Know your enemy! Attendees will see a live demonstration of how we built a proof-of-concept Android Spy-Phone. We will show how we developed the Android spy-phone module and demonstrate how to inject it into legitimate applications to infect unsuspecting victims. We will demonstrate how the spy-phone command and control server can take complete control of the infected phone to steal information, track its location, track SMS and telephone messages, send SMS messages from the phone, and take photos and eavesdrop on conversations without the user knowing. In the BYOD/APT context these capabilities provide a formidable cyber-espionage platform.