<s>
Bluesnarfing	B-General_Concept
is	O
the	O
unauthorized	O
access	O
of	O
information	O
from	O
a	O
wireless	O
device	O
through	O
a	O
Bluetooth	B-Protocol
connection	O
,	O
often	O
between	O
phones	O
,	O
desktops	O
,	O
laptops	O
,	O
and	O
PDAs	B-Application
(	O
personal	B-Application
digital	I-Application
assistant	I-Application
)	O
.	O
</s>
<s>
Both	O
Bluesnarfing	B-General_Concept
and	O
Bluejacking	B-General_Concept
exploit	O
others	O
 '	O
Bluetooth	B-Protocol
connections	O
without	O
their	O
knowledge	O
.	O
</s>
<s>
While	O
Bluejacking	B-General_Concept
is	O
essentially	O
harmless	O
as	O
it	O
only	O
transmits	O
data	O
to	O
the	O
target	O
device	O
,	O
Bluesnarfing	B-General_Concept
is	O
the	O
theft	O
of	O
information	O
from	O
the	O
target	O
device	O
.	O
</s>
<s>
After	O
the	O
disclosure	O
of	O
this	O
vulnerability	O
,	O
vendors	O
of	O
mobile	O
phone	O
patched	O
their	O
Bluetooth	B-Protocol
implementations	O
and	O
,	O
at	O
the	O
time	O
of	O
writing	O
,	O
no	O
current	O
phone	O
models	O
are	O
known	O
to	O
be	O
vulnerable	O
to	O
this	O
attack	O
.	O
</s>
<s>
Any	O
device	O
with	O
its	O
Bluetooth	B-Protocol
connection	O
turned	O
on	O
and	O
set	O
to	O
"	O
discoverable	O
"	O
(	O
able	O
to	O
be	O
found	O
by	O
other	O
Bluetooth	B-Protocol
devices	O
in	O
range	O
)	O
may	O
be	O
susceptible	O
to	O
Bluejacking	B-General_Concept
and	O
possibly	O
to	O
Bluesnarfing	B-General_Concept
if	O
there	O
is	O
a	O
vulnerability	O
in	O
the	O
vendor	O
's	O
software	O
.	O
</s>
<s>
Bluetooth	B-Protocol
uses	O
a	O
48-bit	O
unique	O
MAC	O
Address	O
,	O
of	O
which	O
the	O
first	O
24	O
bits	O
are	O
common	O
to	O
a	O
manufacturer	O
.	O
</s>
<s>
Attacks	O
on	O
wireless	O
systems	O
have	O
increased	O
along	O
with	O
the	O
popularity	O
of	O
wireless	B-General_Concept
networks	I-General_Concept
.	O
</s>
<s>
Rogue	O
access	O
points	O
and	O
unsecured	O
wireless	B-General_Concept
networks	I-General_Concept
are	O
often	O
detected	O
through	O
war	O
driving	O
,	O
which	O
is	O
using	O
an	O
automobile	O
or	O
other	O
means	O
of	O
transportation	O
to	O
search	O
for	O
a	O
wireless	O
signal	O
over	O
a	O
large	O
area	O
.	O
</s>
<s>
Bluesnarfing	B-General_Concept
is	O
an	O
attack	O
to	O
access	O
information	O
from	O
wireless	O
devices	O
that	O
transmit	O
using	O
the	O
Bluetooth	B-Protocol
protocol	O
.	O
</s>
<s>
Bluetooth	B-Protocol
vendors	O
advise	O
customers	O
with	O
vulnerable	O
Bluetooth	B-Protocol
devices	O
to	O
either	O
turn	O
them	O
off	O
in	O
areas	O
regarded	O
as	O
unsafe	O
or	O
set	O
them	O
to	O
undiscoverable	O
.	O
</s>
<s>
This	O
Bluetooth	B-Protocol
setting	O
allows	O
users	O
to	O
keep	O
their	O
Bluetooth	B-Protocol
on	O
so	O
that	O
compatible	O
Bluetooth	B-Protocol
products	O
can	O
be	O
used	O
but	O
other	O
Bluetooth	B-Protocol
devices	O
cannot	O
discover	O
them	O
.	O
</s>
<s>
Because	O
Bluesnarfing	B-General_Concept
is	O
an	O
invasion	O
of	O
privacy	O
,	O
it	O
is	O
illegal	O
in	O
many	O
countries	O
.	O
</s>
<s>
Bluesniping	O
has	O
emerged	O
as	O
a	O
specific	O
form	O
of	O
Bluesnarfing	B-General_Concept
that	O
is	O
effective	O
at	O
longer	O
ranges	O
than	O
normally	O
possible	O
.	O
</s>
<s>
For	O
example	O
,	O
a	O
"	O
rifle	O
"	O
with	O
a	O
directional	O
antenna	O
,	O
Linux-powered	O
embedded	O
PC	B-Device
,	O
and	O
Bluetooth	B-Protocol
module	O
mounted	O
on	O
a	O
Ruger	O
10/22	O
folding	O
stock	O
has	O
been	O
used	O
for	O
long-range	O
Bluesnarfing	B-General_Concept
.	O
</s>
<s>
In	O
the	O
TV	O
series	O
Person	O
of	O
Interest	O
,	O
bluesnarfing	B-General_Concept
,	O
often	O
mistakenly	O
referred	O
to	O
as	O
bluejacking	B-General_Concept
in	O
the	O
show	O
and	O
at	O
other	O
times	O
forced	O
pairing	O
and	O
phone	O
cloning	O
,	O
is	O
a	O
common	O
element	O
in	O
the	O
show	O
used	O
to	O
spy	O
on	O
and	O
track	O
the	O
people	O
the	O
main	O
characters	O
are	O
trying	O
to	O
save	O
or	O
stop	O
.	O
</s>
