HomeMy WebLinkAboutBack-Up DocumentsCITY OF MIAMI, FLORIDA
To: Anne Perez DATE: June 19, 2019 RLE'
Director SUBJECT:
Procurement Department Finding of Sole Source
FROM: Jorge R. Colina REFERENCES Pen -Link Lincoln System
Chief of Police ENCLOSURES: with Software Support
The police department is requesting a sole source finding for the purchase of a new Pen -Link
Lincoln System with software support from Pen -Link, Ltd., to continue to conduct
telecommunications investigations in a more proficient manner, in the amount of $69,203.72,
allocating funds from Police General Fund Account No. 00001.191001.664000.0000.00000.
Based upon the attached, please take the necessary steps to verify that Pen -Link, Ltd., located at
5944 VanDervoort Dr., Lincoln, NE 68516, is the sole provider for the provision of the Pen -Link
Lincoln System with software support.
The Pen -Link Lincoln System is utilized for trap and trace and subscriber information from cellular
providers which includes GPS tower location information. This information is critical in
investigations such as missing persons, abductions/kidnappings, homicides and robberies where
time is of the essence. This server is also used for wiretaps for voice/texts and investigations that
required social media information for Title III warrants. Without the Pen -Link Lincoln System, we
cannot obtain cellular site information and are not able to track cellular phones, which is
necessary to locate violent felony offenders.
Pen -Link, Ltd. is considered to be the sole provider of the Pen -Link Lincoln System and software
support.
In order for the City of Miami Police Department to be self-sufficient in carrying out their
investigations in a proficient manner without interruption, it is in the best interest of the City to
purchase this system.
Your attention to this matter is greatly appreciated.
FINDING OF SOLE SOURCE APPROVED:
Anne rez,
Procurement Director
JRC/DMJ/JB/jms
Attachments
LEG 7-2
IN
FROM
CITY OF MIAMI, FLORIDA
INTER -OFFICE MEMORANDUM
Emilio T. Gonzalez, Ph. D., City Manager DATE: August 20, 2019
SUBJECT
Annie Perez, CPPO, Director of Procurement REFERENCES:
ENCLOSURES:
RECOMMENDATION:
FILE:
Recommendation for Approval to
Award Sole Source Contract with
Pen -Link, LTD. Corp SS No. 18-19-
017
Based on the findings below, the Procurement Department (Procurement) hereby recommends
award to Pen -Link, LTD. Corp. ("Pen -Link") the sole source provider of Pen -Link software,
hardware, and maintenance.
Contract Number/Title: 18-19-017, Pen -Link Software, Hardware and Maintenance.
Contract Amount: Initial amount of approximately $70,600 and an estimated annual
expenditure of $15,000.
Recommended Vendor: Pen -Link
BACKGROUND:
The Police Department ("Police") have been tasked with establishing a viable source to gather
vital information from Global Positioning Systems ("GPS") towers. Police along with other
municipalities have been utilizing the Miami -Dade County Police Department's ("MDPD") access
to Pen -Link for numerous years. However, in recent months the shared access has been
restricted and Police has been advised it will be discontinued due to overtime budgeting restriction
at MDPD. After conducting market research, the Department of Procurement ("Procurement")
found that Pen -Link was a viable resource to gather vital information from GPS towers and is the
sole source provider for a software which is compatible with the MDPD, Florida Department of
Law Enforcement, various federal law enforcement agencies as well as many other South Florida
municipalities who also use this software. The Pen -Link software is the only system in the industry
that is capable of intercepting, processing and analyzing both Telco and IP Data all in one
comprehensive platform with "Real Time" information. Pen -Link also supports all United States
Communications Assistance for Law Enforcement Act ("GALEA") delivery standards, European
electronic surveillance delivery standards, as well as, South and Central American delivery
standards. Procuring the Software will help Police solidify evidence on criminal suspects and
assist in the prosecution of State and Federal investigations such as missing persons,
abductions/kidnappings, homicides, robberies, and otherrelated crimes.
PR19164
Page 1 of 2
Approved:
Erni
nager
cc: Joseph F. Napoli, Deputy City Manager
Jorge R. Colina, Chief, Police Department
Yadissa A.Calderon, CPPB, Assistant Director, Procurement
PR19164
Page 2 of 2
Date: I.3 / 19
1.00 BUFFALO MEDIA STATION EXTERNAL BLU RAY WRITER
Quote Number 00001638
Created Date 3/19/2019
Miami Police Department - Miami - Special
Investigations (FL)
400 NW 2nd Avenue, 1st Floor
Miami, Florida 33128
United States
Expiration Date 9/30/2019
Payment Terms Net 30
1.00 CISCO VPN ROUTER 5506 PACKAGE, 25 TUNNELS
Includes 3 -Year Warranty I 4 -Hours of Configuration Services
COLLECTION SERVICE SERVER
Dell T630 or R740 (Depending on Customer Requirements) I Dual Multi Core Proc. ( 32GB RAM 1 (4)
1.00 600GB 10k RPM 2.5 inch Hard Drives, Redundant Power Supply I Perc RAID Controller I Redundant
Power Supplies I Dual Embedded Gigabit Ethernet NIC I Rack Chassis wl Rapid Rails I ORAC Enterprise
3 -year Next Business Day Support I Windows Server Standard, Symantec AV and Netop Included
Quote
$1,750.95 $1,750.95
$61.2.5, $61.25
$192.53 $192.53
$2,289.66' $2,289.66
$11,089.39 $11,089.39
2.00
Dual Monitor Monitoring Workstation
$2,290.20 $4,580.40
Includes NetOp, Headphones, 23" Dual Monitors, Wks UPS, AV
PLX WORKGROUP SERVER II
Dell T630 or R740 (Depending on Customer Requirements) I Dual Multi Core Proc. 64GB RAM (4)
1.00
960GB SSD Read Intensive 2.5 Inch Hard Drives, Redundant Power Supply I Pere RAID Controller 1
$17,594.14 $17,594.14
Redundant Power Supplies I Dual Embedded Gigabit Ethernet NIC I Rack Chassis w/ Rapid Rails I iDRAC
Enterprise I 3 -year Next Business Day Support I Windows Server Standard, Symantec AV and Netop
Included (Need to add Windows Server Device CALS CALS Based on # of workstations)
1.00
RACK MOUNT NAS
$4,943.83 $4,943.83
Dell NX Series 44 TB
1.00
TRIPPLITE 17" 8 -PORT CONSOLE KVM
81,360.34 $1,360.34
2.00
TRIPPLITE USB KVM CABLE
$31.50 $63.00
WINDOWS SERVER DEVICE CAL
2.00
Windows Server Device CAL (Based on # of Workstations connecting to server)
$24.96 $49.92
Pen -Link, Ltd is a U.S. - Based Small Business
DUNS: 195956636 / TIN: 47-0707585 / CAGE: OK6H9
This document contains confidential and proprietary information and is the copyrighted property of Pen -Link, Ltd. Distribution of this document
within the receiving agency or company is permitted, but only to such personnel as may be required to meet the goals of the project for which
this document was provided. Recipients of this document may not reproduce it, in part or in whole, in any form, or convey its contents to
external agencies by any means, without the express written consent of Pen -Link, Ltd. This document may not be distributed, in part or in
,n,hnlc in anv fnrm to anv nnmmornial nnn_nrnicrnmen+ on+i+v
PENLiNK o.e4
1.00 LINCOLN Install $10,000.00 $10,000.00
3 -Days, Single Engineer
PLX SOFTWARE LICENSE - INTERCEPT EDITION (IP) to be combined with PROFESSIONAL or
2.00 INTERCEPT EDITION (TELEPHONE) $6,250.00 $12,500.00
Intercept internet protocol data to include pens, log -in session data, social media, email, and other IP
sources.
