The prevalent nature of smartphones has transformed our lives, offering unprecedented flexibility. However, this interdependence comes at a price, as malicious actors can exploit remote access vulnerabilities to conduct phone surveillance. Surveillance techniques employ a range of methods, encompassing the use of malicious apps, leveraging softwar