Prev Next  

Advertisement

How Bluetooth Surveillance Works

Lots More Information

Related HowStuffWorks Articles

More Great Links

Sources

  • Bialoglowy, Marek. "Bluetooth security review." Security Focus. April 25, 2005. (July 14, 2008). http://www.securityfocus.com/infocus/1830
  • Hallberg, Josef, Marcus Nilsson and Kåre Synnes. "Bluetooth positioning." Luleå University of Technology: Centre for Distance-spanning Technology, Department of Computer Science and Electrical Engineering. (July 21, 2008). http://media.csee.ltu.se/publications/2002/hallberg02bluetooth.pdf
  • Kostakos, Vassilis and Panos Kostakos. "Intelligence gathering by capturing the social processes within prisons." University of Bath: Department of Computer Science, Department of European Studies and Modern Languages. (July 14, 2008). http://arxiv.org/ftp/arxiv/papers/0804/0804.3064.pdf
  • Pogue, David. "Bluetooth and the end of audio wiring." New York Times. Aug. 16, 2007. (July 14, 2008). http://www.nytimes.com/2007/08/16/technology/circuits/16pogue.html?scp=1&sq=bluetooth&st=cse

Advertisement

Advertisement

Advertisement

Advertisement

Advertisement

Advertisement


Advertisement


Recommended

Advertisement

Advertisement