After setting up a compromised Cell Phone, with an invisible backdoor application to track, duplicate and send SMS etc. and to follow the owner/target, I ran an experiment. I have been able to map their movements, link them to locations by time, and cross relate to simple technologies such as Google Maps, and Street View. With a little more configuration, I have also been able. to track every web site they visited, and received every SMS. sent, and. received, and have had a duplicated copy of every image communication, and all unbeknown to the target.”]
Source: https://informationsecuritybuzz.com/articles/power-simple-electronic-surveillance/

