There is a growing amount of so-called “spy software” available that promises to log everything the user of an infected phone does while attempting to remain undetectable. Compromised devices are easily traceable via GPS, record all incoming and outgoing text messages and phone calls and can even be used to spy on captured photos and browser history ...Answer