Fake bluetooth access point The device would have a same name as a real access point, and would be configured to accept the same PIN and provide access to the Internet\LAN. Attacker disrupts or disables the legitimate AP by disconnecting it, directing a denial of service against it, or creating sufficient RF interference around it with a metal or another obstacle. Users that were connected to the legitimate AP lose their connections and re-connect to the fake AP.