This document discusses Bluetooth security issues, threats, and consequences. It provides an introduction to Bluetooth technology and describes how Bluetooth networks are formed. It then outlines several security issues with Bluetooth, including that many devices operate in insecure modes by default. It describes specific attacks like Bluesnarfing, Helomoto, and Bluebugging that take advantage of these issues to access devices without authorization. These attacks can steal information from both individuals and corporations. The document concludes by noting a large number of popular devices are potentially vulnerable and references are provided.