1.00 PenPoint Setup $2,500.00 $2,500.00
2.00 PENPOINT 1 -PACK $799.00 $1,598.00
PLX's mobile app maps target location data on iOS and Andriod devices: 1 -year Subscription
Subtotal
$70,573.41
Discount
$0.00
Tax
$0.00
Total Price
$70,573.41
Pen -Link, Ltd, Maintenance and Support Terms and Conditions
1. Terminology
The following terms and definitions apply throughout this document.
1.1. Pen -Link Software. Pen -Link Software is software developed and manufactured by Pen -Link, Ltd.
1.2, Pen -Link Customer (also "Customer"). A Pen -Link Customer, or Customer, is any agency or other entity that has one or more
current, valid Licenses for Pen -Link Software purchased from or through Pen -Link, Ltd.
Pen -Link, Ltd, Maintenance and Support Terms and Conditions
1.3. Basic Technical Support Package. Entitles our customers to normal business hours telephone support at Pen -Link, Ltd.s
published number and/or assistance via e-mail.
1.4. Standard Maintenance and Support. Standard Maintenance is a Maintenance option that includes Software Updates, Software
Upgrades, and Basic Technical Support as defined herein.
1.5. Premium Maintenance and Support. Premium Maintenance is a Maintenance option that includes Software Updates, Software
Upgrades, and Premium Technical Support as defined herein.
1.6. Software Update. A Software Update is an enhancement including additions, changes, and bug fixes to Pen -Link Software that is
already in the applicable commercial market. Software Updates occur within the same major version number of an existing software
Pen -Link, Ltd is a U.S. - Based Small Business
DUNS: 195956635 /TIN: 47-07075851 CADGE: OK6H9
This document contains confidential and proprietary information and is the copyrighted property of Pen -Link, Ltd. Distribution of this document
within the receiving agency or company is permitted, but only to such personnel as may be required to meet the goals of the project for which
this document was provided. Recipients of this document may not reproduce it, in part or in whole, in any form, or convey its contents to
external agencies by any means, without the express written consent of Pen -Link, Ltd. This document may not be distributed, in part or in
�nrhnlo in anv fnrm to anv nnmmarnial nnn_nrniarnmont ontity
Quote
product. For example, replacing Pen -Link v8.1.29.0 with Pen -Link v8.1.30.0 would constitute a Software Update. Such an update is
often referred to as a New Build of the Pen -Link Software.
1.7. Software Upgrade. A Software Upgrade is the replacement of an older major version of an existing Pen -Link Software product or
products, with a newer major version of a Pen -Link Software product or products, to the extent required to maintain the same
operational functionality that was supported by the Pen -Link Software prior to the upgrade. For example, upgrading from Pen -Link
Version 7 to Pen -Link Version 8 (where 8 is the newer major version) would constitute a Software Upgrade, so long as the installation
of the newer version of the PenLink Software supported at least the same operational functionality that the Customer had under
Pen -Link version 7. Upgrades do not apply to new software products that Pen -Link, Ltd. may release to the commercial market from
time to time in the future.
1.8. Basic Technical Support (also Basic Support Basic Technical Support is a Support option that includes telephone -based
Technical
processes such that Pen -Link, Ltd. may deem fit to offer. Basic Technical Support may be obtained by contacting Pen -Link, Ltd. via its
published, main telephone number (currently 402-421-8857), its general support email account (support@penl ink. com), or its World
Wide Web site (www.peniink.com). Basic Technical Support is available Monday through Friday, from 8:00 AM to 5:00 PM Central
time, except for holidays.
1.9. Premium Technical Support (also Premium Support Premium Technical Support is a Support option that includes all of the support
services offered with Basic Technical Support (Section 1.8), plus Emergency After -Hours support for live communication interception
and collection operations. Emergency After-HCUfS support services may be accessed through methods, including telephone access,
that are provided to the customer at the time of purchase. Emergency After -Hours support services are available Monday through
Friday, from 5:01 PM - 7:59 AM Central time and all day Saturday & Sunday, including holidays.
1.10. Maintenance and Support Agreement ("Agreement'). This Maintenance and Support Agreement is the Agreement between
Pen -Link, Ltd. and the Customer regarding the terms and conditions under which the Maintenance and Support Services described in
this document are purchased and provided.
2. Software
2.1. Maintenance is an optional service offered by Pen -Link Ltd. to augment a purchase of Pen -Link Software. Maintenance may be
purchased by a Pen -Link Customer along with, or subsequent to, the purchase of Pen -Link Software.
2.2. Maintenance is offered only pursuant to a Maintenance and Support Agreement between the Customer and Pen -Link, Ltd.
2.3. Pen -Link, Ltd. offers two levels of Maintenance that a Customer may purchase: Standard Maintenance and Premium
Maintenance, as defined in Sections 1.4 and 1.5 respectively.
2.4. Maintenance applies only to software developed and manufactured by Pen -Link, Ltd. Maintenance does not apply to software
developed
and the Customer, to which Pen -Link, Ltd. is a signatory party, Maintenance does not include updates, upgrades, or bug fixes to, or
new releases of, any third -party software or hardware purchased through Pen -Link, Ltd. or with the assistance of Pen -Link, Ltd.
Support for third party software and hardware products bundled with Pen -Link, Ltd. licensed Pen -Link Software is available only
according to the third -party manufacturer
2.5. All Maintenance deliveries are subject to the terms and conditions of the applicable End User License Agreement EULA for the
Licensed Software.
3. Technical Support ("Support")
3.1. Technical Support Support is an optional service offered by Pen -Link, Ltd, to support a Customer in the authorized use of licensed
PenLink Software.
3.2. Support is offered only pursuant to a Maintenance and Support Agreement between the Customer and Pen -Link, Ltd.
3.3. Pen -Link, Ltd. offers two levels of Technical Support: Basic Technical Support and Premium Technical Support, as defined in
Sections 1.8 and 1.9 respectively.
3.4. Pen -Link, Ltd. will make every reasonable attempt to answer a Customers Support questions and address a Customer s Support
concerns. However, Support is offered on a good faith, diligent effort basis only, and Pen -Link, Ltd. may not be able to resolve every
request for Support.
3.5. Technical Support is provided for ongoing, operational use of the licensed Pen -Link Software; Support is not intended to be a
substitute for training or professional services necessary for the implementation or system redesign of the licensed Pen -Link Software,
which are outside the scope of this agreement. All such services, including without limitation, training, on-site assistance, consultation,
custom programming and other software customizations, network design, and database and network administration, may be provided
pursuant to separate agreements with and by Pen -Link, Ltd.
3.6. Unless otherwise specified in a separate, written agreement between Pen -Link, Ltd. and the Customer, to which Pen -Link, Ltd, is
a signatory party, Support is available only for the current and immediately preceding version of the licensed Pen -Link Software.
