Loading...
HomeMy WebLinkAboutUnique Features of Pen-Link v8Pen -Link, Ltd. is a U.S.-Based Small Business DUNS: 195956636 TIN: 47-0707585 rnnc: nvcun - K Ger-Link VE i - Sale Source- ReV 03 4/1;/20J8 1. Sole Source....................................................................................................................1 2. Hardware Interfaces......................................................................................................1 2.1 LINCOLN Interface..........................................................................................................1 2.2 Third -Party Intercept Platform Interfaces........................................................................1 2.3 Traditional DNR Interfaces.............................................................................................2 3. Software Interfaces.......................................................................................................2 3.1 Autoloading Telephone Company CDR Files................................................................. 2 3.2 Loading Telephone Company Subscriber Files..............................................................2 3.3 Interfaces with Federal Intelligence Databases..............................................................2 3.4 Interfaces to Public Records Providers...........................................................................3 3.4.1 ChoicePoint Interface................................................................................................................ 3 3.4.2 NeuStar Interface...................................................................................................................... 3 3.4.3 LexisNexis Interface.................................................................................................................. 3 4, Analytical Capabilities..................................................................................................4 4.1 Flexible Reporting...........................................................................................................4 4.2 Auxiliary Intelligence Databases.....................................................................................4 4.3 Go Beyond Telephone Calls........................................................................................... 5 4.4 Automated Analyses-, ............ .... _ ................................ .................................... .......... 5 4.5 Graphical Analyses.........................................................................................................6 4.5.1 Cali Frequency Charts ................. ................. ................ -.... ........... ...................................... ..... 8 4.5.2 Link Charts............................................................................................................................... 9 4.5.3 Time Lines............................................................................................................................... 10 4.5.4 GIS Mapping.......................................................................................................................... 11 5. Exporting Data and Work Product................................................................ ........12 6. Use and Training History ................................................... ............13 ............................. 7. Pen -Link, an Industry Standard.................................................................................14 Pun Lv h vi 1 - Sole Source - Rev 03 41117/200 Pen -Link, Ltd. is the sole source provider of all Pen -Link Software and Systems, including Pen -Link v8 and LINCOLN Intercept Systems. We do not use agents, dealers, or distributors; our products can be purchased only from us. Pen -Link v8 offers many unique features that set it apart from other Law Enforcement software applications on the market. This document presents some of those features. Please note that we are not claiming that all of the features presented in this document are unique to Pen -Link software. To the best of our knowledge, some are indeed unique. But some others may also be found in competing systems. However, the most salient point is that no competing system offers all of these features in one integrated package. This is a crucial point! Having all of the functionality in one package saves significant time and effort that is often otherwise spent exporting data from one system, ensuring that the export was full and accurate, manipulating the exported data it into a different format, importing the data a different system, and ensuring that data was not lost in the transfer. Analysts across the nation often spend hours per day in this export/import process. Pen -Link software offers a comprehensive set of features to help investigators and analysts spend their time investigating and analyzing, rather than manipulating data to move it from one system to another. 2.1 LINCOLN interface Pen -Link software interfaces directly with the LINCOLN Intercept Systems used by a wide variety of local, state, and federal law enforcement and intelligence agencies for per register and wiretap intercepts. Pen -Link v8 is the client software for these systems. 