Malware/Spyware (in the eyes of the law, they are treated the same)
Condition: One must, in advance of its creation, be very clear in declaring they have no intention of using it for illegal activities, or else it can be ruled as a premeditated crime
Warning: If one is found to be suspected of a DIFFERENT crime, a warrant can be placed to collect all of an individual’s technology, along with their login credentials. If malware (or illegally obtained information) is found on the device IRREGARDLESS OF ITS RELEVANCE TO THE CASE IN WHICH THE WARRANT WAS SERVED, then being in its possession can be punishable
Explanation: The misuse or altering of any device not belonging to an individual without the owner’s consent is illegal no matter the context
Exception: If someone is given documented permission from a government agency WHO HAS THE PROPER AUTHORITY, then they are allowed to deploy malware under their supervision with complete transparency