Pen -Link, Ltd is a U.S. - Based Small Business DUNS: 195956636 / TIN: 47.07075851 CAGE: OK6H9
This document contains confidential and proprietary information and is the copyrighted property of Pen -Link, Ltd. Distribution of this document
within the receiving agency or company is permitted, but only to such personnel as may be required to meet the goals of the project for which
this document was provided. Recipients of this document may not reproduce it, in part or in whole, in any form, or convey its contents to
external agencies by any means, without the express written consent of Pen -Link, Ltd. This document may not be distributed, in part or in
hnlo in env fnrm to —, rnmmorrial nnn_nnvornmont ontihi
Quote
Support for a previous version of Pen -Link Software is provided up to a maximum of eighteen (18) months after the release of the
current version of software, provided that the Customer and Pen -Link, Ltd. are paries to a current Maintenance and Support
Agreement.
3.7. Unless otherwise specified in a separate, written agreement between Pen -Link, Ltd. and the Customer, to which Pen -Link, Ltd. is
a signatory party, Support does not include any of the following:
3.7.1. Support for database products or so-called DBMS or Database Management Systems, including without limitations, setup and
alteration and/or configuration of such products, and resolution of errors related directly to such products.
3.7.2. Resolving network, workstation, or other environmental errors not directly related to the licensed Pen -Link Software. 3.7.3.
Support for any licensed Pen -Link Software working on or with any version of any database, Database Management System,
operating system, or other hardware or software product or system that Is not specifically identified as interoperable and compatible
with the specific version of the license Pen -Link Software being used.
3.7.4. Support for any alpha, beta, or other preproduction release of any software, including Pen -Link Software. 3.7.5. Support for any
changes to Pen -Link Software made outside of the product s scope by a customer or by any third party. 3.7.6. Support for any
licensed Pen -Link Software that is used for a purpose, or in a manner, for which it was not designed.
4. Terms and Conditions
4.1. Maintenance and Support Agreements are options made available by Pen -Link, Ltd. for a Customer to purchase.
4,2. Maintenance and Support Agreements are offered on an annual basis.
4.3. Unless otherwise specified in a separate, written agreement between Pen -Link, Ltd, and the Customer, to which Pen -Link, Ltd. is
a signatory party, Maintenance and Support Agreements will renew automatically at the end of each annual term, provided that the
Customer pays the applicable renewal fees.
4.4. Unless otherwise specified in a separate, written agreement between Pen -Link, Ltd. and the Customer, to which Pen -Link, Ltd. is
a signatory party, a Customer s Maintenance and Support Agreement is to be paid at the start of each annual term.
4.6. Pen -Link, Ltd.s obligations hereunder are subject to the Customer s timely payment for Maintenance and Support. Failure of the
Customer to pay fees in a timely manner for any term of Maintenance and Support may, at the sole discretion of Pen -Link, Ltd., result
in the termination or suspension of Maintenance and Support services.
4.7. Lapses and Reinstatement. If a Customer s Maintenance and Support agreement terminates as a result of expiration or otherwise
pursuant to this Agreement, and the Customer decides to reinstate the Agreement, the Customer will be required to pay the applicable
Maintenance and Support, fees for the lapsed period (the time elapsed between the Agreement expiring and subsequently being
reinstated), plus a reinstatement fee equal to 10% of the fees for the lapsed period.
4.8. Taxes, The Customer is responsible for payment of all applicable taxes, value added taxes, or other taxes (however designated)
related to the Maintenance and Support of the Licensed Software, unless otherwise agreed upon and stated in writing.
4.5. Payment. agrees to make payment to Pen -Link, Ltd, no later than thirty (30) days from the date of the invoice, unless otherwise
agreed upon in writing. Unless otherwise instructed, the Customer will make payment directly to Pen -Link, Ltd.
4.9. This Agreement will automatically terminate for each Licensed Pen -Link Software product upon termination of the EULA
corresponding to such Pen -Link Software product.
4.10. The Customer may terminate this Agreement for Convenience, but the Customer will not be entitled to a refund of any paid fees
in such an event.
4.11. Additional Orders. Orders by the Customer for additional Pen -Link Software products or additional licenses of Pen -Link Software
products will increase the Customers Maintenance and Support fees under this Agreement.
4.12. We reserve the right to impose a convenience fee of 2.0% for credit card processing on amounts over $10,000.
5. Warranty and Liability Disclaimer
5.1. Pen -Link, Ltd. warrants that the Maintenance and Support services provided to the Customer under this Agreement shall be
performed with due care, and in a professional and workmanlike manner. Pen -Link, Ltd. does not otherwise warrant the accuracy or
completeness of any services provided pursuant this Agreement. PEN -LINK, LTD. DISCLAIMS ANY AND ALL OTHER
WARRANTIES, EXPRESS, IMPLIED OR OTHERWISE, IN CONNECTION WITH THE SUBJECT OF THIS AGREEMENT. IN NO
EVENT, UNDER ANY THEORY OF LAW, SHALL EITHER PARTY AND/OR ITS AFFILIATES BE LIABLE TO THE OTHER FOR ANY
INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES OR LOST PROFITS AND/OR ITS AFFILIATES ARE
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. PEN -LINK, LTD. S LIABILITY UNDER THIS AGREEMENT SHALL NOT
EXCEED THE PREPAID AND UNUSED PORTION OF THE CUSTOMER S MAINTENANCE AND SUPPORT FEES PAID TO
PEN -LINK, LTD. PEN -LINK, LTD. SPECIFICALLY DISCLAIMS ALL RESPONSIBILITY FOR ANY SERVICES PROVIDED BY ANY
PARTNER OR ANY OTHER THIRD PARTY.
5.2. It is the sole responsibility of the Customer to make and maintain adequate backup copies of software and data.
5.3. In no event will Pen -Link, Ltd. be responsible for lost data.
Pen -Link, Ltd is a U.S. - Based Small Business
DUNS: 195956636 / TIN: 47-0707585 / CAGE: OK6H9
This document contains confidential and proprietary information and is the copyrighted property of Pen -Link, Ltd. Distribution of this document
within the receiving agency or company is permitted, but only to such personnel as may be required to meet the goals of the project for which
this document was provided. Recipients of this document may not reproduce it, in par or in whole, in any form, or convey its contents to
external agencies by any means, without the express written consent of Pen -Link, Ltd. This document may not be distributed, in part or in
uhnlo in onv form +n env nnmmnrniol nnn_nnvomman+ anti+"
,.xp'.. _
6. Miscellaneous
Quote
6.1. Entire Agreement. This Agreement constitutes the entire Agreement between the Customer and Pen -Link, Ltd. related to the
subject matter hereof, and additions or modifications shall be binding upon the parties only if the same shall be in writing and duly
executed by the Customer and a duly authorized officer of Per -Link, Ltd. The Licensed Pen -Link Software is licensed under a separate
End User License Agreement (EULA) and professional services, if any, are provided under a separate professional services
agreement. The terms and conditions of any Customer purchase order are only binding on Pen -Link, Ltd. if they are agreed to in
writing by an authorized Pen -Link, Ltd. officer and in a document other than the purchase order.
6.2. Waiver. The waiver or failure of either party to exercise in any respect any right shall not be deemed a waiver of any further or
future right.
