πŸ“‘ Bluetooth Security

Block Proximity-Based Attacks

Control Bluetooth connections and prevent unauthorized pairing. Protect against proximity-based attacks, surveillance devices, and Bluetooth exploits.

⏱️ 15 minutes 🟒 Easy πŸ”’ High Impact

Why Bluetooth Security Matters

Bluetooth is a common attack vector for proximity-based surveillance and device compromise. Attackers can exploit Bluetooth to:

  • Pair unauthorized devices: Gain access to your phone without physical contact
  • Track your location: Bluetooth beacons can track your movements
  • Inject malware: BlueBorne and similar exploits can compromise devices
  • Intercept data: Man-in-the-middle attacks on Bluetooth connections
  • Surveillance devices: Hidden Bluetooth trackers and listening devices

πŸ’‘ Real-World Threat

Bluetooth attacks don't require internet access or physical touch. An attacker within 30 feet can attempt to compromise your device. This is especially dangerous in public spaces, hotels, or if you're under targeted surveillance.

Step 1: Configure Bluetooth Visibility Settings

1

Turn Off Bluetooth When Not in Use

The simplest defense is to disable Bluetooth completely when you don't need it:

  1. Swipe down from the top of your screen
  2. Tap the Bluetooth icon to turn it OFF (gray)
  3. Only enable when actively using Bluetooth devices

Best Practice: Keep Bluetooth off by default. Enable only when needed for headphones, car, or other trusted devices.

2

Make Your Device Non-Discoverable

Prevent your phone from appearing in Bluetooth scans:

  1. Go to Settings β†’ Connected devices β†’ Connection preferences β†’ Bluetooth
  2. Ensure "Device name" is NOT broadcasting
  3. Your device should only be discoverable when you're actively pairing

Note: Most modern Android devices are non-discoverable by default, but verify this setting.

3

Review Paired Devices

Check for unauthorized or unknown devices:

  1. Go to Settings β†’ Connected devices β†’ Bluetooth
  2. Review the list of "Paired devices"
  3. Tap the gear icon next to any unknown device
  4. Tap "Forget" to remove suspicious devices

⚠️ Red Flags

Look for paired devices you don't recognize:

  • Generic names like "Device-1234" or "BT-Audio"
  • Devices you don't own or remember pairing
  • Multiple devices with similar names
  • Devices that reappear after being forgotten

Step 2: Disable Bluetooth Scanning

1

Turn Off Bluetooth Scanning for Location

Android uses Bluetooth scanning to improve location accuracy, even when Bluetooth is "off":

  1. Go to Settings β†’ Location
  2. Tap Location services
  3. Tap Bluetooth scanning
  4. Toggle OFF "Bluetooth scanning"

Why this matters: With Bluetooth scanning enabled, your device continuously scans for Bluetooth beacons even when Bluetooth appears to be off. This allows tracking via Bluetooth beacons in stores, airports, and public spaces.

πŸ“ Location Accuracy Trade-off

Disabling Bluetooth scanning may slightly reduce indoor location accuracy for maps and navigation. However, GPS will still work normally outdoors. The privacy benefit outweighs the minor convenience loss.

Step 3: Configure Bluetooth Permissions

1

Audit App Bluetooth Permissions

Review which apps can access Bluetooth:

  1. Go to Settings β†’ Apps β†’ See all apps
  2. Tap an app to review
  3. Tap Permissions
  4. Look for "Nearby devices" or "Bluetooth" permission
  5. Change to "Don't allow" for apps that don't need it
2

Apps That Legitimately Need Bluetooth

Only allow Bluetooth access for:

  • Audio apps: Spotify, YouTube Music (for Bluetooth headphones)
  • Fitness apps: Strava, Google Fit (for heart rate monitors)
  • Smart home apps: Google Home, Philips Hue (for device control)
  • Car apps: Android Auto, manufacturer apps

⚠️ Suspicious Bluetooth Access

Deny Bluetooth permission to:

  • Social media apps (Facebook, Instagram, TikTok)
  • Shopping apps (unless using Bluetooth payment terminals)
  • Games (unless using Bluetooth controllers)
  • Any app that doesn't have a clear reason to use Bluetooth

Step 4: Install Bluetooth Firewall App (Recommended)

For maximum Bluetooth security, install a dedicated Bluetooth firewall app. This gives you real-time alerts, scanning capabilities, and granular control over Bluetooth connections.

