Doubtful. Part of being an undercover operative means deniability. Imagine if a foreign power arrested a suspected spy, and found non-standard software on their phone.
So they'd probably use off the shelf software and mitigate risks in other ways.
(Ex: not bringing smartphones to sensitive meetings)
So they'd probably use off the shelf software and mitigate risks in other ways.
(Ex: not bringing smartphones to sensitive meetings)