6.3. Assignment. The Customer may assign this Agreement only in connection with a proper and valid assignment of the
corresponding EULA to the extent permitted there under; provided that the Customer gives written notice of such assignment to
Pon -Link, Ltd. Pen -Link, Ltd. may freely assign this Agreement to a purchaser of that portion of Pen -Link Ltd. s business to which this
Agreement relates, to the surviving corporation in the event of a merger, and to any affiliate or third -party whore Pen -Link authorizes to
provide Maintenance and Support for the Licensed Pen -Link Software of the nature contemplated hereby.
Pen -Link, Ltd is a U.S. - Based Small Business DUNS: 195956636/ TIN: 47-0707585 J CAGE: it
This document contains confidential and proprietary information and is the copyrighted property of Pen -Link, Ltd. Distribution of this document
within the receiving agency or company is permitted, but only to such personnel as may be required to meet the goals of the project for which
this document was provided. Recipients of this document may not reproduce it, in part or in whole, in any form, or convey its contents to
external agencies by any means, without the express written consent of Pen -Link, Ltd. This document may not be distributed, in part or in
hm to in —, fnrm to arni nnmmornial nnn_nnvornmont o fity
JUSTIFICATION FOR
E'EN -LINK LINCOLN SYSTEM
WITH SOFTWARE
1. Q: Explain why the product/service requested is the only product/service that
can satisfy your requirements, and explain why the alternatives are
unacceptable. Be specific with regard to specifications, features, characteristics,
requirements, capabilities and compatibility. Describe what steps have been
undertaken to make this determination.
A: This highly sophisticated product would be utilized to trap and/or trace violent
felony offenders. The Pen Link system will allow the City of Miami to be self
sufficient in these endeavors. In cases of major catastrophes and major cases as in
Officer involved incidents or major violent cases the City of Miami would request the
assistance of our Partner Police Departments. In order to be compatible with our
Partner Police Departments; Miami Dade Police Department, FDLE and the United
States Secret Service, just to name a few we would need the Pen Link system. All the
local municipalities and Federal Agencies within the South Florida utilize the Pen
Link system; therefore to give us full compatibility we would need to utilize the same
Pen Link system.
See attached Pen Link System Quote and sole source package for all specifications
and characteristics of this system.
2. Q: Explain why this service provider, supplier or manufacturer is the only
practicable available source from which to obtain this product or service, and
describe the effort that was made to verify and confirm whether, or not this is so.
A: The Pen Link system would give us fall capabilities with other Law Enforcement
Agencies in the surrounding areas.
3. Q: Will this product obligate us to a particular vendor for future purchases
(either in terms of maintenance that only this vendor will be able to perform
and/or if we purchased this item, will we need more "like" items in the future to
match this one.
A: The Pen Link system provides one (1) year full warranty and two (2) years
additional warranty for an added cost.(listed in the purchase quote). Since Pen Link is
sole source provider of all Pen Link software systems, we would have to contact them
for any maintenance to the system.
If the City of Miami seeks future expansion of the wiretap system, other items are
provided at an additional cost'from Pen Link.
P
I\�
4. Q: Explain why the price for this product or service is considered to be fair and
reasonable.
A: Pen Link has standard prices .for Federal, State and Local law enforcement
agencies.
5. Q: Describe the negotiation efforts, if any, that have been made with the supplier
to obtain the best possible prices.
A: We worked with. the Pen Link sales representative to provide the,best possible
price on the products and services that the City of Miami needs in ord6r to provide
services to the citizens of Miami.
6. Q: Explain the consequences to the City, including the dollar estimate of the
financial impact, if this sole source is not approved.
A: We are currently using the Miami -Dade Police Department's Pen Link system for
all cellular phone pen requests. This access is necessary to gather intelligence to
successfully track cellular phones. We have established a great working relationship
with the Miami -Dade Police Department's Technical Assistance Unit. While they
have no obligation to do so, they, have fully assisted us. Due to overtime budget
restraints, they have canceled access to their system by all agencies, except the City
of Miami. Our access to the Miami -Dade Police Department's Pen Link system is
temporary, as they will have to eventually cancel our access. When this occurs, it
will end our ability to track cellular, phones. This will have a. great impact and
consequences to the City of Miami. We will be unable to track violent felony
offenders and assist in solving cases against citizens of the City of Miami. There is no
other way to track these violent offenders without an active Pen System.
11
Please provide the following information in order to document the sole source request:
1. Explain why the product/service requested is the only product/service that can satisfy your
requirements, and explain why alternatives are unacceptable. Be specific with regard to
specifications, features, characteristics, requirements, capabilities, and compatibility. Describe
what steps have been undertaken to make this determination.
Pen Lin k's PLX system is the only system in the industry capable of intercepting, processing and
analyzing both Telco and IP data. PLX is the combined investigative power of communications
collection and analysis tools in one comprehensive platform, Normalize multiple data sets, find
commonalities, de -conflict targets and cases. There are no other systems in the market that
combine these capabilities.
Live interception is supported by a wide variety of network -based mediation, delivery, and
handover standards and protocols. PLX supports all U.S. Communications Assistance for Law
Enforcement Act (CALEA) delivery standards, all European electronic surveillance delivery
standards, all delivery standards used in South and Central America, and a variety of other,
proprietary electronic surveillance delivery methods deployed in the United States and abroad.
2. Explain why this services provider, supplier or manufacturer is the only practicably available
source from which to obtain this product or service, and describe the efforts that were made to
verify and confirm whether, or not, this is so. (Obtain and include a letter from the
manufacturer confirming claims made by distributors or exclusive distributorships regarding the
product or service, if that is cited as a reason for this Sole Source.)
PLX is the only software that can ingest and normalize native file formats or delivery standards,
regardless of the telco or IP data type. Cellphone forensic extracts, Call detail records, Email,
social media files, Cell tower dumps, Live telephonic delivery standards, Live or historic packet
data. Pen Link is also the only provider in the industry that has been building systems for over
30 years.
3. Will this product obligate us to a particular vendor for future purchases (either in terms of
maintenance that only this vendor will be able to perform and/or if we purchase this item, will
we need more "like" items in the future to match this one)?
Yes, there is an annual maintenance fee that we will continue to pay. Maintenance covers all
updates, upgrades and 24/7 support
4. Explain why the price for this product or service is considered to be fair and reasonable.
Software licensing is capable of processing both Telco and IP data, something no other vendor
supplies. Pen Link's software is in-line with other vendors who don't provide the equal to or
better than the same service.
5. Describe the negotiation efforts, if any, that have been made with the supplier to obtain the
best possible price.
Software was discounted due to quantity discounts. Upgrade was at NO CHARGE due to
current maintenance account.
6. Explain the consequences(s) to the City, including the dollar estimate of the financial impact, if
this Sole Source is not approved.
If The City of Miami Police Department does not purchase PenLink's PLX system, we would
continue relying on outside agencies to assist us at their convenience. Time is essence when
dealing with criminal cases and at times outside agencies cannot attend to us in a timely
manner, and possibly risking the loss of evidence and effecting the outcome of the case. By
having our own Pen Link's PLX system we would be self-reliant, thus assisting us in locating and
apprehending criminal offenders and evidence needed for proper prosecution.
Lawful Interception Systems.
(A Brief Technical Overview)
Hakan EKIZER
Chief Advisor, Monitorto KP
U N MIK-DOC / Support&Services
Cybercrime&Computer Forensics Expert
Telecommunications&Networks Specialist
What is Lawful Interception ?