2.2 Third -Party Intercept Platform interfaces Pen -Link software can load data files and audio collected by third -party intercept systems, like the DCS 3000, JSI Voicebox, Verint Reliant, and Sytech ADACS systems. These "Autoload" interfaces (a Pen - Link term) relieve the intelligence analyst from the manual intervention that is typically required when moving information from one system to another; e.g., exporting from the source system to a .csv file, then using Excel to edit the data formats to suit the destination system, then importing into the destination system, having to define the specific field mapping. There is none of this type if intervention required with Pen -Link's Autoload capability; the analyst simply exports a data file in the source system's native format, then loads it into Pen -Link. All the analyst has to do to import the data is select the file then click "OK." Pen --r& v�, e: Source kf v U:, 411—/2006' PEN=L .���� 2.3 Traditional DNR Interfaces Pen -Link can interface directly with legacy Dialed Number Recorder equipment, for those rare circumstances where a pen register or wiretap (Title 3) intercept requires a local loop approach. Pen -Link interfaces with all DNR equipment still in use. 3.1 Autoloading Telephone Company CDR Files Pen -Link has Autoload functions for every phone company that offers the option of fulfilling subpoenas through an electronic exchange of data. Many phone companies fulfill subpoenas for toll records or other types of call detail records (e.g., switch dumps) by supplying the data in a file, rather than on paper. For every phone company that offers this option, there is at least one file format; often multiple formats, depending on the nature of the request. Pen -Link recognizes these formats; it can process a file, recognize proprietary codes, parse the contents into the appropriate fields, and populate the database. All automatically (hence the term "Autoload"). The user is not required to spend time defining data formats, data types, field orders, etc., as is often the case when loading data from an external source into various intelligence applications. The user simply selects the source data file using a standard Windows Open File dialog box (e.g., just like loading a Word .doc file). Pen -Link's "Autolead Phone Company File" function currently supports over 170 different data file formats provided by telephone companies. As new formats surface, we update the software to recognize them, and make these updates available to our end users, free of charge, through our website. 3.2 Loading Telephone Company Subscriber Files Many phone companies fulfill subpoenas for subscriber information by providing the data in a file, rather than on paper. For every phone company that offers this option, there is at least one different file format. Much like the Autoload feature, Pen -Link's "Pen -Lookup" feature can automatically process all of these subscriber file formats and load them into the intelligence database, with no editing of file formats, "cleaning up" of data, or any of the other things that often waste an analyst's valuable time when importing data into an intelligence application. 3.3 Interfaces with Federal Intelliaence Databases Pen -Link is widely used in U.S. federal law enforcement. Pen -Link Software includes automated functions to export call and subscriber data to, and import from, national intelligence databases used by various federal law enforcement agencies, including FBI's Telephone Applications system, DEA's M204 Tolls system, DHSIICE's (formerly U.S. Customs) Telecommunications Linking System (TLS), and the U.S. Marshals' Warrant information System (WIN). These interfaces help to automate the process of moving call and subscriber data back and forth between the central system and Pen -Link, not only removing the time-consuming aspects of traditional manual import and export, but also facilitating the sharing of intelligence both within an agency and among multiple agencies. FEN -O K e r Ln iV vFi I -Vole source — Rev 0:; 4/171200t' 3.4 Interfaces to Public Records Providers 3.4.1 ChoicePoint Interface ChoicePoint is a commercial provider of various public records data. Various ChoicePoint services are used by law enforcement agencies across the nation. Pen -Link's Pen -Lookup function offers a batch lookup interface to ChoicePoint's Phone Link service. 3.4.2 NeuStar Interface Today's analysts face a growing challenge when working cases that involve a lot of telephone data, tracking down subscriber information for wireless phones whose numbers have been ported. If a subscriber has ported his or her phone, traditional methods of identifying which phone company to subpoena for subscriber information are less effective, because the phone company identified by the area code, exchange, and number range is no longer the actual provider. The analyst now has to track down which phone company the number was ported to. And the number may have been ported more than once! NeuStar, formerly a subsidiary of Lockheed Martin, is the administrator for Number Portability within the North American Numbering plan. NeuStar maintains a database of ported