<s>
Bluebugging	B-General_Concept
is	O
a	O
form	O
of	O
Bluetooth	B-Protocol
attack	O
often	O
caused	O
by	O
a	O
lack	O
of	O
awareness	O
.	O
</s>
<s>
It	O
was	O
developed	O
after	O
the	O
onset	O
of	O
bluejacking	B-General_Concept
and	O
bluesnarfing	B-General_Concept
.	O
</s>
<s>
Similar	O
to	O
bluesnarfing	B-General_Concept
,	O
bluebugging	B-General_Concept
accesses	O
and	O
uses	O
all	O
phone	O
features	O
but	O
is	O
limited	O
by	O
the	O
transmitting	O
power	O
of	O
class	O
2	O
Bluetooth	B-Protocol
radios	O
,	O
normally	O
capping	O
its	O
range	O
at	O
10	O
–	O
15	O
meters	O
.	O
</s>
<s>
Bluebugging	B-General_Concept
was	O
developed	O
by	O
the	O
German	O
researcher	O
Martin	O
Herfurt	O
in	O
2004	O
,	O
one	O
year	O
after	O
the	O
advent	O
of	O
bluejacking	B-General_Concept
.	O
</s>
<s>
Initially	O
a	O
threat	O
against	O
laptops	O
with	O
Bluetooth	B-Protocol
capability	O
,	O
it	O
later	O
targeted	O
mobile	O
phones	O
and	O
PDAs	O
.	O
</s>
<s>
Bluebugging	B-General_Concept
manipulates	O
a	O
target	O
phone	O
into	O
compromising	O
its	O
security	O
,	O
this	O
to	O
create	O
a	O
backdoor	O
attack	O
before	O
returning	O
control	O
of	O
the	O
phone	O
to	O
its	O
owner	O
.	O
</s>
<s>
A	O
further	O
development	O
of	O
Bluebugging	B-General_Concept
has	O
allowed	O
for	O
the	O
control	O
of	O
target	O
phones	O
through	O
Bluetooth	B-Protocol
phone	O
headsets	O
,	O
It	O
achieves	O
this	O
by	O
pretending	O
to	O
be	O
the	O
headset	O
and	O
thereby	O
"	O
tricking	O
"	O
the	O
phone	O
into	O
obeying	O
call	O
commands	O
.	O
</s>