Lawful interception (LI) is the legally authorized process by which a network operator or service
provider gives law enforcement officials access to the communications (in every kind of telephone calls,
internet traffic and satellite communications etc) of private individuals or organizations. Lawful
interception is becoming crucial to preserve national security, to combat crimes and to investigate
serious criminal activities.
The work in Lawful Interception has its foundation in the European Council Resolution of
January 1995 [291 which outlined the International Requirements for the Lawful Interception of
Telecommunications now known widely as the IUR. This was the result of several years of work by the
European governments in cooperation with Australia, New Zealand, Canada and the USA.
The standardization of lawful interception is vital to provide an economically and technically
feasible solution that complies with national and international conventions and legislation. ETSI has
played a leading role in the standardization of lawful interception since 1991; today work is
concentrated in Technical Committee Lawful Interception (TC LI), which enjoys the active participation
of the major telecom manufacturers, network operators, Law Enforcement Agencies and regulatory
authorities of Europe and from around the world. ETSI's LI work covers the whole spectrum of
interception aspects, from a logical overview of the entire architecture and the generic intercepted data
flow, to the service -specific details for e-mail and Internet.
According to ETSI standards my aim within this white paper is briefly describing How a LI system
can build up. You can also find out ETSI documentations for much more detailed and technical
information.
LI Overview from ETSI Perspective.
Lawful Interception (LI) is a requirement placed upon service providers to provide legally
sanctioned official access to private communications. With the existing Public Switched Telephone
Network (PSTN), Lawful Interception is performed by applying a physical 'tap' on the telephone line of
the target in response to a warrant from a Law Enforcement Agency (LEA). However, Voice over IP
(VoIP) technology has enabled the mobility of the end-user, so it is no longer possible to guarantee the
interception of calls based on tapping a physical line.
Whilst the detailed requirements for LI may differ from one jurisdiction to another, the general
requirements are the same. The LI system must provide transparent interception of specified traffic only
and the subject must not be aware of the interception. The service provided to other users must not be
affected during interception.
Architecture Overview
Although the detail of LI may vary from country to country we can look at the general logical and
physical requirements and also explain much of the common terminology used. The primary purpose of
the service provider network is to enable private communications between individuals; any LI
functionality built into the network must not affect the normal service to those individuals. The
architecture requires a distinct separation of the Public Telecom Network (PTN) and the networks used
for distribution and processing of LI information. The interfaces between the PTN and the Law
Enforcement Monitoring Facility (LEMF) are standardized within a particular territory,
LI deals with two 'products', these are; Contents of Communications (CC) and Intercept Related
Information (IRI). Contents of Communications is exactly what it sounds like: the voice, video or message
contents. Intercept Related Information refers to the signaling information, the source and destination
of the call etc.
Public Network I
LEA Network
Network Operator's
Administration HI I
Function
/ IIF
' Internal Wercept Function IRI
Mediation
Intercept Related on
Hit
Information JIRD
Content of
7 _
Communication (CC J+f CC � Medichon t '
_ # Function s
_ HI3 .
r
}nerno) Networle --
Infe'rfaces INI _ LI Handover
Interface HI
LEMF
Figure 1 - General Network Arrangements for Interception (L -TSI)
Figure I shows the logical flow of Intercept Related Information (IRI) and Contents of
Communications (CC) from its collection in the Public Network to the handover interface to the Law
Enforcement Monitoring Facility (LEMF) as defined by ETSI. In North America CALEA (Communications
i
Assistance for Law Enforcement Act) requires operators to provide LI capabilities. The network
architecture and handover specifications are based on the PacketCable'"' surveillance model shown in
Figure 2 below, the general architectural similarities can be seen.
Lav€fur
Authorization
PacketCable Te�ecominunication Service Provide
nterceItAccess Intercept Access
(for Ce1I Da a (for Cali Content} PSTN
GMS MG
Service { Intercept Access
Provider Deli�iery Funct on t`or GaII Con=_a-itl ,, Subscriber
Administration CIvITS CM; MTA
Figure 1- PacketCable— Surveillance Model
Figure 3 below shows the high-level functions and interfaces as defined by ETSI, the Mediation
Function (MF) provides standardized interfaces, H12— Intercept Related Information, and H13 — Call
Contents, from the Public Telecom Network to the LEA Network.
Hit Administration"
Function
(ADMF)
Z�Communicatio Comrttunicetiort,
Mode
INI2,INI3� '1NIN�I3
-_' � Mediation
Function Public Telecom Network
(MF)
----------------------- ------ -----------------------
H12, H13 LEA Network
Figure 3 - Distinction between PTN and Law Enforcement Network
Basic Elements of LI in a Public Telecom Network
There are three primary elements required within the public network to achieve Lawful
Interception, these are:
-.• An Internal Intercept Function (IiF) located in the network nodes.
A Mediation Function (MF) between the PTN and LEMF.
•3 An Administration Function (A®MF) to manage orders for interception in the PTN
Internal Intercept Function (IIF):
These functions are located within the network nodes and are responsible for generating the
Intercept Related Information (IRI) and Contents of Communications (CC).
Mediation Function (MF):
This function clearly delineates the PTN from the LEMF. It communicates with the Ill's using
Internal Network Interfaces (INIs) which can be proprietary. The MF communicates to one or more
LEMFs through locally standardized interfaces: the Handover Interfaces (1-I12and H13).
Administration Function (A®MF):
This function handles the serving of interception orders and communicates with the IIFs and MF
though an Internal Network Interface.
Implementing LI within an VolP Network
one of the primary problems that service providers face when managing VolP and multimedia
calls is the separation of the signaling and media streams. In other words it is quite possible that the two
streams may take completely different paths through the network. In addition, even when they do pass
through the same device, it may not be aware of the relationship between the streams. Some devices
within the network are however specifically designed to understand and manage the separate signaling
and media streams— session border controllers. Typically located at the borders of the service provider's
network, these offer an ideal location to implement the IIF as they receive Intercept Related Information
from the signaling stream and can intercept Contents of Communication directly from the media
stream.
Figure 4 below shows the physical elements of the LI system, their logical functions and the
interfaces to the LEMF. (all page)
Public Telecoms Network
„ „...:... .............. . Secure Connection
i
Tasking} Data
i
;ntercepticn Data i
Web Based GUI �
i
y AMM 58C
�•' {lIF)
i Backuo Administration Unit Ls Administration Function
(ADMF)
,. 50C
i
Backup Mediation Unit LI Mediation Function �
i
-------------------------------------------------------
H12 - Intercept Related Informatio
H13 - Contents of Communication
h .t
M
-0-
-
Law Enforcement Law Enforcement
Monitoring Facility Agency f LEA)
(LEMF)
Figure 4 —Example Physical Architecture
( 5 )
LI Administration Function (ADMF):
ADMF is typically implemented on a hardened Management Unit; it provides a secure method
to enable traffic to be targeted and routed. The ADMF uses a secure connection to one or more of the
IIFs and to one or more Mediation Units. The ADMF is often backed up by a warm standby, which
replicates all data between the units.
LI Mediation Function (MF):
MF performs the mediation and delivery functions, it is typically implemented on a hardened
Mediation Unit; it receives generic formatted IRI and CC data from one or more IIFs and translates it into
the country specific format for the Handover Interfaces (H12& H13) to the LEMF. The MF receives target
details from the ADMF and validates the received IRI and CC data to ensure that only the warranted data
is passed to the LEMF. The MF usually supports the forwarding of intercepted traffic to many LEMF
interfaces simultaneously. The Mediation Unit is often backed up by a slave unit which takes over in case
of failure of the primary unit.
