π‘ Bluetooth Security
Block Proximity-Based Attacks
Control Bluetooth connections and prevent unauthorized pairing. Protect against proximity-based attacks, surveillance devices, and Bluetooth exploits.
Why Bluetooth Security Matters
Bluetooth is a common attack vector for proximity-based surveillance and device compromise. Attackers can exploit Bluetooth to:
- Pair unauthorized devices: Gain access to your phone without physical contact
- Track your location: Bluetooth beacons can track your movements
- Inject malware: BlueBorne and similar exploits can compromise devices
- Intercept data: Man-in-the-middle attacks on Bluetooth connections
- Surveillance devices: Hidden Bluetooth trackers and listening devices
π‘ Real-World Threat
Bluetooth attacks don't require internet access or physical touch. An attacker within 30 feet can attempt to compromise your device. This is especially dangerous in public spaces, hotels, or if you're under targeted surveillance.
Step 1: Configure Bluetooth Visibility Settings
Turn Off Bluetooth When Not in Use
The simplest defense is to disable Bluetooth completely when you don't need it:
- Swipe down from the top of your screen
- Tap the Bluetooth icon to turn it OFF (gray)
- Only enable when actively using Bluetooth devices
Best Practice: Keep Bluetooth off by default. Enable only when needed for headphones, car, or other trusted devices.
Make Your Device Non-Discoverable
Prevent your phone from appearing in Bluetooth scans:
- Go to Settings β Connected devices β Connection preferences β Bluetooth
- Ensure "Device name" is NOT broadcasting
- Your device should only be discoverable when you're actively pairing
Note: Most modern Android devices are non-discoverable by default, but verify this setting.
Review Paired Devices
Check for unauthorized or unknown devices:
- Go to Settings β Connected devices β Bluetooth
- Review the list of "Paired devices"
- Tap the gear icon next to any unknown device
- Tap "Forget" to remove suspicious devices
β οΈ Red Flags
Look for paired devices you don't recognize:
- Generic names like "Device-1234" or "BT-Audio"
- Devices you don't own or remember pairing
- Multiple devices with similar names
- Devices that reappear after being forgotten
Step 2: Disable Bluetooth Scanning
Turn Off Bluetooth Scanning for Location
Android uses Bluetooth scanning to improve location accuracy, even when Bluetooth is "off":
- Go to Settings β Location
- Tap Location services
- Tap Bluetooth scanning
- Toggle OFF "Bluetooth scanning"
Why this matters: With Bluetooth scanning enabled, your device continuously scans for Bluetooth beacons even when Bluetooth appears to be off. This allows tracking via Bluetooth beacons in stores, airports, and public spaces.
π Location Accuracy Trade-off
Disabling Bluetooth scanning may slightly reduce indoor location accuracy for maps and navigation. However, GPS will still work normally outdoors. The privacy benefit outweighs the minor convenience loss.
Step 3: Configure Bluetooth Permissions
Audit App Bluetooth Permissions
Review which apps can access Bluetooth:
- Go to Settings β Apps β See all apps
- Tap an app to review
- Tap Permissions
- Look for "Nearby devices" or "Bluetooth" permission
- Change to "Don't allow" for apps that don't need it
Apps That Legitimately Need Bluetooth
Only allow Bluetooth access for:
- Audio apps: Spotify, YouTube Music (for Bluetooth headphones)
- Fitness apps: Strava, Google Fit (for heart rate monitors)
- Smart home apps: Google Home, Philips Hue (for device control)
- Car apps: Android Auto, manufacturer apps
β οΈ Suspicious Bluetooth Access
Deny Bluetooth permission to:
- Social media apps (Facebook, Instagram, TikTok)
- Shopping apps (unless using Bluetooth payment terminals)
- Games (unless using Bluetooth controllers)
- Any app that doesn't have a clear reason to use Bluetooth
Step 4: Install Bluetooth Firewall App (Recommended)
For maximum Bluetooth security, install a dedicated Bluetooth firewall app. This gives you real-time alerts, scanning capabilities, and granular control over Bluetooth connections.
π‘ Why Use a Bluetooth Firewall?
A Bluetooth firewall app provides:
- Real-time alerts for all Bluetooth actions
- Ability to block specific apps from using Bluetooth
- Scanning for nearby Bluetooth devices
- Radar view of devices around you
- Protection against BlueBorne vulnerabilities
- Logging of all Bluetooth activity
Install Bluetooth Firewall
Download from Google Play Store:
- Open Google Play Store
- Search for "Bluetooth Firewall"
- Install the app by APPFACTORY (blue shield icon)
- Open the app after installation

β The app provides comprehensive Bluetooth monitoring and control features
Enable Bluetooth Firewall
Activate the firewall to start monitoring:
- Open Bluetooth Firewall app
- Toggle ON "Firewall is ON" at the top
- You'll now receive alerts for all Bluetooth actions
- Toggle ON "Logging is ON" to keep a record of activity

What this does: You'll receive a notification every time any app tries to use Bluetooth, allowing you to allow or deny the action.
Configure Alert Settings
Customize which Bluetooth actions trigger alerts:
- Tap "SETTINGS" on the main screen
- Review the alert options
- Enable alerts for:
- β Bluetooth ON (when Bluetooth is turned on)
- β Device Discovery (when scanning starts)
- β Device Name (when device name changes)
- β Connection (when devices connect)
- β Pairing (when pairing requests occur)
- β App Installation (when apps with Bluetooth install)
- Consider disabling "Discoverability" alert (can be noisy)

