Estimated read time: 3-4 minutes
This archived news story is available only for your personal, non-commercial use. Information in the story may be outdated or superseded by additional information. Reading or replaying the story in its archived form does not constitute a republication of the story.
PROVO ā Even at elevation, nobody expects a threat to appear out of thin air.
Police acknowledge, though, that any given parking lot in Provo, elevation 4,549 feet, could eventually fall victim to one of the latest crime trends surfacing across the country.
Some car burglars are believed to have adopted the Bluetooth technology on their own phones to help identify potential target-rich environments for other mobile devices and electronics.
āThey could, say, walk through this parking lot and see on their phone if there are other devices that want to connect to it,ā explained Det. Nicolas Itin, who specializes in fraud, credit card theft and skimming, and identity theft cases. āIf we have Bluetooth enabled, (our devices) could be out there transmitting to other devices, saying, āhere I am.āā
Itin said there has been no direct evidence yet of a local burglar using a Bluetooth application to target cars and a crime-of-opportunity like a smash-and-grab was still far more likely, but he noted the possible vulnerability.
āItās something to considerāBluetooth and WiFi-enabled devices that are transmitting, letting potential criminals know that theyāre there and susceptible to being stolen,ā Itin said. āWe see a lot of computers and tablets stolen out of cars. Whether or not thatās from somebody who is thinking far ahead enough to look for Bluetooth devices showing up or if someoneās just looking for whatās in plain view, the bottom line is weāre seeing those items stolen.ā
Other Bluetooth vulnerabilities
Car burglars wouldnāt be the first group to utilize Bluetooth to mine for something valuable.
Eide Bailly LLP digital forensics manager Trent Leavitt said Bluetooth was designed to be convenient ā not secure.
āThere are numerous vulnerabilities with Bluetooth,ā Leavitt said. āThe most popular one, I think, is called BlueBorne.ā
Security firm Armis was believed to be first in 2017 to report of the dangers of the malware, which literally spreads like a sickness in nearby Bluetooth-enabled devices, all reportedly while undetected.

āIt can set up backdoors and can start transmitting information to go back-and-forth,ā Leavitt said. āYou can actually use that phone from a command-and-control standpoint.ā
Leavitt said other criminals can mine mobile devices from long distance via a Bluetooth āsniper rifle.ā
āInstead of shooting a projectile, it shoots a signal, and it can connect to Bluetooth devices, so you can listen to phone calls, you can intercept text messages, listen to what music theyāre listening to on the Bluetooth device, potentially even access things theyāre doing on their TVs or computers if that is enabled.ā
It's not if you're going to get hacked - it's when.
–Trent Leavitt, Eide Bailly LLP
Using that deviceāwhich has been on the market for well over a decadeāa would-be hacker could target smartphones from as far as 250 yards away, according to Leavitt.
āItās not new in the security world, but most people probably donāt even know that technology exists,ā Leavitt said.
What to do about Bluetooth vulnerabilities
While police and security analysts alike maintain that the public is much more at risk to garden variety crimes like smash-and-grab burglaries, they said people should still be aware of the potential risks associated with technology and the ever-changing threat environment.
āItās not if youāre going to get hacked ā it is when,ā Leavitt said. āYour data will be compromised at some point ā whether itās your fault or a companyās fault or someoneās fault. Sometimes itās no oneās fault at all. Thereās always exploits and vulnerabilities because technology is always changing.ā
Leavitt advised all people to turn off their Bluetooth when they are not using it, something Itin also said was worth considering.
āIf you are committed to leaving your valuables in your car, itās definitely a prudent step to make sure itās not transmitting,ā Itin said. āIt could potentially represent a security threat.ā