numbers, including which company is the current service provider for any given ported number. NeuStar offers a voice -interactive phone-in system for law enforcement to use to query the database. More recently, NeuStar has offered a network -based system, where law enforcement users can log in and perform queries of the ported number database. We are currently in the process of engineering an interface, directly in Pen -Link software, to NeuStar's network -based query system for ported phone numbers. The interface will let the Pen -Link user perform batch queries (i.e., submit multiple phone numbers in a single query) directly from within Pen -Link. Given that Pen -Link already automatically identifies phone numbers in the system that lack corresponding subscribers, this added NeuStar interface will make great strides toward automating and simplifying the process of tracking down subscriber data for ported telephone numbers. The time savings to the analyst will be significant. Other commercial products may appear on the market that interface with the NeuStar network -based query system. But none will offer the additional processing and analytical capabilities that already set Pen -Link apart. The NeuStar interface is currently under development. When it is completed and released, your agency will receive the update free of charge. (Please note, however, that using NeuStar's services may require payment to NeuStar.) 3.4.3 LexisNexis Interface LexisNexis is another provider of extensive public records data and related services and is widely used by law enforcement agencies across the United States. We are currently in the process of developing interfaces to various LexisNexis services. Pen -Link users will have batch lookup capabilities. Even more exiting is the effort to develop a live interface that will query LexisNexis database as phone numbers are being collected during pen and wire intercepts, or loaded from CDR files. The LexisNexis interface is currently under development. When it is completed and released, your agency will receive the update free of charge. (Please note, however, that using LexisNexis services may require payment to LexisNexis.) _PEN-L'NK Pen -Link, Ltd, has been in the telecommunications intercept and analysis business for 20 years. Over these two decades, we have accumulated much knowledge and experience in the methods of Call Detail Record Analysis, making our software second to none in the analysis of telephone call traffic. In fact, it would not be unrealistic to claim that Pen -Link is the yardstick by which other applications are judged when it comes to collecting, storing, and analyzing telephone information. Other applications advertise "Pen -Link Like Functionality." We do not have to make such a claim; our applications define Pen -Link functionality. Some of the analytical capabilities brought to bear by Pen -Link are as follows: 4.1 Flexible Reporting Pen -Link v8 1 - Sole Source - Rev 03, 411 712 0 0 8 Hr wwn .U1.Hefuo v.»+.ww1 NrA:n`. V.xxe. .,eh✓ 6(o.r �roHs... ju;»;, .wa..umvi.: y ,y,g,. putu, ,. unm- iHe�„ „o.,.. , ♦w,a,vo�-. Mv�sw. H:i ru.vz.--iw>rvov--H�vt�ww. __�Vr;s�� ra-..iwNv: A Pen -Link Call Listing report showing call details along with information linked automatically from other databases; the name of the subscriber for the Number Dialed, and the Dialed City, State, and Country. Pen -Link offers the user the flexibility to create their own custom analytical reports across 16 different reporting categories, making it easier for the intelligence analyst to drill down through their data the way they want. Other applications come with only a static set of reporting features, requiring additional payment for development of customized reports. 4.2 Auxiliary Intelligence Databases Pen -Link offers four pre -loaded and maintained (free updates) databases that augment telephone call intelligence shown in Call Listing, Call Frequency, and Special Analysis reports. These features will not be found in competing products. 4 Pen -Link's City -Link Database automatically identifies the probable location - by city, state, and country - of any phone number within the North American Numbering Plan (United States, Canada, and Caribbean Nations). 4 The international Database performs a similar function for any telephone number outside of the North American Numbering Plan. J The Operating Company Number (OCN) Database automatically identifies the Telephone Service Provider that controls any phone number in the North American Numbering Plan, simplifying the process of determining what phone company to subpoena for subscriber and toll information. 