender’s real name or address, so you have no way to verify that

they’re who they say they are.In order to carry out a bluejacking, the sending and receiving

devices must be within 10 meters of one another.


CONTENTS
Page No.

CHAPTER 1 INTRODUCTION 1
CHAPTER 2 WHAT IS BLUEJACKING? 2
CHAPTER 3 FEATURES OF BLUEJACKING 3
3.1 BLUETOOTH TECHNOLOGY 3
3.2 UNSOLICITED MESSAGES 3
3.3 LIMITED RANGE 3
3.4 NON MALICIOUS 3
3.5 ANONIMITY 3
3.6 LIMITED FUNCTIONALITY 3
3.7 DEVICE COMPATABILITY 3
3.8 DEVICE DISCOVERY 3
CHAPTER 4 HOW TO BLUEJACK? 4
CHAPTER 5 BLUEJACKING ARCHITECTURE 5
CHAPTER 6 ADVANTAGES AND DISADVANTAGES 6
6.1 ADVANTAGES 6
6.2 DISADVANTAGES 7
CHAPTER 7 CONCLUSION 8
CHAPTER 8 BIBLIOGRPAHY 9
LIST OF FIGURES PAGE NO.

Figure 1.1 Origin of Bluejacking 1

Figure 2.1 Bluejacking 2

Figure 5.1 Piconet 5


CHAPTER - 1
INTRODUCTION

The messages tend to be anonymous since the recipient has no idea who has sent the bluejack, and the
recipient has no information about the bluejacker, except for the name and model of the bluejacker’s
mobile phone. Because of Bluetooth’s short-range networking capabilities, bluejacking can only occur
between actors who are within 10 meters of each other, which makes this activity highly location-
dependent. Contrary to what the name suggests, the bluejack recipient’s phone is not hijacked; that is, the
phone is at no time under the control of the bluejacker.
Bluejackers, however, ignore the conflict between the control exerted by the bluejacker and the lack of
defensive measures that can be taken by the recipient when his or her possessional territory is violated. To
gain a further understanding of why bluejackers would engage in a practice that disrupts the social
conventions of public space, we ask the following research questions:
1. What are the characteristics of the public spaces in which bluejacking occurs?
2. What are the alternative social conventions that might arise from the practice of bluejacking?
3. What implications does this appropriation have for the design of mobile social systems?
This bluejack phenomenon started after a Malaysian IT consultant named “Ajack” posted a comment on a
mobile phone forum. Ajack told IT Web that he used his Ericsson cellphone in a bank to send a message
to someone with a Nokia 7650. Becoming bored while standing in a bank queue, Ajack did a Bluetooth
discovery to see if there was another Bluetooth device around. Discovering a Nokia 7650 in the vicinity,
he created a new contact and filled in the first name with ‘Buy Ericsson!' and sent a business card to the
Nokia phone.

Figure.1.1:Origin of Bluejscking
CHAPTER – 2

WHAT IS BLUEJACKING?
Bluejacking is used for sending unauthorized messages to another Bluetooth device. Bluetooth is a high-
speed but very short-range wireless technology for exchanging data between desktop and mobile
computers and other devices.
Bluetooth has a very small range so only when a person is within 10 (highly location dependent) meters
distance of a bluejacker and his Bluetooth enabled in his device, does bluejacking happen. Bluejacking
involves sending unsolicited business cards, messages, or pictures. The bluejacker discovers the
recipient’s phone via doing a scan of Bluetooth devices. He would then select any device, craft a
message as is allowed within the body of the phone’s contact interface. He stays near the receiver to
monitor his reactions.

The messages are anonymous to the recipient as only the mobile name and model number of the
bluejacker’s phone are displayed in the message. The only exception to the 10 meters distance is the
involvement of a laptop, which can be done within a 100-meter range of the recipient. Although there is
an infringement of territory of the recipient, bluejacking is not illegal, as it does not access the resources
of the recipient device and does not steal anything either.

