how to acquire them programmatically without the user's permission, and we also focuses on how to obtain the data illicitly which are of Android privacy concerns and the categorization of these Android privacy issues. The fourth section also shows how we use the Android API to perform our Spyware to obtain the sensitive information. Finals are some attack scenarios and recommendations we propose.