Bluejacking via Bluetooth on Mobile Phone

Blue jacking is the process of sending an anonymous message from a Bluetooth enabled phone to another, within a range of 10 meters. Not only does the recipient not know the exact source of the received message, but also blue jacking allows people to send free messages to one another without having to pay any money to the cellular operators. Since blue jacking utilizes the Bluetooth technology present on the mobile phone handset itself all messages that are sent using it are free.

The best part about blue jacking is that it allows an attacker to send anonymous messages to the victim.

In other words, it is very difficult or almost impossible for a victim to figure out the source of a received message. Each time a message or a file was transferred between two devices then both devices knew each other's identity. This made it extremely easy for an attacker to trace the source of a received file or message. With the Bluetooth, which allows the transfer of a message or a file within a radius of 10 meters in any direction, it becomes very difficult for a user to trace the received message or file to its actual source.

Get quality help now
checked Verified writer

Proficient in: Mobile Phone

star star star star 4.9 (247)

“ Rhizman is absolutely amazing at what he does . I highly recommend him if you need an assignment done ”

avatar avatar avatar
+84 relevant experts are online
Hire writer

Each time blue jacking is performed the victim tries to match the displayed name to every single person around them in a radius of 10 meters in all directions. The best way to prevent this type of attack is to turn off the Bluetooth on your phone.

  1. Create a new address book contact on the Bluetooth enabled device.
    Get to Know The Price Estimate For Your Paper
    Number of pages
    Email Invalid email

    By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email

    "You must agree to out terms of services and privacy policy"
    Write my paper

    You won’t be charged yet!

    Enter the anonymous message that has to be sent to the victim in the Name field of the Address book. For example, you can write, 'You look really beautiful in that blue dress;, as the anonymous message in the Name field.

  2. Scan for victim mobile phones that are within a range of 10 meters at that point of time. This process should not take more than 10 seconds or so and soon an entire list of names of Bluetooth enabled devices will appear on the screen. Although the name of a particular mobile phone can be changed by the user, however by default it is set to the phone model number by the manufacturer. Typically, this step is also known as discovery.
  3. Send the new address book contact that you just created to the victim mobile phone using the Bluetooth communication protocol by choosing the name from the displayed list. The victim will receive this anonymous message on his phone and will react with either a startled or shocked expression.
Updated: Jul 07, 2022
Cite this page

Bluejacking via Bluetooth on Mobile Phone. (2016, Sep 21). Retrieved from

Bluejacking via Bluetooth on Mobile Phone essay
Live chat  with support 24/7

👋 Hi! I’m your smart assistant Amy!

Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.

get help with your assignment