Figure.2.1: Bluejacking
.
CHAPTER - 3

FEATURES OF BLUEJACKING
Bluejacking is a relatively harmless form of wireless communication where someone sends unsolicited
messages or data to a Bluetooth-enabled device, typically a mobile phone, within close proximity. Here
are some key features of bluejacking:

3.1 Bluetooth Technology

Bluejacking exploits the Bluetooth wireless technology to send messages or data between
devices.

3.2 Unsolicited Messages

Bluejackers send unsolicited messages or contact information to other Bluetooth-enabled devices. These
messages can be text-based and may include jokes or greetings.
3.3 Limited Range

Bluejacking typically works within a short range, usually up to 10 meters or 33 feet, as it relies
on Bluetooth's short-range communication capabilities.

3.4 Non-Malicious

Unlike other forms of wireless attacks, bluejacking is generally harmless and doesn't harm the
target device or steal personal information.

3.5 Anonimity

Bluejackers remain anonymous because they don't establish a connection or pair with the target
device. They simply send a message without any further interaction.

3.6 Limited Functionality

Bluejacking is usually limited to sending short text messages or contact information. It doesn't
grant access to the target device's data or functions.

3.7 Device Compatability

Both the sender and recipient devices must have Bluetooth capabilities for bluejacking to work.

3.8 Device Discovery

Bluejackers need to scan for discoverable Bluetooth devices in their vicinity to identify
potential targets.
44

CHAPTER-4
HOW TO BLUEJACK?

Bluejacking is the practice of sending unsolicited messages or digital business cards to other Bluetooth-
enabled devices, typically within a short range. It's considered more of a playful or harmless activity rather
than a malicious one. Here are the steps to bluejack:
Enable Bluetooth: Make sure your Bluetooth is enabled on your device. You can usually find this option
in the settings or control panel of your device.
Set your device to discoverable mode: To receive messages from other Bluetooth users, you need to
make your device discoverable. This allows other users to see your device in their Bluetooth search.
Search for devices: Use your device to search for other Bluetooth devices in the area. This may be called
"Discover" or "Search for Devices" in your Bluetooth settings.
Identify your target: Once you've found a list of nearby Bluetooth devices, identify the device you want
to bluejack. Usually, the device names are displayed in the list. It's essential to ensure that your intent is
playful and not malicious.
Compose a message: Use the messaging or contact-sharing feature on your device to compose a short
message or a digital business card. Keep it friendly and non-intrusive.
Send the message: Select the target device from the list and send your message or business card. Some
devices may ask for confirmation before sending.
Wait for a response: If the recipient's device is also set to discoverable mode and accepts the incoming
message, they might respond or react to your bluejacking message.
CHAPTER-5
BLUEJACKING ARCHITECTURE
Piconet
 The devices find each other and form a network called piconet spontaneously.

 A piconet is a basic unit with up to 8 nodes, one of which is a master and up to seven active slave
nodes with in a maximum distance of 10 meters.
 All communication is done between master and slaves.
 Piconet is a centralized TDM(Time Division Multiplexing) system.
 Master controls clock and decides the time slot for the device. In a piconet there are up to 255
parked nodes.
 Master switches to low power state and parked node wait for beacon from master.

Figure.5.1: Piconet
CHAPTER-6
ADVANTAGES AND DISADVANTAGES

ADVANTAGES

Social Interaction: Bluejacking provides a fun and unique way to engage with people in your vicinity. It
can be a conversation starter, and it allows for spontaneous interactions with strangers.
This can be particularly useful for breaking the ice or making new acquaintances in social settings.

Non-Intrusive Communication: Bluejacking allows you to communicate with others without physically
approaching them. This can be advantageous in situations where you might not want to disturb someone's
privacy but still wish to establish a connection.

Entertainment and Pranks: Bluejacking can be entertaining and amusing, both for the sender and the
recipient. It's often used for light-hearted pranks, jokes, or sharing humorous content.
As long as the content is friendly and not offensive, it can bring a smile to someone's face.

