Bluejacking – Exploring the World of Wireless Communication
By Author: Rishabh Sontakke
What is Bluejacking?
Bluejacking is the act of sending unsolicited messages over Bluetooth to nearby Bluetooth-enabled devices such as mobile phones, PDAs, or laptops. Since Bluetooth has a limited range (typically around 10 meters for mobile phones and up to 100 meters for laptops), Bluejacking usually occurs in close proximity.
Origin of Bluejacking
The Bluejacking phenomenon began when a Malaysian IT consultant, Ajack, experimented with his Ericsson cellphone in a bank. He discovered a nearby Nokia 7650 via Bluetooth and sent a business card message titled “Buy Ericsson!” to the phone. After sharing his experience on an online forum, the concept spread rapidly among tech enthusiasts.
How to Bluejack
To perform Bluejacking, you need a Bluetooth-enabled device. The steps vary slightly depending on whether you’re using a mobile phone or a computer.
On Mobile Phones:
-
Enable Bluetooth on your device.
-
Search for nearby discoverable devices.
-
Create a new contact.
-
Type your message in the “Name” field.
-
Save the contact and select “Send via Bluetooth.”
-
Choose a device from the detected list and send your message.
On Computers or Laptops:
-
Open your contacts in your Address Book (e.g., Outlook).
-
Create a new contact and type your message in the name field.
-
Save the contact.
-
Right-click the contact → select “Send via Bluetooth.”
-
Choose a nearby device and send the message.
Popular Bluejacking Software Tools
-
BlueSpam – Scans for all discoverable Bluetooth devices and sends a file automatically if the device supports OBEX.
-
Meeting Point – Helps locate Bluetooth devices and can be combined with Bluejacking tools.
-
Freejack – Works with Java-enabled phones like the Nokia N-series.
-
Easyjacking (eJack) – Allows sending text messages directly to Bluetooth-enabled devices.
Uses of Bluejacking
Bluejacking can serve various purposes across different locations such as shopping centers, train stations, cinemas, cafes, and restaurants.
Its most practical applications include:
-
Advertising and Marketing: Companies can send promotional messages to nearby users.
-
Location-Based Services: Useful for promoting local offers or events.
It’s a fun and experimental way to communicate, but it should always remain ethical and respectful.
Code of Ethics for Bluejackers
-
Only send harmless messages or pictures.
-
Do not attempt to hack, modify, or copy files from any device.
-
Avoid sending vulgar, insulting, or copyrighted content without permission.
-
Stop sending messages if the recipient does not respond after two attempts.
-
Respect others’ privacy and stop if your messages cause discomfort.
-
Be cooperative if confronted and explain your activity honestly.
Related Concepts
-
BlueSnarfing: Involves unauthorized downloading of data (contacts, emails, etc.) from a Bluetooth device — a serious security threat.
-
Bluebugging: A more advanced attack allowing hackers to control another person’s phone, make calls, or eavesdrop on conversations.
Preventing Bluejacking
To protect yourself:
-
Disable Bluetooth when not in use.
-
Avoid accepting Bluetooth messages from unknown sources.
-
Refrain from sharing personal information with unknown senders.
-
Keep your device’s visibility set to hidden.
-
Delete suspicious messages immediately.
Legal Warning
Attempting to hack or gain unauthorized access to another person’s device violates the Computer Misuse Act (1990). Always use Bluetooth responsibly and within the boundaries of the law.
Conclusion
Bluejacking represents an innovative yet simple way of interacting with nearby devices through Bluetooth. While it can be used for fun or marketing purposes, users must adhere to ethical guidelines and respect privacy. If used responsibly, Bluejacking can even serve as a creative advertising tool in the age of wireless connectivity.
