Which of the following are considered Bluetooth security violations?