Promotional and Marketing Opportunities: In some cases, businesses or marketers have used
bluejacking to send promotional messages or advertisements to potential customers in public places.
However, this should be done with caution and respect for privacy, as excessive or unwanted marketing
messages can be considered intrusive and annoying.

Information Sharing: In certain scenarios, bluejacking can be used to share helpful information, such as
directions, event details, or public service announcements. This can be a creative way to disseminate
information to a group of people.
DISADVANTAGES

Privacy Invasion: Bluejacking involves sending unsolicited messages or business cards to strangers'
devices. This can be seen as an invasion of privacy, as the recipient may not want to receive messages from
unknown individuals.

Annoyance: Some people find bluejacking annoying, especially if they receive numerous unsolicited
messages in a short period of time. This can lead to frustration and a negative experience for the recipient.

Inappropriate Content: In some cases, bluejackers may send inappropriate or offensive content to
unsuspecting individuals, which can be upsetting and offensive.

Misuse and Harassment: Bluejacking can be misused for harassment or malicious purposes, such as
sending threatening or harmful messages. Such activities are illegal and can lead to legal consequences.

Security Risks: While the act of bluejacking itself doesn't pose significant security risks, it involves using
Bluetooth technology, which can have security vulnerabilities if not properly secured. In some cases,
malicious individuals may use similar techniques to gain unauthorized access to Bluetooth-enabled
devices.

Legal Implications: Depending on your location and the nature of the bluejacking activity, it could
potentially lead to legal issues if you infringe on someone's privacy or engage in unwanted or harmful
communication.

Disruption: Receiving multiple bluejacking messages can be disruptive, especially in situations where
people need to concentrate or maintain a quiet environment, such as in a library or during a meeting.

Incompatibility: Not all Bluetooth-enabled devices support bluejacking, so your attempts to engage with
others may not always be successful.
CHAPTER-7
CONCLUSION
Bluejacking, as a practice of sending unsolicited messages or business cards to nearby Bluetooth-enabled
devices, has evolved over the years and holds both positive and negative implications. In conclusion, the
rise of bluejacking highlights the importance of maintaining digital privacy and security in our
interconnected world. It serves as a reminder for individuals and organizations to take proactive steps to
protect their Bluetooth devices from unwanted intrusions.

On the positive side, bluejacking can be seen as a relatively harmless form of communication and
engagement, offering opportunities for creative expression and even marketing. However, its ethical
implications should not be overlooked, and individuals should always seek consent before engaging in
such activities. In essence, bluejacking underscores the need for responsible and respectful use of
technology.

Moreover, the continued evolution of bluejacking, with more sophisticated tools and methods, raises
concerns about potential abuse and exploitation. As technology advances, so do the risks associated with
it, and it is crucial for regulatory bodies and law enforcement agencies to stay ahead of the curve in
addressing potential privacy and security threats.

In conclusion, bluejacking exemplifies the dual nature of technology, offering both exciting possibilities
for communication and marketing while also posing privacy and security risks. Individuals and
organizations must remain vigilant, adopt best practices for securing their Bluetooth-enabled devices, and
respect the boundaries of digital communication to ensure that technology remains a force for good in our
interconnected world.
CHAPTER-8
BIBLIOGRAPHY

1. Lewis, P. (2004). "Bluejacking: Misconfigured devices enabling wireless theft." IEEE Wireless
Communications, 11(1), 21-26.

2. Clarke, N., & Furnell, S. (2006). "Bluejacking, Bluesnarfing, and toothing: Bluetooth wireless
personal area networking." Computer Fraud & Security, 2006(4), 18-22.

3. Gupta, S., & Gupta, B. B. (2010). "Bluetooth security issues: A short survey." International
Journal of Computer Applications, 8(2), 8-14.

4. Singh, J., & Singh, S. (2013). "Security threats in bluetooth technology." International Journal
of Computer Applications, 76(6), 19-26.

5. Mason, C. (2007). "Bluejacking and the limits of device discovery." In International Conference
on Network and System Security (pp. 23-34). Springer.

6. “Bluejacking.com”. A website dedicated to bluejacking with information, forums, and resources


on the topic.

You might also like