Bluetooth Security Report

Bluetooth security report is here!

At last, you can take an in depth look at the LCDI team’s discoveries during the Bluetooth Security Project! You’ve followed their progress, now you get the results. See the introduction paragraphs to the report below.

Introduction to bluetooth security report

Technology is advancing exponentially, and as it does, our desire and need to protect digitally stored personal
information becomes tantamount to the continued adoption of these newer technologies. However, it stands to reason that, occasionally, we miss certain possible vectors for security flaws on the basis that the technology stack underlying these systems is overly complex and/or assumed to “just work.” Bluetooth stands as one of these “untouched” technologies that, while well into adoption and widespread use, has not been exhaustively analyzed for possible vulnerabilities, even though independent sources suggest there may be a great multitude. Over the course of this project, the LCDI has been taking steps to critically examine Bluetooth for any flaws that might threaten the security of data that passes over Bluetooth connections.


The Bluetooth project was created at the start of the 2016 spring semester in response to LCDI employees
expressing interest in a focused examination of the capabilities and vulnerabilities of the Bluetooth protocol during the 2015 fall semester.

purpose and scope

The purpose of this research is to provide evidence that Bluetooth is not impenetrable, bringing awareness to the presence of critical vulnerabilities in both hardware and software stacks of Bluetooth-enabled devices. The hope is that consumers, business owners, and manufacturers alike will draw important conclusions regarding their role in understanding and securing Bluetooth-enabled devices from information capture/sniffing.

read the rest of the report here.

The Bluetooth Security Report is available to view and download at the link provided above. Feel free to reach out to the LCDI with any questions or comments you may have. You can leave a message here on our blog, or email us at Don’t forget to follow us on Facebook and Twitter for the latest updates!

More Research Projects
The Leahy Center Inventory Project
Social Media Footprint Awareness
My Experience on The VPN Comparison Team