You can be tracked via your Bluetooth signal, researchers claim

Bluetooth signals can be used to identify and track smartphones

Boffins at the University of California San Diego have found a way to track individuals via Bluetooth.

Researchers discovered that the Bluetooth signals emitted by mobile phones carry a unique fingerprint, caused by small imperfections accidentally created during the manufacturing process.

The results of their real-world experiment around the UC San Diego campus are impressive:

“The researchers evaluated their tracking method through several real-world experiments. In the first experiment, they found 40% of 162 mobile devices seen in public areas, for example coffee shops, were uniquely identifiable. Next, they scaled up the experiment and observed 647 mobile devices in a public hallway across two days. The team found that 47% of these devices had unique fingerprints. Finally, the researchers demonstrated an actual tracking attack by fingerprinting and following a mobile device owned by a study volunteer as they walked in and out of their house.”

It’s far from plain-sailing to track someone, however, as a number of factors – including changes in the ambient temperature – can alter the Bluetooth fingerint.

Sign up to our free newsletter.
Security news, advice, and tips.

The researchers conclude that Bluetooth hardware would need to be redesigned and replaced to properly rectify the problem. It’s hard to imagine that happening anytime soon. But they also say that it may be possible to hide the tell-tale fingerprints by processing the digital Bluetooth signal in the firmware.

More details of the research can be found in the technical paper presented by the researchers.

Clever stuff.

Graham Cluley is an award-winning keynote speaker who has given presentations around the world about cybersecurity, hackers, and online privacy. A veteran of the computer security industry since the early 1990s, he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows, makes regular media appearances, and is the co-host of the popular "Smashing Security" podcast. Follow him on Twitter, Mastodon, Threads, Bluesky, or drop him an email.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.