This document discusses smartphone backdoors and mobile device spyware. It begins by defining mobile spyware and how it is often inserted by those with access to source code or distribution binaries. It then covers the motivations of attackers in using mobile spyware such as retrieving private data from targets and maintaining access. The majority of the document analyzes the growing use of smartphones and mobile platforms as targets for spyware, using statistics on unit sales and application availability across platforms. It concludes by examining several case studies of existing mobile spyware programs and incidents.