πŸ’‘ Why Use a Bluetooth Firewall?

A Bluetooth firewall app provides:

  • Real-time alerts for all Bluetooth actions
  • Ability to block specific apps from using Bluetooth
  • Scanning for nearby Bluetooth devices
  • Radar view of devices around you
  • Protection against BlueBorne vulnerabilities
  • Logging of all Bluetooth activity
1

Install Bluetooth Firewall

Download from Google Play Store:

  1. Open Google Play Store
  2. Search for "Bluetooth Firewall"
  3. Install the app by APPFACTORY (blue shield icon)
  4. Open the app after installation
Bluetooth Firewall app sidebar menu showing all available features

βœ“ The app provides comprehensive Bluetooth monitoring and control features

2

Enable Bluetooth Firewall

Activate the firewall to start monitoring:

  1. Open Bluetooth Firewall app
  2. Toggle ON "Firewall is ON" at the top
  3. You'll now receive alerts for all Bluetooth actions
  4. Toggle ON "Logging is ON" to keep a record of activity
Bluetooth Firewall main screen with firewall enabled and logging active

What this does: You'll receive a notification every time any app tries to use Bluetooth, allowing you to allow or deny the action.

3

Configure Alert Settings

Customize which Bluetooth actions trigger alerts:

  1. Tap "SETTINGS" on the main screen
  2. Review the alert options
  3. Enable alerts for:
    • βœ“ Bluetooth ON (when Bluetooth is turned on)
    • βœ“ Device Discovery (when scanning starts)
    • βœ“ Device Name (when device name changes)
    • βœ“ Connection (when devices connect)
    • βœ“ Pairing (when pairing requests occur)
    • βœ“ App Installation (when apps with Bluetooth install)
  4. Consider disabling "Discoverability" alert (can be noisy)
Bluetooth Firewall alert settings showing all available notification options

βœ“ Enable all alerts for maximum security awareness

4

Scan for Apps Using Bluetooth

Identify which apps have Bluetooth access:

  1. Open the sidebar menu (tap ☰ icon)
  2. Tap "Perform Bluetooth Scan"
  3. Wait for scan to complete (may take 1-2 minutes)
  4. Review the list of apps with Bluetooth capabilities
Bluetooth Firewall scanning all applications with Bluetooth capabilities List of applications with Bluetooth access detected by the firewall

⚠️ Review App Bluetooth Access

Common apps that legitimately need Bluetooth:

  • Google Play services (for device connectivity)
  • Settings (system Bluetooth management)
  • Phone Services (for car Bluetooth)
  • Music/audio apps (for headphones)

Suspicious: Social media apps, games, or apps with no clear reason to use Bluetooth. Revoke their Bluetooth permission in Android Settings.

5

Use Bluetooth Radar

Visualize all nearby Bluetooth devices:

  1. Open sidebar menu
  2. Tap "Bluetooth Radar"
  3. View the radar display showing nearby devices
  4. Devices closer to center are physically closer to you
  5. Tap any device to see details
Bluetooth Radar showing nearby Bluetooth devices in real-time on a circular radar display

Use case: Run radar in different locations. If you see the same unknown device following you, it could be a tracking device.

6

Add Trusted Devices

Whitelist your legitimate Bluetooth devices:

  1. Open sidebar menu
  2. Tap "Add Trusted Device"
  3. Select your paired devices:
    • Bluetooth headphones
    • Car Bluetooth
    • Fitness trackers
    • Smart watch
  4. Tap checkbox next to each trusted device
Add trusted Bluetooth devices screen showing paired devices and nearby devices

Why whitelist? Trusted devices won't trigger constant alerts, reducing notification fatigue while still monitoring unknown devices.

