Have you ever beendoorbellditching before ? The point of the trick is childlike : Sneak up to someone ’s front door , rap loudly or environ the bell , and , rather of greeting whoever answers the door , lead away and hide somewhere nearby . The joy of doorbell ditching is , of course , delight in the homeowner ’s confusion and rolling withlaughterunder the security of his nicely trimmed George Bush . Although the game might get you in a turn of fuss if you happen to incite the wrath of a peevish neighbor , it ’s mostly a harmless joke on equality with a prank phone call .

For more technically tend pranksters with access to Bluetooth technology , however , there ’s the digital version of doorbell ditching and prank telephone calls : Bluejacking . A kind of practical joke recreate out betweenBluetooth - enabled devices , bluejacking takes reward of a loophole in the technology ’s message options that allows a user to beam unasked content to other nearby Bluetooth proprietor .

The only difference of opinion between bell ditching and bluejacking is that bluejacking ordinarily is n’t done on your neighbor ’s lawn . Instead , a bluejacker will most belike pack out in crowded expanse like shopping malls , airports andsubwaysystems to find victim – places with a potentially high percentage of people with Bluetooth - enable devices . The trend has even further fan Web sites , where Bluetooth substance abuser inform newcomers how to bluejack , business deal tips and post amusing bluejacking stories that include every key stroke and puzzled look .

­So how is bluejacking done ? What is it about Bluetooth engineering science that makes it possible to bluejack ? Does it have anything to do with hijacking data from another Bluetooth equipment , and can it cause any harm ? Are there any privateness business organisation ? To find out how bluejackers engage each other , bedevil one another or plainly annoy devoid bystanders , learn the next pageboy .

­

Bluetooth Bluejack

Bluetoothtechnology operate by using low - powerradiowaves , communicating on a frequency of 2.45 Gc . This special oftenness is also known as the ISM band , an open , unaccredited band arrange aside for industrial , scientific and aesculapian devices . When a number of Bluetooth devices are switched on in the same sphere , they all share the same ISM band and can situate and communicate with each other , much like a pair ofwalkie talkiestuned to the same relative frequency are able to link up .

Bluetooth technology users take advantage of this power to web with otherphonesand can station school text message or electronic business cards to each other . To charge information to another party , the exploiter creates a personal contact name in his or her phone ’s address leger – the name can be anything from the sender ’s actual name to a clever nickname .

Bluejackers have devised a round-eyed technique to surprise their victim : alternatively of create a licit name in the address book , the bluejacker ’s content take the plaza of the name . The prank basically erase the " from " part of the equation , provide a user to mail any sort of comment he care without indentifying himself .

For example , if you ’re sit in a burnt umber workshop and notice a fellow Bluetooth substance abuser pose down to enjoy a cup of iced deep brown , you could set up a contact under the name " Is your coffee bean cold enough ? " After pick out to send the text via Bluetooth , the phone will search for other enable Bluetooth devices ; selecting one will send the unasked message to that gadget . A bluejacker ’s crowning consequence comes , of course , when the victim receives the message and verbalize a mild mix of confusion and fear that he ’s under surveillance .

Bluejacking is imprecise , however . Searching for other Bluetooth - enabled hardware might turn up a list of gimmick labeled with a series of identification number and letters . Unless the bluejacker ’s target has chosen to publicly identify his or her phone , or it ’s the only Bluetooth phone in the country , the bluejacker may have a tough time message his or her object on the first attempt .

After bluejacking turned into a small tech subculture in 2003 , several Web website come forth , proffer how - to ’s and meeting place for trading story . But there ’s even a bluejacking code of ethics , allot to bluejackQ.com . Bluejackers should refrain , for representative , from transmit insulting or jeopardize messages to others , and if no interest is shown in communicating after two messages , the bluejacker should cease natural process so as to stave off irritate anyone . The point of bluejacking , according to its proponent , is to have fun , not make complete anarchy .

For hatful more serious and not - so - serious information on Bluetooth engineering , see the links on the next page .

Frequently Answered Questions

Lots More Information

Sources