
Crisi in Groenlandia: la Danimarca chiede ai suoi funzionari di disattivare il Bluetooth per evitare il rischio di spionaggio
https://www.leparisien.fr/high-tech/crise-au-groenland-le-danemark-desactive-les-produits-fonctionnant-en-bluetooth-de-ses-fonctionnaires-pour-eviter-le-risque-despionnage-20-01-2026-REWP5PHEQ5C27CVFGRQJHN7G6Y.php
di Wonderful-Excuse4922
8 commenti
Greenland Crisis: Denmark asks its civil servants to disable Bluetooth to avoid espionage risk
By Ronan Tésorière
January 20, 2026 at 8:00 PM, modified on January 21, 2026 at 7:32 AM
In the context of the crisis in Greenland, the country’s authorities are now warning against any use of Bluetooth due to the risk of illicit eavesdropping within key government administrations.
Denmark is in a state of war, or at least preparing for it. Cybersecurity experts have long known that Bluetooth technology, widely used by hundreds of millions of users around the world for their headphones and other electronic devices, presents security flaws.
Read also: “You just have to be within Bluetooth range”: how your wireless headphones and earbuds became hackable
But in this period of tension surrounding US President Donald Trump’s claims on Greenland, Danish military intelligence services are issuing concrete warnings to authorities, administrations, and police services against the use of Bluetooth headsets and AirPods in the line of duty, revealed the specialized Danish media outlet Ingenioren. Consequently, the country’s administrations have been asked to disable their Bluetooth-enabled equipment.
“The IT company Corporate IT recommends that police officers disable Bluetooth on mobile phones, tablets, computers, and other similar devices in the course of their work, whether professional or personal, until Corporate IT announces otherwise,” stated the Danish police IT department to the local media.
“Very specific” suspicion
It is no secret that headphones can be hacked via Bluetooth due to vulnerabilities inherent in various protocols (for example, the BlueBorne protocol used by Dell), which allow taking control or intercepting data streams, even without pairing! Furthermore, various methods and attacks allow access to data and the interception of audio information and communication between two devices that are connected to each other. Intelligence services reported that the hacking of Bluetooth accessories using Google Fast Pair had also already been detected in the past.
According to police sources, the recommendation is reportedly based on an incident or a “very specific” suspicion. A decision taken by the authorities to avoid “panic.”
This pretty much proves that the NSA (and therefore the FBI and ICE) have access to Bluetooth vulnerabilities and backdoors, possibly purposefully built into the proprietary stacks of US-based vendors like Dell.
The perfect moment to google why its called bluetooth…
maybe check all of their phones for Pegasus
Also, they can’t use video-conferencing via Teams or Zoom and many other things.
Spies on EU on behalf of USA ( wiretapping high EU officials ), constantly pushing for chat control… this feels like karma.
Why use bluetooth when iOS and Android guarantee backdoor access to US services?
Didn’t europe already make whatever concessions they had to?
Trump backed down and said a deal had been made, he only does that when people kiss his ass.