4 The Cell Tower Database makes it possible to identify the cell sites and sectors used by a targeted telephone during calls captured through a pen register or wiretap intercept- In this way, the analyst can track the location of a targeted phone during any particular call, or across a historical listing of calls. PEN -Lf , Nen-Link v8.1 - Sine Source - Rev. 01 . -V I i (2008 4.3 Go Beyond Telephone Calls Many people with a passing familiarity with Pen -Link software know that its forte is collecting, storing, and analyzing telephone call information; tolls, pen registers, and wiretaps. There are, of course, other systems on the market that also specialize in telephone information, and only telephone information. Not everyone knows, however, that Pen -Link's capabilities now extend far beyond telephones. For example, Pen -Link includes an Events Database, with corresponding analytical capabilities, as well as a set of IP databases, also with corresponding analytical capabilities. J Events Database. The Events Database lets you store information about other case -related events, This database includes full multimedia support for photos, video clips, and audio clips. Event types are user -definable and can include such things as surveillance notes, GPS Tracking data, crime scene photos, surveillance video, evidence descriptions from trash searches, recordings from body wires or room bugs, tips from Cls, etc. Event types are limited only by the user's imagination. Event records also include free -form note fields for detailed entry of case notes, searchable by key word and key phrase database queries. Event reports provide built-in multimedia playback controls. You can even generate various Time Line graphics and GIS maps from your Event records. 4 IP Database. Pen -Link now incorporates three new databases for IP (Internet Protocol) data: the Transaction Database, the Node Name Database, and the Node Subscriber Database. These databases are usually used in conjunction with a network packet sniffer to intercept a targeted subject's Internet activity (e.g., surfing, file transfers, emails). When loading the raw packet data, the system can automatically perform Reverse DNS Lookups to resolve domain names from intercepted IP Addresses, then Whois Lookups to get subscriber and contact information for the resolved domain names, providing actionable intelligence (names, phone numbers, addresses) from public data sources. These types of lookups (DNS and Whois) can take an analyst hours, even days to perform using traditional manual methods. With Pen -Link, they take minutes. From the captured IP data, the analyst can generate Link Charts of IP addresses, email addresses (who emailed whom and how often), and MAC addresses (machine -specific identifiers that would be used in conjunction with computer forensics to show that particular communications originated from particular hardware). 4.4 Automated Analvses Pen -Link offers a suite of powerful "special" functions to help the intelligence analyst perform necessary and common analytical tasks that, when performed with traditional methods, can become tedious, error prone, and extremely time-consuming. The following list gives just a sampling of some of these special analyses: ./ The Subject Link function will find any Call, Subscriber, Event, Seizure, and Case Management record that is linked to any particular Name, Key Word, Phrase, or Phone Number. • The Call Pattern Analysis automatically identifies instances where particular sequences of calls occur; when they occur, how often they occur, and between which phone numbers and names. For example, this function would help the analyst determine how many times Joe paged Steve, then Steve called Barbara, then Steve called Joe back. ./ The Pattern Group Analysis will perform tasks similar to the Call pattern Analysis, but focusing on call groupings rather than specific chronological sequences. This is useful in identifying possible patterns that do not always follow the same set sequence. J The Common Call Breakdown automatically filters through the call data to identify any instance where multiple Targets are communicating with the same, "common" phone number. Results can P1EN —L,N l Peri -i ink of - Sole Sow ce — Rev Ou_ 411 I72L10f> be displayed in a table, a cross -tabulated frequency matrix (a common analytical approach), or a graphical Common Call Link Chart (see below). This is a powerful tool in helping to identifying the key subjects in a social network, based on their communications. It is also a useful tool in quickly identifying new surveillance targets in an ongoing case. J With a Single Target Common Calls analysis, you can quickly and easily determine what existing Targets in an ongoing case are linked to newly added sets of intercept Targets and Numbers dialed, through their common calls. J The Common Case Breakdown automatically identifies instances where the same phone number (e.g., a dialed number) appears across multiple cases, indicating possible cross -case links or conspiracies. A Common Call Breakdown report, with its automatic Common Call Matrix, showing all instances of Numbers Dialed that are linked to multiple Targets along with call frequencies and identifying 4 The Call/EventsfSeizure listing will information, such as Name and Location. help the analyst uncover temporal relationships among Call records, Event records, and Seizure records. J The New Subpoena Numbers report will automatically identify phone numbers for which you do not yet have Subscriber data, and which phone companies service those numbers. J The Subscriber Involvement functions will automatically show which Subscribers are linked to any particular set of Calls, as opposed to a simple Alphabetical or Numerical listing of Subscribers (which Pen -Link can also do if you want). These functions, for example, will help show which subset of subscribers in a case or across cases is linked by call activity to a particular subset of Targets within a multi -Target intercept case. These functions can also help you easily separate subscribers that are linked to call activity from subscriber records that were entered just for general or background intelligence on other subjects involved in a case. i Composite Hourly and Day of Week analyses help to identify temporal patterns in call activity, to characterize or predict intercept Targets' call activity across time of day and day of week. 4 Target by Cell Site analyses help the analyst determine the frequency of any Target's cell site and sector usage. Cell site frequencies can be distributed spatially or temporally, to see which sites and sectors are used, how often, and when. In this way, a wireless Target's movements can be historically characterized or predicted, which can be very useful not only in prosecuting a criminal case, but also in tracking fugitives or terror suspects. 4.5 Graphical Analyses Whereas many other systems rely on general, third -party, commercial graphics packages, Pen -Link software incorporates its own powerful suite of Graphical Analysis tools. You can generate a wide variety of charts and graphs directly from your Pen -Link reports, without needing to export data to any add-on or external system. Because the functions are built into Pen -Link, rather than being part of a general, commercial database charting application, the charts are specific to the needs of Law Enforcement and Intelligence Agencies. Available charting functions include: PEN'=L�N;�:. Pen -Lint; & I — Soie Source -- Rev_ 03. 4/17,1008 4 Link Analysis a Calls and Subscribers, who is linked to whom, directly or indirectly, through the network of intercepted call activity. 0 Common Call Link Analysis, revealing multiple targets linked to one another through shared numbers dialed. 0 Subjects and Associates records can be used to generate Organizational Link charts based on known associations, Including those not involving telecommunications 0 The analyst can easily create free -form and annotated Link Charts based on the progression of the case as they understand it. Many analysts use other drawing tools (e.g., PowerPoint, Visio) that are not designed for criminal intelligence network analysis, or spend an inordinate amount of time manually entering data just to produce a chart. With Pen -Link, if the analyst chooses, he or she can quickly draw a professional Link Char, of courtroom quality, using a charting tool that is specifically designed for the needs of Law Enforcement and Intelligence agencies. 0 The system includes a library of Over 600, professionally drawn icons specifically related to Law Enforcement and Intelligence (with English or Spanish icon names). 4 Call Frequency Charts 0 Dialed frequency o In%Out frequency o Temporal patterns in call activity, by dour of Day, Day of Week, or Day of Month. 0 Conversation Type frequency o Monthly call activity o Cell site use 0 Etc... create any frequency chart from any field or combination of fields in the Call records 4 GIS (Geographical Information Systems) charts 0 Call Origins and Destinations, by address or cell site 0 Cell and sector use maps for intercepted call activity (what "pie slice" of a cell, did the target occupy) o GPS coordinates, when Latitude/Longitude is delivered by the carrier 4 Subscriber Locations 0 Event Locations 0 Electronic Surveillance Perimeters for live intercepts of cellular targets 4 Timelines 0 Call Association charts, useful for identifying temporal patterns in call activity. 0 Event timelines, to show the temporal relationships among other case -related events (e.g., surveillance, interviews, crime scenes, forensics, tip lines, informants, etc.) 0 Generate automatically from database records or free -form drawing (excellent for courtroom summary) All charts are fully customizable, giving you total control over every aspect of the chart, including chart style (horizontal or vertical bar, stacked bar, line chart, area chart, pie chart, etc.), colors, text labels, fonts, legends, etc. Various annotation tools let you insert objects, such as pictures, arrows, lines, shapes, text boxes, and callouts. You also have full control over object grouping and layering. In addition, Pen -Link charts can be saved to various graphics file formats for easy import into other applications (e.g., a word processor for written reports, PowerPoint for on-screen presentations, etc.) The following pages show examples of some of these charting capabilities 7 PENzUNK 1 - ;ole So ace - Rev 03 4; 1 i,12JOe 4.5.1 Call Freauerli Charts Pen -Link has several built-in call frequency charts that you can generate directly from Call and Frequency reports with the click of a single button. In addition to the built-in charts, you can create an unlimited number of custom frequency charts, based on any combination of fields in the database. The charting interface offers a wide variety of annotation tools. You can easily import any chart into other software, like Word or PowerPoint. The following examples will give you an idea of some of the Frequency Chart capabilities you will find in Pen -Link v8.0. �csa�afu-7E 77.74107' Nj) w I 1� 9 it t �4a r�� a'.s Axz9.