9 Computer software for mobile applications, namely, software for use in merging, integrating, detecting, copying, examining, analyzing, unlocking, decrypting, decoding, extracting, retrieving, storing, restoring, preserving, editing, managing, synchronizing, distributing, inputting, collecting, transmitting, processing and presenting data and meta data from mobile phones, portable GPS devices, computer tablets, and cloud-based services all relating to digital information, electronic intelligence, and digital and computer forensic science; computer software which integrates digital data with other digital data analysis tools all relating to computer forensic intelligence; Electronic communications devices, namely, computer memory devices for merging, integrating, detecting, copying, examining, analyzing, unlocking, decrypting, decoding, extracting, retrieving, storing, restoring, preserving, editing, managing, synchronizing, distributing, inputting, collecting, transmitting, processing and presenting data and meta data on mobile devices from a remote or fixed unit to mobile devices sold to law enforcement; computer programs for use in managing mobile device digital tough platform device for merging, integrating, detecting, copying, examining, analyzing, unlocking, decrypting, decoding, extracting, retrieving, storing, restoring, preserving, editing, managing, synchronizing, distributing, inputting, collecting, transmitting, processing, presenting and capturing data and meta data from a wide variety of mobile devices and operating systems performing software updated; computer software for unifying and organizing cloud data into a unified format in the field of computer forensic intelligence; interactive mobile computer kiosk for use computer forensics to enable access to recover, decode and monitor computer data from mobile phones, portable GPS devices, and computer tablets, and cloud-based services; intuitive user interface software in the field of computer forensic intelligence to extract data, restrict access and manage control of data; computer software for sharing of computer forensic intelligence; cases adapted for mobile phones comprised of computer hardware and power adaptors, computer cables, connection cables, individual cable connectors and USB cables, all the forgoing limited to the field of intelligence