"Users of the software first gain access to the portable electronics devices of targets -- devices such as GPS receivers and cell phones -- and then upload information gleaned there to the Coral Reef software." . . . . .