Internal Intercept Function (IIF):
IIF is most effective when implemented in hardware within the network nodes in order to
provide the most effective and rapid detection without incurring additional software processing and
delays which may allow the presence of the intercept to be detected. The IIF collects Intercept Related
Information (IRI) and Contents of Communication (CC) ask requested by the ADMF, and converts these
to a generic format which is passed to the MF.
�•�r r - +� _� �-r
The ADMF must only be accessed by authorized users. It will manage the deployment of tasks to
the other LI elements.
Tasking Targets — Each target will require a Warrant ID and Case ID assigned by the LEA. Each case may
require IRI or CC or both to be intercepted. Each task is assigned a start date and an end date, upon
which the case will expire.
Auditing Tasks — The ADMF is typically responsible for auditing the network of IIFs to ensure that the
target lists match; differences should be automatically reconciled.
Mediation Function Configuration — Each interface to the LEMF must be individually specified to match
the required standard output.
Information Volatility
Essential target information must be encrypted by the ADMF and any information stored in the
IIF in encoded form, thereby preventing unauthorized access to sensitive warrant information. Any
information stored within the IIF should be stored in volatile memory, so that this information is erased
f6l
if a component of the network node is removed or powered down. Only the encrypted database of the
ADMF should be maintained during power -down situations.
In the event of a link failure between the MF and the LEMF the intercept products may be
buffered for a short time in memory only. Any long term failure of the interface will result in intercept
products being lost—this information must not be spooled to permanent storage.
Conclusion
Recently it has become increasingly clear that VoIP services will be expected to provide Lawful
Intercept and Emergency Call Handling services to the same level experienced in the PSTN. The FCC in
North America for example has mandated that both emergency calls and Lawful Intercept must be
available. Whilst not all countries mandate this capability, any network operator building a publicly
available voice or multimedia over IP service today will need to plan a network which is flexible enough
to implement these regulatory services in the future. Session border controllers are being deployed at
strategic points within VoIP networks to execute a number of access, security and quality management
roles; they offer an ideal location to implement a Lawful Intercept solution. Carrier class SBCs already
offer the levels of redundancy and resilience to provide `five 9s' availability, further endorsing their
suitability for the location of the IIF.
Terminology
ADMF Administration Function
CALEA Communications Assistance for Law Enforcement Act
CC Contents of Communication
ETSI European Telecommunications Standards Institute
HI Handover Interface
IIF Internal Intercept Function
INI Internal Networks Interface
IRI Intercept Related Information
LEA Law Enforcement Agency
LEMF Law Enforcement Monitoring Facility
LI Lawful Interception
MF Mediation Function
PSTN Public Switched Telephone Network
PTN Public Telecom Network
VoIP Voice over IP
References
ETSI TS 101 331 - Telecommunications security; Lawful Interception (LI) Requirements of Law Enforcement Agencies
ETSI TR 101 943 - Telecommunications security; Lawful Interception (LI); Concepts of Interception in a Generic Network
Architecture
ETSI TS 101 671 - "Telecommunications security; Lawful Interception (LI); Handover interface for the lawful interception of
telecommunications traffic
PKT-SP-ESPI.5-101-050128; PacketCable`1 1.5 Specifications; Electronic Surveillance
A summary of the ETSI LI specs is located at:http://portal.etsi.org/li/Summary,asp
Current ETSI specs can be downloaded from:http://portal.etsi.org/li/status,asp
Current PacketCablet'll specs can be found at:http:'/www.packeteable.com/specifications/
Pen -Link - Wikipedia
Page 1 of 1
W'IKIPEDIA
Pen -Link
Pen -Link, Ltd., (PenLink) is a software company that develops enterprise -grade communications surveillance data
Pen -Link, Ltd. (PenLink)
collection and analysis solutions for domestic law enforcement f9 Their products include PLX, Pen -Link 8, LINCOLN2,
PenProxy, and Xnet.
Headquarters Lincoln, Nebraska,
USA
One of the more publicized uses of PenLink's products was during the Lad Peterson murder case, where wiretaps taken
Products PLX, Pen -Link 8,
with Pen -Link 8 and LINCOLN2, were used as evidence against Scott Peterson.
LINCOLN2, PenProxy,
Xnet
See Also
Website http://www.penlink.com/
• Lawful interception
• Communications Assistance For Law Enforcement Act
References
?,i,,ii;r., Chu ,2",-7-C9-25,. "Pen -Link employees cash in on growing surveillance business" (http://www.kearneyhub,comisiteinews.cfm?
newsid=18855997&6RD=268&PAG=461&dept_.id=577571&r5=6). Omaha IKI I-Her3/d. Rat:iavaa 10 M r -h _RM,
External resources
• PenLink, Ltd. (Company Website) (http://www.penlink.com/)
Retrieved from"hitps:/len.wikipedia.crglw/index.php?title=Pen-Link&oldid=830940178"
This paga vas last edited on 17 March 2013. at 20:42 (UTC).
Lcarse. auditicnal tern a may anti-•, S, r.s rg pau qg.,a to ria ` rr.' 3f'-:sa aid ?,"va"L
Pel c;i a rb6iatar=_`;; �nada,rark cf the irc„ a nor+: pmflt or�anizac,on.
https://en.wikipedia.org/wiki/Pen-Link 12/3/2018
The Commission I CALEA®
The Commission on
Accreditation for Law
Enforcement Agencies, Inc.,
(CALEA®) was created in 1979
as a credentialing authority
through the joint efforts of law
enforcement's major executive
associations:
AU
CALEA
THE GOLD STANDARD N P[ PLIC SAYE:TY
• International Association of Chiefs of Police (IACP);
• National Organization of Black Law Enforcement
Executives (NOBLE);
• National Sheriffs' Association (NSA); and the
• Police Executive Research Forum (PERF).
The purpose of CA -LEA's Accreditation Proar s
(-programs) is to improve the delivery of public safety
services, primarily by: maintaining a body of standards,
developed by public safety practitioners, covering a wide
range of up-to-date public safety initiatives; establishing
and administering an accreditation process; and
recognizing professional excellence.
Specifically, CALEA's goals are to:
• Strengthen crime prevention and control
capabilities;
• Formalize essential management procedures;
• Establish fair and nondiscriminatory personnel
practices;
• Improve service delivery;
• Solidify interagency cooperation and coordination;
and
Page 1 of 3
http://www.calea.org/content/commission 12/3/2018
The Commission I CALEAR
Increase community and staff confidence in the
agency.
The CALEA Accreditation Process is a proven modern
management model; once implemented, it presents the
Chief Executive Officer (CEO), on a continuing basis, with a
blueprint that promotes the efficient use of resources and
improves service deliveiy—regardless of the size, geographic
location, or functional responsibilities of the agency.
This accreditation program provides public safety agencies
an opportunity to voluntarily demonstrate that they meet an
established set of professional standards which:
• Require an agency to develop a comprehensive, well
thought out, uniform set of written directives. This is
one of the most successful methods for reaching
administrative and operational goals, while also
providing direction to personnel.
• Provide the necessary reports and analyses a CEO
needs to make fact -based, informed management
decisions.
• Require a preparedness program be put in place—so
an agency is ready to address natural or man-made
critical incidents.
