While this is not a “real” current threat, the experiment conducted during the International Symposium of Electronic Arts in San Jose last year raises some chilling issues. During the Symposium, a network of Bluetooth sensors were deployed throughout the city (see loca.24hourprojects.org for more information). Once established, the network tracked cell phone users who had their Bluetooth set to “discoverable.” The network was able to track and record the movements of these users around the city.Attendees at the conference could visit a particular booth, present their cell phone, and receive a printout of every location the attendee visited, as recorded by the network of Bluetooth sensors. To say the least, attendees were taken aback by the volume and detail of the information recorded about their movements. The information could be used to identify which hotel the attendees were staying at, where they had lunch, which shops they visited, etc. The potential for use and misuse of this information is mind boggling. Marketers could use the information to create more targeted ads, send text messages when a cell phone user is in the proximity of a particular store, and, of course, collect and sell the information to other marketers. Others might use the information to track the movements of an individual involved in a civil dispute, say a divorce proceeding, to show the individual visited a particular hotel or home of an alleged lover. The list goes on.I realize this was just an interesting “proof of concept” and extensive networks of Bluetooth sensors are currently not widely deployed. The problem is that they could be in the not too distant future. For now, cell phone users should take a second look at the settings on their phones. Related content opinion Finding Common Threads in Privacy and Information Security Laws. By Michael Overly Apr 26, 2013 3 mins Compliance opinion Ensure Your Data is Securely Deleted By Michael Overly Mar 11, 2013 2 mins Cloud Security opinion CIA in the Cloud By Michael Overly Dec 18, 2012 2 mins Cloud Security opinion Overreacting to Information Security By Michael Overly Dec 10, 2012 2 mins Privacy Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe