Details to come in the near future. With simple, cheap Bluetooth equipment (a phone can suffice) you can easily read the data being broadcast, often knowingly. You can broadcast Bluetooth signals and messages of your own, included spoofing other people’s devices. Some devices, more than 10% easily, can have commands directed to them over the Bluetooth Low Energy Protocol (BTLE.) Bluetooth scanners that can log the UUID (a unique ID number) from your Bluetooth chip would probably bump into you in the future, and slowly a map is drawn up in the minds of law enforcement. More details to come – I did observe records of times and dates which appeared to be of hirings and incidents, as well as another serious issue which is not currently known by the public to the best of my knowledge.