• Are a means for developing or improving upon an
agency's relationship with the community.
• Strengthen an agency's accountability, both within
the agency and the community, through a
continuum of standards that clearly define authority,
performance, and responsibilities.
• Can limit an agency's liability and risk exposure
because it demonstrates that internationally
recognized standards for law enforcement have been
met, as verified by a team of independent outside
GALEA -trained assessors.
• Facilitates an agency's pursuit of professional
excellence.
CALEA Structure
A Commission Board (/node/io/content/caiea-
commissioners) composed of 21 members governs CALEA.
Eleven must be law enforcement practitioners; the balance
is selected from the public and private sectors. Generally,
they reflect a representation from local, state/provincial and
international law enforcement and public safety
organizations, along with business, academia, the judiciary,
and state/provincial and local government. The
Commissioners are appointed by the four founding law
enforcement organizations, and serve without
compensation.
Page 2 of 3
http://vvww.calea.org/content/coimnission 12/3/2018
The Commission I GALEA®
CALEA operates as an independent, nonprofit (501[c]3)
corporation, and maintains a professional staff managed by
an Executive Director. The staff conducts all administrative
and operational duties as directed by the Commission.
CALEA publishes a monthly electronic newsletter, the
CALEA E-Coinniuuique (calea-neivs) , and maintains a
professional website. CALEA offers accreditation related
training at each of it's conferences, as well as presentations
on current issues in public safety.
Share / Save SW I -
Page 3 of 3
imormp- 1-4"
If aoff.
AssociationsYounding
� k
CALEA� @ 2010
13575 Heathcote boulevard, Suite 320 Gainesville, Virginia 20155
(703) 352-4225 FAX (703) 890-3126
http://www.calea.org/content/commission 12/3/2018
ADACS CAL EA -Compliant Surveillance Systems - SyTech Corporation Page 1 of 6
C�to CQ
UG,
�Ojff�FD
Products
ADACS CALEA-Compliant Surveillance Systems
ADACS Title III Systems
ADACS Pen Register Systems
ADACS Web Client
Evidence Modules
ADACS Data Sheets
Customer List
FAQ
Support Portal
RIOS Radio Interoperability Systems
RIOS LITE Smartphone LMR
SmartBug Covert Listening Device
R-TDIS Vehicle Intercom System
ADACS ALFA -Compliant Surveillance Systems
ADACS CALEA-compliant surveillance systems provide law enforcement
and intelligence agencies with the ability to collect, monitor, record and
analyze switch -based voice, video, and data transmissions. In use by
hundreds of agencies worldwide, ADACS delivers a full range of intercept,
archive, and analysis packages designed for the unique nature of
evidentiary voice, video, and data collection.
http://www. sytecheorp.com/products/adaes-calea-compliant-surveillance/ 12/3/2018
ADACS CALEA-Compliant Surveillance Systems - SyTech Corporation Page 2 of 6
ADACS4 Evidence Modules
• Title III Voice Collection
• Pen Data Collection
• Location Collection and Mapping
• SMS Collection
• IP Data Collection
• Video Interfacing
• Historical Importing
• Data Reporting and Analysis
The ADACS4 Intercept Platform functions as SyTech's next generation
voice, video, and data collector for all forms of switch -based
communication including CALEA .l -STD and VoLTE voice intercept. A
combination of hardware and software, ADACS4 allows the agency to
discretely intercept all forms of CALEA-compliant communications directly
from the target's service provider. Collection and audio playback occur in
real-time in conjunction with the agency's standards of lawful intercept.
Advanced T2S2 tools such as location mapping, automatic alerts and
secure wireless monitoring take the intercept out of the wire room and
into the digital age.
The ADACS4 CALEA-Compliant Platform
http://www.sytecheorp.com/products/adaes-calea-compliant-surveillance/ 12/3/2018
ADACS CALEA-Compliant Surveillance Systems - SyTech Corporation Page 3 of 6
Based upon the ADACS4 Platform, ADACS CALEA-Compliant Surveillance
Systems include a full range of standalone intercept systems designed to
meet the unique voice, video, and data requirements of law enforcement
and intelligence agencies.
",I applaud SyTech for the superior quality hardware, the user
friendly, all-inclusive software and their outstanding 24/7
customer and tech support..."
-Assistant Special Agent in Charge, Georgia Bureau of Investigation
ADACS Wire, Rooms and EnterDrise Servers
ADACS Wire Rooms and Enterprise Servers deliver the highest level of
CALEA-compliant surveillance for law enforcement and intelligence
agencies. ADACS Wire Rooms and Enterprise Servers support multiple
ADACS workstations monitoring multiple simultaneous calls connected
within a secure IP environment. ADACS provides intercept capabilities
across all medians of switch -based intercept with access to all ADACS4
Evidence Modules.
r IT
• Pen Data
• Location Mapping
http://www.sytecheorp.com/products/adacs-calea-compliant-surveillance/ 12/3/2018
ADACS GALEA -Compliant Surveillance Systems - SyTech Corporation Page 4 of 6
• Voice Intercept
• Internet Intercept
• Video Interfacing
• GPS Tracking
• Call Importer
ADACS Enterprise Servers range from multi -national T2S2 intercept
systems handling millions of call records to single -rack systems handling a
handful of intercepts. SyTech offers options for the number of
simultaneous calls supported, number of networked workstations, service -
provider connectivity solutions as well as additional products and services
designed to deliver unsurpassed evidence collection. SyTech Signal
Intercept Engineers work with your organization to tailor a system ideal
for your agency's unique intercept requirements.
"It is truly a pleasure to work with professionals of this caliber...
Our department has been associated with SyTech for
approximately five years... The quality of the equipment is
excellent, however your people are what make You special."
-Narcotics/Intelligence Unit, Warner Robins, GA.
ADACS Vlorkstation Servers and Pen Clicen -s
The ADACS Workstation Server allows law enforcement agencies to
receive real-time caller information from cellular phones, landlines, and
other types of switch -based communications. By implementing the Pen
Data Evidence Module, agencies can view who a target is calling, how long
they're talking and where they are located. Integrate the Location
Mapping Evidence Module to graphically view where the target is calling
from as well as the target's location over a range of dates.
http://www.sytecheorp.com/products/adaes-calea-compliant-surveillance/ 12/3/2018
ADACS GALEA -Compliant Surveillance Systems - SyTech Corporation Page 5 of 6
• Pen Data
• Location Mapping
• Internet Intercept
• Video Interfacing
• GPS Tracking
• Call Importer
SyTech Signal Intercept Engineers work with your organization to
determine the optimal ADACS Workstation Server that's right for your
agency. SyTech offers affordable pen -data packages such as our "pay -per -
pen" and "unlimited -pen" options with secure, encrypted access to all
service providers. Additional standalone ADACS4 Evidence Modules for
Video Interfacing, Call Record Importing and GPS Tracking are also
available.
"'The mapping program was instrumental, displaying in real time,
utilizing the tomer Faits, the target's cell phone location... The
detectives and analysts are impressed with the features... in a
user friendly format."
-Vice and Narcotics Unit, Hernando County S0, FL.