�•'ss�e �> adr3rosu aa.- a_sF,�i ao i4� n � s�-x Composite Hourly Chart— call frequency as a function of hour of day. 1IM Imo`IV Day of Week Chart — call frequency as a function of day of week. Dialed Frequency Chart— call frequency for each number dialed, Conversation Type Chart — relative frequency for each intercepted conversation type, for one subject. 8 _PEN -LANK 4.5.2 Link Charts Peri -Link vc1 - Sole Souicc - Rev- 03 4f 1712005 The new Link Charting and Analysis functions in Pen -Link v8.0 surpass those found in dedicated link analysis applications; so much so that many professional intelligence analysts have told us that they no longer need a separate link charting tool. You can generate Link Charts automatically from various database Call reports, Subscriber reports, and Special reports. In addition to the linking performed by the software, you can add links and information manually. A powerful suite of annotation tools makes it easy to augment your charts in a wide variety of ways. The following examples will give you an idea of some of the Link Chart capabilities you will find in Pen -Link v8.0. t IDA At IF yZ. It.I- Link Chart showing the network of call activity for intercepted call data. Nodes show Phone Number and Subscriber Name. Icons indicate the type of communications device used. Links show call directions and frequencies. Link chart depicting various events in a homicide investigation. Note the icon bar at the right of the chart area; Pen -Link comes with over 600 professionally draw icons in 14 categories. You can also create your own icons from any image, add them to existing categories or create your own categories. ab 1 � r t. — F r =® a UX via Link chart depicting various events in a homicide investigation. Note the icon bar at the right of the chart area; Pen -Link comes with over 600 professionally draw icons in 14 categories. You can also create your own icons from any image, add them to existing categories or create your own categories. Link Chart derived from the same data as the one shown at left. This one shows Subscriber photos instead of phone icons. Node colors automatically show common calls. Link Chart Features: A Call data automatically linked to Subscriber data, including photos, addresses, aliases, etc. (all subscriber fields are available for display). A Call information displayed includes frequency, direction, origin, destination, dialed numbers A Numbers common to multiple targets are automatically highlighted. A Automatic iconic depiction of phone types. A A variety of annotation tools, including text boxes, lines, arrows, rectangles, rounded corner rectangles, circles, ellipses, photograph insertion, ... and more. A Easy zooming, panning, and scrolling controls. A Adjustable snap -to grid. A Object layering. A Library of over 600 professionally drawn icons in 14 categories. Create your own icons; add them to existing categories or create your own categories. Many more features... F r =® a UX via Link Chart derived from the same data as the one shown at left. This one shows Subscriber photos instead of phone icons. Node colors automatically show common calls. Link Chart Features: A Call data automatically linked to Subscriber data, including photos, addresses, aliases, etc. (all subscriber fields are available for display). A Call information displayed includes frequency, direction, origin, destination, dialed numbers A Numbers common to multiple targets are automatically highlighted. A Automatic iconic depiction of phone types. A A variety of annotation tools, including text boxes, lines, arrows, rectangles, rounded corner rectangles, circles, ellipses, photograph insertion, ... and more. A Easy zooming, panning, and scrolling controls. A Adjustable snap -to grid. A Object layering. A Library of over 600 professionally drawn icons in 14 categories. Create your own icons; add them to existing categories or create your own categories. Many more features... PEN I NK 4.5.3 Time Lines r.; i v)l' v_. 1 - ohz Source- Rev 0�" 41i7(20"kt Pen -Link software incorporates two types of Time Line functions; the Standard Timeline and the Linkable Timeline. Standard Timelines can be generated from the Case Events database; they represent a quick, one -click way to show a chronological charts of any set of events in an Event report. Linkable Timelines can be generated from Event reports, Call reports, or by freeform drawing. Freeform Timeline showing chronological development of events in the Scott Peterson murder case; a case the gained national news media attention in the United States in 2003 and 2004. Peterson was ultimately convicted, in part because of the evidence provided by the wiretaps conducted on his cell phones using Pen -Link systems. Call Association Timeline showing calls links between numbers in chronological order. This chart reveals a possible repeating temporal pattern among four phones. Horizontal lines represent unique phone numbers in the report, vertical lines represent calls, anchors and arrows show call direction. Pk Al % —- Freeform Timeline showing chronological development of events in the Scott Peterson murder case; a case the gained national news media attention in the United States in 2003 and 2004. Peterson was ultimately convicted, in part because of the evidence provided by the wiretaps conducted on his cell phones using Pen -Link systems. Call Association Timeline showing calls links between numbers in chronological order. This chart reveals a possible repeating temporal pattern among four phones. Horizontal lines represent unique phone numbers in the report, vertical lines represent calls, anchors and arrows show call direction. Event Timeline depicting events in a homicide investigation. This chart was generated automatically by data queried from the Events database. Aromatically generate court -quality timeline charts, arranged by Case, Event Type, Subject, Investigator, etc. Timeline Features: ➢ Generate Timelines from Event reports, Call reports, or by drawing freehand Automatically. incorporate Notes or Summary text from Event records in the database ➢ Automatic assignment of Event Type icons ➢ User -defined colors, node shapes, line styles, etc. ➢ User can select which fields to include from the database in node bodies, headers, and footers ➢ Superimpose a Link Chart on your Timeline ➢ Powerful suite of annotation drawing tools; text boxes, lines, arrows, eailouts, arc, shapes, add photographs, etc. ➢ Easy zooming, panning, and scrolling controls', automatic zoom, manual zoom, zoom to fit. ➢ Library of over 600 professionally drawn icons in 14 categories. Create your own icons; add them to existing categories or create your own categories. ➢ Many more features... 10 —- STs Event Timeline depicting events in a homicide investigation. This chart was generated automatically by data queried from the Events database. Aromatically generate court -quality timeline charts, arranged by Case, Event Type, Subject, Investigator, etc. Timeline Features: ➢ Generate Timelines from Event reports, Call reports, or by drawing freehand Automatically. incorporate Notes or Summary text from Event records in the database ➢ Automatic assignment of Event Type icons ➢ User -defined colors, node shapes, line styles, etc. ➢ User can select which fields to include from the database in node bodies, headers, and footers ➢ Superimpose a Link Chart on your Timeline ➢ Powerful suite of annotation drawing tools; text boxes, lines, arrows, eailouts, arc, shapes, add photographs, etc. ➢ Easy zooming, panning, and scrolling controls', automatic zoom, manual zoom, zoom to fit. ➢ Library of over 600 professionally drawn icons in 14 categories. Create your own icons; add them to existing categories or create your own categories. ➢ Many more features... 10 _PE'-LONK 4.5.4 GS Maimin Pen -Link v 9 — Sole Source — Rev. 0- 411 7.'2001; Where available, Geographical Information Systems (GIS) is an optional add-on to Pen -Link Software. Pen -Link provides GIS capabilities and will load the data. The mapping layers will need to be acquired locally. With the GIS functions, you can map any record or set of records that contain location information, including Call records, Cell Sites, Subscriber records, and Event records. Pen -Link will map locations based on street addresses or latitude and longitude (so it will work with most GPS Tracking units). Where available, the GIS functions can include center -line street data allowing you to zoom down to surface street level. Pen -Link's GIS capabilities are also compatible with ESRI shape file formats, so you can also load your own departmental data and image layers. GIS Map showing cell sites and sectors that an intercepted Target occupied while making and receiving several calls, while traveling by automobile. Pen -Link's Google Earth interface shows the cell sites and sectors that a wireless Target occupied during calls, superimposed on satellite imagery of the city GIS Map of GPS Tracking data in a Pen -Link Events Database. Data was obtained by loading the output files of a Bloodhound GPS Tracking System. Geospatial plotting reveals the path the subject took, driving his vehicle from Sacramento, CA to various points in Texas and along the Mexican border over a 30 -day period. GIS Map showing the locations of various case -related events stored in the Events Database. In addition to the locations in various parts of the city, each node shows the Name of the subject, the Date and Time of the event, and the Event Type. _PEN=L f NK Fen-Line.v81— Sole Source—Rev 03 4/Iil200b Pen -Link offers flexible support for outputting data, audio, and work product to other formats, for distributing to other sites, sharing with cooperating agencies, backup, packaging for discovery, exporting to other databases, etc. Data and evidence can be exported to any computer -writable format, including CD, DVD, BD (Biu -ray), MO, UDO, etc. Export formats include: ASCII Text files are an easy means of exchanging data between your Pen -Link Databases and other database systems. O Industry -standard .CSV files 4 ColumnarASCU files 4 RTF (Rich Text Format). All reports, standard and custom, can be output to industry -standard .RTF files, for use in any Word Processing application. This