If you take a look at a typical cyber-defence incident, which is really what we're talking about here, the kinds of tools we're talking about are the tools that you would need to figure out how and why a device like a cellphone had been compromised.
On February 6th, 2024. See this statement in context.