These people were the most naïve. I don’t suppose anyone might have thought that maybe an agent stole it from her?
-I donât suppose anyone might have thought that maybe an agent stole it from her?-
It is much more useful to borrow it for a few minutes, install a spy app, then return it. In general, the idea behind most spy operations is that you avoid detection and don’t trigger any defensive response. (Even better, send the spy app as an attachment to an email and get it loaded onto everything that device communicates with and everything those devices communicate with. This happened at a company where I worked and they had to shut down IT worldwide for multiple divisions to deal with it. What did we lose? I have no idea.)