JUMBLER - Jamming Untrusted Microelectronics BLE Reflexively
Introducing JUMBLER – Jamming Untrusted Microelectronics BLE Reflexively
At Two Six Technologies, we push the bounds of cybersecurity threats so we can stay informed on how best to prevent them.
Two Six recently investigated the challenge of jamming specific Bluetooth Low-Energy (BLE) devices. Typical jammers radiate power in an unintelligent way, making it infeasible to isolate or prevent individual traffic.
Two Six developed JUMBLER (Jamming Untrusted Microelectronics BLE Reflexively) to solve this problem. This was accomplished by implementing a methodology involving detecting the signal, rapidly processing its important identifiers, and jamming when appropriate.
Download the white paper to learn about:
- The foundations of BLE as it relates to jamming
- Challenges associated with a targeted jamming methodology
- A safe jamming application that disables all BLE traffic except for medical devices (a continuous glucose monitor in this case)