u/Global_Armadillo_182

Axon hack exposed. Just saw this article in Australia but it also applies to axon used by police in the USA.

According to a May 2026 report, these tools exploit a security flaw where Axon devices constantly broadcast a public MAC address, allowing their real-time location to be tracked.

Apps Used for Scanning Axon Products

nRF Connect for Mobile: This is a popular general-purpose Bluetooth Low Energy (BLE) scanning tool frequently used to detect, log, and identify nearby devices, including Axon body cameras and Tasers.

RFParty: A Bluetooth mapping service that can visualize and identify IoT devices, such as Axon cameras, in the vicinity.

General BLE Scanners: Various other generic Bluetooth sniffing apps on the Android store can detect the specific Bluetooth signature of Axon devices, which often appear in logs due to their persistent broadcasting, even in "stealth mode".

How the Scanning Works

Vulnerability: Axon devices (such as T7/T10 Tasers and Body 2/3 cameras) use Bluetooth to connect to other police equipment. The devices do not randomize their MAC addresses, making them behave like "beacons".

Detection Method: A person with an Android phone running a BLE scanner can detect these signals from up to 400 meters away.

Tracking: The apps can reveal the device type, serial number, and exact coordinates, allowing criminals or protesters to track police presence.

u/Global_Armadillo_182 — 20 days ago