9
Computer hardware for the collection of data, databases, files, activity information, locations, communications, messages, emails, chats, videos or photos from mobile phones, cellular phones, tablets, laptops or computers; computer hardware for the collection of data, databases, files, activity information, locations, communications, messages, emails, chats, videos or photos from Internet services, Internet web accounts, email accounts or Internet cloud services; computer hardware for the collection of data, databases, files, activity, communication, protocols, or transmissions from cellular networks; computer hardware for the collection of data, databases, files, activity, communication, protocols, or transmissions from wireless communication networks; computer hardware for inserting and installing software code into mobile phones, cellular phones, tablets, laptops or computers; computer hardware for the collection and storage of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer hardware for the analysis of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer hardware for the decoding and processing of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer hardware for use in the fields of intelligence gathering, communications interception, cyber, cyber intelligence, cyber security or telecommunications; computer hardware used for the purpose of lawful interception of communications; computer hardware for intelligence gathering used for the purpose of homeland security; computer hardware for performing man-in-the-middle methods; computer hardware for performing interception using man-in-the-middle methods; encryption computer hardware; decryption computer hardware; encryption cellular phone hardware; decryption cellular phone hardware; tactical computer hardware units for intelligence gathering; cellular phone units for intelligence gathering; computer software for the collection of data, databases, files, activity information, locations, communications, messages, emails, chats, videos or photos from mobile phones, cellular phones, tablets, laptops or computers; computer software for the collection of data, databases, files, activity information, locations, communications, messages, emails, chats, videos or photos from Internet services, Internet web accounts, email accounts or Internet cloud services; computer software for the collection of data, databases, files, activity, communication, protocols, or transmissions from cellular networks; computer software for the collection of data, databases, files, activity, communication, protocols, or transmissions from wireless communication networks; computer software for inserting and installing software code into mobile phones, cellular phones, tablets, laptops or computers; computer software for the collection and storage of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer software for the analysis of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer software for the decoding and processing of data, databases, files, activity information, locations, communications, messages, emails, chats, videos, photos, protocols or communication transmissions; computer software for use in the fields of intelligence gathering, communications interception, cyber, cyber intelligence, cyber security or telecommunications, namely, for extraction of data from mobile phones; computer software for extraction of data from computers; computer software for extraction of data from the Internet; computer software for collection of intelligence from mobile phones; computer software for collection of intelligence from computers; computer software for collection of intelligence from the Internet; computer software for interception of communications; computer software used for the purpose of lawful interception of communications; computer software for intelligence gathering used for the purpose of homeland security; computer software for performing man-in-the-middle methods; computer software for performing interception using man-in-the-middle methods; encryption software, namely, software for encryption; decryption software, namely, software for decryption; all aforementioned goods not for use in the field of finance, banking, insurance and real estate