Uses administrator priveleges.
Gains access to network information.
Gains access to telephone information (number, imei, etc.).
Gains access to information about active device administrators.
Gains access to information about installed applications.
Gains access to information about running applications.
Adds tasks to the system scheduler.
Displays its own windows over windows of other applications.