To receive an ADACS CALEA-compliant surveillance system quote,
contact ADACS Sales at 703-941-7857 or by clicking Dere.
http://www.sytechcorp.com/products/adacs-calea-compliant-surveillance/ 12/3/2018
PLX I PenLink
Page 1 of 6
suimortOoenlink.com
PENLIN
COLLECTION AND sis
A COMPREHENSIVE COLLECTION AND
ANALYSIS SOLUTION
The massive quantities of data
garnered in from your
investigations can be
overwhelming. That is why we
created PLX—the combined
https://www.penlink.com/plx/ 12/3/2018
PLX I PenLink Page 2 of 6
investigative power of all our
collection and analysis tools into
one all-inclusive platform.
v
THREE SOLUTIONS, ONE DASHBOARD
All of the concerted capabilities of Pen -
Link 8, LINCOLN 2, and Xnet in one easy-
to-use interface.
a
.. _ r Ani r rll r_ i_1 I'l I._n A n 1 A Il-_
https://www.penlinlc.com/plx/ 12/3/2018
PLX I PenLink
Load large quantities of communication
data from an array of file types and
conveniently store them
in a single database.
INVESTIGATE BEYOND PHONE CALLS
Collect, analyze, and export massive
amounts of social media and internet
communication data.
LIVE COLLECTION AND
MONITORING
Collect pen register and
wiretap intercepts in real -
EXTENSIVE REPORTING
CAPABILITIES
Query, sort, and display
standard and custom
Page 3 of 6
https://www.penlink.com/plx/ 12/3/2018
PLX I PenLink
time for tracking, live
monitoring, and analysis.
and call associations using
an array of charting tools
reports from one or more
data sets.
coordinates in real-time or
using historical data.
Page 4 of 6
PRODUCTSUPPORT
Our highly -trained staff is available to answer your questions.
suoport@penlink.com
https://www.penlink.com/plx/ 12/3/2018
PENLONK
Raul Perez
Miami Police Department
Miami, FL
October 3, 2018.
Dear Raul Perez:
Pen -Link, Ltd. is the sole source provider of all Pen -Link Software Products, services (installation and
training), maintenance, and hardware configurations including PLX, Pen -Link Version 8.2 Product
Suite, Xnet, and LINCOLN Administrative Software. We utilize no agents, dealers, or distributors.
Pen -Link's products are proprietary and can only be purchased directly from Pen -Link, Ltd., which is
located in Lincoln, Nebraska, Pen -Link's Federal Tax I.D. # is 47-0707585.
Sincerely,
SHELLEY SORENSEN I Territory Sales Manager
402.421.8857 office 1402.202.9546 cell
shelley@penlink.com
5944 VanDervoort Drive. Lincoln, NE. 68516.402.421.8857
wwwrpeaJink.com
MARKET RESEARCH
Contract No.: Sole Source 18-19-017
Title: Pen -Link Software and Equipment
Procurement Contracting Officer:
Victoria Giraldo
Background:
Current Term: N/A
Expiration Date: N/A
Recommendation:
® Sole Source Contract
❑ Solicit Competition
❑ Access Contract
❑ Other
The City of Miami's Police Department ("Police") has been tasked to search for a viable resource to
continue to gather vital information from Global Positioning System ("GPS") towers. Police would like to
obtain the Pen -Link software and equipment ("Software") from Pen -Link, Ltd ("Pen -Link"), a software
solution that is utilized to trap and trace subscriber information from cellular providers which includes GPS
tower location information. The Software's server is also used for wiretaps for voice, text and social media
information for Title III warrants. Police analysts use this "real time" information, gathered by the Software,
to solidify evidence on criminal suspects and to assist in the prosecution of State and Federal
investigations such as missing persons, abductions/kidnappings, homicides, robberies where time is of the
essence. Currently, the City obtains said information from Miami -Dade County ("MDC"). However, in recent
months MDC Police have expressed that this courtesy service will be discontinued due to the current
overtime budget restraints enforced at MDC and have recently limited the access to the Software. Police's
ability to track cellular phones is now limited and is restricting the expeditious manner in which Police
tracks violent felony offenders and solves cases against residents of the City.
The initial purchase is estimated at approximately $70,573.41, inclusive of hardware, installation, software
one (1) year subscription and licensing. Future renewals of Software subscription and licensing and
maintenance will be covered under City Procurement Code 18-72 (b) (15), Maintenance and licensing
agreements to support continued, on-going use of proprietary software application.
Research Conducted:
An internet search was conducted for software application solutions to help Police find the best source for
gathering vital information from local GPS towers, The Department of Procurement ("Procurement") has
found that Pen -Link is the sole source provider for the Software, which is compatible with the Miami -Dade
Police Department, Florida Department of Law Enforcement, various federal law enforcement agencies as
well as many other South Florida municipalities who also use this Software. The Software is the only
system in the industry that is capable of intercepting, processing and analyzing both Telco and IP Data all
in one comprehensive platform with "Real Time" information. It also supports all United States
Communications Assistance for Law Enforcement Act ("CALEA") delivery standards, European electronic
surveillance delivery standards, as well as, South and Central American delivery standards. These
components are proprietary to Pen -Link.
Comparable Contracts:
No competitive solicited contracts were found for the purchase of the Software; however the following
municipalities utilize the Software and have obtained it as a Sole Source:
New York City, New York Contract # 20161422129 initial $80,000
State of Ohio, Columbus, Ohio Contact # AGO0100397 initial $91,961.25
Miami -Dade County, FL Contact # L9152-2/17-1 initial $212,000 for 3 years
The above entities procured the services via their municipality's sole source process. The pricing listed
above vary due to the quantities purchased and the equipment needed to support each license. Yearly
license fees can range from $5,000 to $10,000 per year. The City of Miami will be paying $6,250 per
license per year which falls in the lower end of the range.
Recommendation:
It is recommended that the City purchase the Software from Pen -Link as a Sole Source, to enable Police to
continue to be efficient in their investigations and continue their investigations with the same compatible
software, so that there is no lapse in service, before Miami -Dade County Police decides to end access to
their system altogether.
Procurement Contracting Officer:l� y y Date:
Procurement Contracting Manager:-� Date: 7 N)
Director/Asst. Director: e '~ Date:, c
Detail by Entity Name
Porda DecaCment of State
-? T1 -ar tir
u
Departmer_t_of_State / Division of Corporations / Search Records / Detail By Document Number /
Detail by Entity Larne
Foreign Profit Corporation
PEN -LINK, LTD. CORP.
Filina Information
Document Number F19000002577
FEI/EIN Number 47-0707585
Date Filed 05/31/2019
State NE
Status ACTIVE
Principal Address
5944 VANDERVOORT DRIVE
LINCOLN, NE 68516
Mailinq Address
5944 VANDERVOORT DRIVE
LINCOLN, NE 68516
Reaistered Aqent Name & Address
INCORP SERVICES, INC.
17888 67TH COURT NORTH
LOXAHATCHEE, FL 33470
Officer/Director Detail
Name & Address
Title CHAIRMANrPRES
POPE, PHILIP K
5944 VANDERVOORT DRIVE
LINCOLN, NE 68516
Title DIR./VP/TREA.
OLSON, BRIAN
5944 VANDERVOORT DRIVE
LINCOLN, NE 68516
Title DIR
KUHN, REGINALD
5944 VANDERVOORT DRIVE
LINCOLN, NE 68516
Page 1 of 2
D'Y 310N OF CORPCRATIONS
http://search.sunbiz.org/Inquiry/CorporationSearch/SearchResultDetail?inquirytype=Entity... 6/4/2019