β Enable all alerts for maximum security awareness
Scan for Apps Using Bluetooth
Identify which apps have Bluetooth access:
- Open the sidebar menu (tap β° icon)
- Tap "Perform Bluetooth Scan"
- Wait for scan to complete (may take 1-2 minutes)
- Review the list of apps with Bluetooth capabilities

β οΈ Review App Bluetooth Access
Common apps that legitimately need Bluetooth:
- Google Play services (for device connectivity)
- Settings (system Bluetooth management)
- Phone Services (for car Bluetooth)
- Music/audio apps (for headphones)
Suspicious: Social media apps, games, or apps with no clear reason to use Bluetooth. Revoke their Bluetooth permission in Android Settings.
Use Bluetooth Radar
Visualize all nearby Bluetooth devices:
- Open sidebar menu
- Tap "Bluetooth Radar"
- View the radar display showing nearby devices
- Devices closer to center are physically closer to you
- Tap any device to see details

Use case: Run radar in different locations. If you see the same unknown device following you, it could be a tracking device.
Add Trusted Devices
Whitelist your legitimate Bluetooth devices:
- Open sidebar menu
- Tap "Add Trusted Device"
- Select your paired devices:
- Bluetooth headphones
- Car Bluetooth
- Fitness trackers
- Smart watch
- Tap checkbox next to each trusted device

Why whitelist? Trusted devices won't trigger constant alerts, reducing notification fatigue while still monitoring unknown devices.
Enable BlueBorne Guard (Optional)
Protection against BlueBorne vulnerability:
- On main screen, toggle ON "BlueBorne Guard"
- This disables Bluetooth when an untrusted device connects
- Tap "VULNERABILITY CHECK" to test your device
Note: BlueBorne is a serious Bluetooth vulnerability that allows remote code execution. Most modern Android devices are patched, but this provides extra protection.
Review Logs Regularly
Check Bluetooth activity logs:
- Open sidebar menu
- Tap "Logs"
- Review all Bluetooth actions
- Look for suspicious patterns:
- Apps accessing Bluetooth at odd times
- Unknown devices attempting connections
- Unexpected pairing requests
β Bluetooth Firewall Setup Complete
You now have:
- Real-time alerts for all Bluetooth activity
- Ability to scan for nearby devices
- Radar view of your Bluetooth environment
- Logging of all Bluetooth actions
- Protection against BlueBorne attacks
Step 5: Advanced Bluetooth Security
Enable Developer Options for Bluetooth Debugging
For advanced users, enable Bluetooth HCI snoop log to monitor Bluetooth traffic:
- Go to Settings β About phone
- Tap "Build number" 7 times to enable Developer options
- Go back to Settings β System β Developer options
- Scroll to "Bluetooth HCI snoop log"
- Enable to log all Bluetooth traffic for analysis
Note: This creates a log file you can analyze with Wireshark to detect suspicious Bluetooth activity. Only for advanced users.
Use Airplane Mode for Maximum Protection
When you need complete wireless isolation:
- Enable Airplane mode to disable all wireless
- Manually re-enable WiFi if needed
- Keep Bluetooth OFF
Use case: High-risk situations, sensitive meetings, or when you suspect active surveillance.
Physical Bluetooth Blocking
For complete Bluetooth isolation, use a Faraday bag:
- Blocks all wireless signals including Bluetooth
- Prevents proximity-based attacks
- See Guide #8: Faraday Bags for details
Detecting Bluetooth Surveillance Devices
π Signs of Bluetooth Surveillance
Watch for these indicators:
- Unknown devices in Bluetooth scan: Devices that appear repeatedly in your area
- Battery drain: Unusual battery consumption when Bluetooth is "off"
- Bluetooth turns on automatically: Bluetooth re-enables without your action
- Pairing requests: Unexpected pairing requests from unknown devices
Bluetooth Scanner Apps
Use these apps to detect nearby Bluetooth devices:
- Bluetooth Scanner (Play Store): Shows all nearby Bluetooth devices
- nRF Connect (Nordic Semiconductor): Professional Bluetooth LE scanner
- BLE Scanner: Detect Bluetooth Low Energy devices
How to use: Run a Bluetooth scan in different locations. Note any devices that follow you between locationsβthese could be tracking devices.
Bluetooth Attack Prevention Checklist
β Daily Bluetooth Security Checklist
- β Bluetooth is OFF when not actively in use
- β Bluetooth scanning for location is disabled
- β Device is non-discoverable
- β Only trusted devices are paired
- β Apps have minimal Bluetooth permissions
- β No unknown devices appear in Bluetooth scans
When to Use Maximum Bluetooth Protection
- Public spaces: Airports, hotels, conferences, cafes
- High-risk situations: Sensitive meetings, legal proceedings
- Under surveillance: If you suspect targeted monitoring
- Traveling: Unfamiliar locations with unknown threats
Next Steps
You've secured your Bluetooth connections. Continue hardening your device:
- Guide #12: Google Account Hardening - Secure your Google account with Yubikey passkey authentication
- Guide #8: Faraday Bags - Physical signal blocking for complete wireless isolation
- Guide #9: Check for Spyware - Detect stalkerware and surveillance apps
π‘οΈ Defense in Depth
Bluetooth security is one layer of protection. Combine with network monitoring (PCAPdroid), app permissions auditing, and physical security for comprehensive defense.