7

Enable BlueBorne Guard (Optional)

Protection against BlueBorne vulnerability:

  1. On main screen, toggle ON "BlueBorne Guard"
  2. This disables Bluetooth when an untrusted device connects
  3. Tap "VULNERABILITY CHECK" to test your device

Note: BlueBorne is a serious Bluetooth vulnerability that allows remote code execution. Most modern Android devices are patched, but this provides extra protection.

8

Review Logs Regularly

Check Bluetooth activity logs:

  1. Open sidebar menu
  2. Tap "Logs"
  3. Review all Bluetooth actions
  4. Look for suspicious patterns:
    • Apps accessing Bluetooth at odd times
    • Unknown devices attempting connections
    • Unexpected pairing requests

βœ… Bluetooth Firewall Setup Complete

You now have:

  • Real-time alerts for all Bluetooth activity
  • Ability to scan for nearby devices
  • Radar view of your Bluetooth environment
  • Logging of all Bluetooth actions
  • Protection against BlueBorne attacks

Step 5: Advanced Bluetooth Security

1

Enable Developer Options for Bluetooth Debugging

For advanced users, enable Bluetooth HCI snoop log to monitor Bluetooth traffic:

  1. Go to Settings β†’ About phone
  2. Tap "Build number" 7 times to enable Developer options
  3. Go back to Settings β†’ System β†’ Developer options
  4. Scroll to "Bluetooth HCI snoop log"
  5. Enable to log all Bluetooth traffic for analysis

Note: This creates a log file you can analyze with Wireshark to detect suspicious Bluetooth activity. Only for advanced users.

2

Use Airplane Mode for Maximum Protection

When you need complete wireless isolation:

  1. Enable Airplane mode to disable all wireless
  2. Manually re-enable WiFi if needed
  3. Keep Bluetooth OFF

Use case: High-risk situations, sensitive meetings, or when you suspect active surveillance.

3

Physical Bluetooth Blocking

For complete Bluetooth isolation, use a Faraday bag:

  • Blocks all wireless signals including Bluetooth
  • Prevents proximity-based attacks
  • See Guide #8: Faraday Bags for details

Detecting Bluetooth Surveillance Devices

πŸ” Signs of Bluetooth Surveillance

Watch for these indicators:

  • Unknown devices in Bluetooth scan: Devices that appear repeatedly in your area
  • Battery drain: Unusual battery consumption when Bluetooth is "off"
  • Bluetooth turns on automatically: Bluetooth re-enables without your action
  • Pairing requests: Unexpected pairing requests from unknown devices

Bluetooth Scanner Apps

Use these apps to detect nearby Bluetooth devices:

  • Bluetooth Scanner (Play Store): Shows all nearby Bluetooth devices
  • nRF Connect (Nordic Semiconductor): Professional Bluetooth LE scanner
  • BLE Scanner: Detect Bluetooth Low Energy devices

How to use: Run a Bluetooth scan in different locations. Note any devices that follow you between locationsβ€”these could be tracking devices.

Bluetooth Attack Prevention Checklist

βœ… Daily Bluetooth Security Checklist

  • ☐ Bluetooth is OFF when not actively in use
  • ☐ Bluetooth scanning for location is disabled
  • ☐ Device is non-discoverable
  • ☐ Only trusted devices are paired
  • ☐ Apps have minimal Bluetooth permissions
  • ☐ No unknown devices appear in Bluetooth scans

When to Use Maximum Bluetooth Protection

  • Public spaces: Airports, hotels, conferences, cafes
  • High-risk situations: Sensitive meetings, legal proceedings
  • Under surveillance: If you suspect targeted monitoring
  • Traveling: Unfamiliar locations with unknown threats

Next Steps

You've secured your Bluetooth connections. Continue hardening your device:

  • Guide #12: Google Account Hardening - Secure your Google account with Yubikey passkey authentication
  • Guide #8: Faraday Bags - Physical signal blocking for complete wireless isolation
  • Guide #9: Check for Spyware - Detect stalkerware and surveillance apps

πŸ›‘οΈ Defense in Depth

Bluetooth security is one layer of protection. Combine with network monitoring (PCAPdroid), app permissions auditing, and physical security for comprehensive defense.

Sign Up for Our Newsletter

Enter your email for more cybersecurity defense strategies.

You have Successfully Subscribed!