I recently spoke to a friend of mine who claims that she saw in class a user on a laptop monitor bluetooth traffic on various mobile phones in the area. She also saw what look to be text message logs in various windows. This is possible? I was under the impression that bluetooth had a security protocol to protect against such intrusion (of course not fool proof, but nonetheless thats a lot of cracked phones).