is a simple way to output data records for agencies that do not have Pen -Link software (e.g., your prosecutors; defense attorneys). The recipient of such an .RTF file can simply open the report in Word, WordPerfect, WordPad, etc. 4 .HTML Files. You can export your reports to .HTML files that can be opened in any web browser. If your report includes the "Audio File Name" column for wiretap records, then the exported field in the .HTML file becomes a standard .HTML hyperlink to the audio file. The result is that, when you open the file in a browser, clicking on an Audio File Name will play the .WAV file recording for that record, using whatever software is registered on that system for .Wav playback (e.g., Windows Media Player). This type of file is ideal for setting up a simple system for courtroom playback if you don't want to have a full installation of Pen -Link software available in court. 4 XML Files. .XML is an alternative to .HTML, with similar features. The advantage of .XML files is that they can be imported into other analytical database systems, like ACISS. J WAV Export. You can export .WAV file recordings directly from any Pen -Link Call report. You can export all of the recordings for all records contained in a report, export selected recordings for some of the records in a report, or export tagged segments of a recording from any particular record displayed in a report. This last option would be ideal in situations where portions of a recording must be made available for playback; e.g., to make recordings of news media personnel available for review by the An HTML file output from a Pen -Link call report. The file shows Call Details. Subscriber, Location, and Synopsis for each call record. The Audio File Name is a hyperlink to the .WAV recording; click the link to play the recording (e.g., in Windows Media Player, as shown here). A Pen -Link Calls Report viewed as an .RTF file in Microsoft PEN-L0,NIS Pen -Link, vt' 1 - Sole Source - Rev 03, 411712008 intercepted party when those conversations are part of larger recordings, like checking voicemail 4 Export to other Analytical Systems. Many agencies use multiple applications for intelligence analysis. The exchange of data among multiple systems can sometimes be tedious and time consuming. Pen -Link, Ltd.°��,�..m"�'' cooperates with manufacturers of other popular analytical systems to simplify the exchange of data between Pen -Link and other systems, saving the analyst valuable time and effort. We currently offer Call Data export functions for i2's Analyst's Notebook and ACISS. -4 Pen -Link Archives. Each database in Pen -Link Software offers an Archive function that will output the data in the database to an external archive file. The archive file is a compressed version of all of the data and content the user wants to export, including links through multiple databases, text (e.g., synopses, transcripts, etc.), photos, videos, audio recordings. The user can archive all records in a database, or only a selected subset of records in the database. The archive I represents a convenient, single -file source for all of your Pen -Link data, and is therefore an easy means of backing up w�• - - - your databases, or sharing your databases with other cooperating agencies who also printed Subscriber record showino oersonal data and imaoes. have Pen -Link. 4 Media. The Pen -Link system can output to any computer -writable medium, including CD, DVD, BD, MO, UDO, etc. Multiple copies may be burned simultaneously or in series. With its long history and widespread use among law enforcement and intelligence agencies, Pen -Link software has thousands of users throughout the United States and a growing user base abroad. In the event that your agency should bring new personnel in from other agencies, the chances are fairly good that at least some of these people will already be familiar with Pen -Link. Some may even be well experienced or expert users of Pen -Link. Such knowledge will only benefit your agency if you number Pen -Link software among the analytical tools that are available to your personnel. PEN=L f NK Pen -Link vc 1 - Sole Source - Rev J`, 4117/200k, Pen -Link has established a large user base over more than ZQ years. Pen -Link is accepted as an industry standard by Law Enforcement agencies at all levels, local, city, state, and Federal. Many U. S. Federal Law Enforcement and Intelligence agencies have acquired agency -wide site license contracts for the use of Pen -Link in their operations throughout the United States. These include the DEA, ICE, ATF, U.S. Marshals, FBI, and Secret Service. Pen -Link systems are also becoming more frequently used by U.S. intelligence efforts operating in several other countries. In addition, Pen -Link is used nationwide by hundreds o` law enforcement agencies at the county, city, and state levels. No other system of this specific nature has such wide -spread use. With today's intelligence efforts shifting from proprietary intelligence to shared intelligence through interagency cooperative efforts (e.g. Fusion Centers, HIDTAs, HIFCAs, ICACs), such, wide -spread use of Pen -Link systems can only help to facilitate the sharing of intelligence. -. 14