Loading...
HomeMy WebLinkAboutBack-Up DocumentsCITY OF MIAMI, FLORIDA To: Anne Perez DATE: June 19, 2019 RLE' Director SUBJECT: Procurement Department Finding of Sole Source FROM: Jorge R. Colina REFERENCES Pen -Link Lincoln System Chief of Police ENCLOSURES: with Software Support The police department is requesting a sole source finding for the purchase of a new Pen -Link Lincoln System with software support from Pen -Link, Ltd., to continue to conduct telecommunications investigations in a more proficient manner, in the amount of $69,203.72, allocating funds from Police General Fund Account No. 00001.191001.664000.0000.00000. Based upon the attached, please take the necessary steps to verify that Pen -Link, Ltd., located at 5944 VanDervoort Dr., Lincoln, NE 68516, is the sole provider for the provision of the Pen -Link Lincoln System with software support. The Pen -Link Lincoln System is utilized for trap and trace and subscriber information from cellular providers which includes GPS tower location information. This information is critical in investigations such as missing persons, abductions/kidnappings, homicides and robberies where time is of the essence. This server is also used for wiretaps for voice/texts and investigations that required social media information for Title III warrants. Without the Pen -Link Lincoln System, we cannot obtain cellular site information and are not able to track cellular phones, which is necessary to locate violent felony offenders. Pen -Link, Ltd. is considered to be the sole provider of the Pen -Link Lincoln System and software support. In order for the City of Miami Police Department to be self-sufficient in carrying out their investigations in a proficient manner without interruption, it is in the best interest of the City to purchase this system. Your attention to this matter is greatly appreciated. FINDING OF SOLE SOURCE APPROVED: Anne rez, Procurement Director JRC/DMJ/JB/jms Attachments LEG 7-2 IN FROM CITY OF MIAMI, FLORIDA INTER -OFFICE MEMORANDUM Emilio T. Gonzalez, Ph. D., City Manager DATE: August 20, 2019 SUBJECT Annie Perez, CPPO, Director of Procurement REFERENCES: ENCLOSURES: RECOMMENDATION: FILE: Recommendation for Approval to Award Sole Source Contract with Pen -Link, LTD. Corp SS No. 18-19- 017 Based on the findings below, the Procurement Department (Procurement) hereby recommends award to Pen -Link, LTD. Corp. ("Pen -Link") the sole source provider of Pen -Link software, hardware, and maintenance. Contract Number/Title: 18-19-017, Pen -Link Software, Hardware and Maintenance. Contract Amount: Initial amount of approximately $70,600 and an estimated annual expenditure of $15,000. Recommended Vendor: Pen -Link BACKGROUND: The Police Department ("Police") have been tasked with establishing a viable source to gather vital information from Global Positioning Systems ("GPS") towers. Police along with other municipalities have been utilizing the Miami -Dade County Police Department's ("MDPD") access to Pen -Link for numerous years. However, in recent months the shared access has been restricted and Police has been advised it will be discontinued due to overtime budgeting restriction at MDPD. After conducting market research, the Department of Procurement ("Procurement") found that Pen -Link was a viable resource to gather vital information from GPS towers and is the sole source provider for a software which is compatible with the MDPD, Florida Department of Law Enforcement, various federal law enforcement agencies as well as many other South Florida municipalities who also use this software. The Pen -Link software is the only system in the industry that is capable of intercepting, processing and analyzing both Telco and IP Data all in one comprehensive platform with "Real Time" information. Pen -Link also supports all United States Communications Assistance for Law Enforcement Act ("GALEA") delivery standards, European electronic surveillance delivery standards, as well as, South and Central American delivery standards. Procuring the Software will help Police solidify evidence on criminal suspects and assist in the prosecution of State and Federal investigations such as missing persons, abductions/kidnappings, homicides, robberies, and otherrelated crimes. PR19164 Page 1 of 2 Approved: Erni nager cc: Joseph F. Napoli, Deputy City Manager Jorge R. Colina, Chief, Police Department Yadissa A.Calderon, CPPB, Assistant Director, Procurement PR19164 Page 2 of 2 Date: I.3 / 19 1.00 BUFFALO MEDIA STATION EXTERNAL BLU RAY WRITER Quote Number 00001638 Created Date 3/19/2019 Miami Police Department - Miami - Special Investigations (FL) 400 NW 2nd Avenue, 1st Floor Miami, Florida 33128 United States Expiration Date 9/30/2019 Payment Terms Net 30 1.00 CISCO VPN ROUTER 5506 PACKAGE, 25 TUNNELS Includes 3 -Year Warranty I 4 -Hours of Configuration Services COLLECTION SERVICE SERVER Dell T630 or R740 (Depending on Customer Requirements) I Dual Multi Core Proc. ( 32GB RAM 1 (4) 1.00 600GB 10k RPM 2.5 inch Hard Drives, Redundant Power Supply I Perc RAID Controller I Redundant Power Supplies I Dual Embedded Gigabit Ethernet NIC I Rack Chassis wl Rapid Rails I ORAC Enterprise 3 -year Next Business Day Support I Windows Server Standard, Symantec AV and Netop Included Quote $1,750.95 $1,750.95 $61.2.5, $61.25 $192.53 $192.53 $2,289.66' $2,289.66 $11,089.39 $11,089.39 2.00 Dual Monitor Monitoring Workstation $2,290.20 $4,580.40 Includes NetOp, Headphones, 23" Dual Monitors, Wks UPS, AV PLX WORKGROUP SERVER II Dell T630 or R740 (Depending on Customer Requirements) I Dual Multi Core Proc. 64GB RAM (4) 1.00 960GB SSD Read Intensive 2.5 Inch Hard Drives, Redundant Power Supply I Pere RAID Controller 1 $17,594.14 $17,594.14 Redundant Power Supplies I Dual Embedded Gigabit Ethernet NIC I Rack Chassis w/ Rapid Rails I iDRAC Enterprise I 3 -year Next Business Day Support I Windows Server Standard, Symantec AV and Netop Included (Need to add Windows Server Device CALS CALS Based on # of workstations) 1.00 RACK MOUNT NAS $4,943.83 $4,943.83 Dell NX Series 44 TB 1.00 TRIPPLITE 17" 8 -PORT CONSOLE KVM 81,360.34 $1,360.34 2.00 TRIPPLITE USB KVM CABLE $31.50 $63.00 WINDOWS SERVER DEVICE CAL 2.00 Windows Server Device CAL (Based on # of Workstations connecting to server) $24.96 $49.92 Pen -Link, Ltd is a U.S. - Based Small Business DUNS: 195956636 / TIN: 47-0707585 / CAGE: OK6H9 This document contains confidential and proprietary information and is the copyrighted property of Pen -Link, Ltd. Distribution of this document within the receiving agency or company is permitted, but only to such personnel as may be required to meet the goals of the project for which this document was provided. Recipients of this document may not reproduce it, in part or in whole, in any form, or convey its contents to external agencies by any means, without the express written consent of Pen -Link, Ltd. This document may not be distributed, in part or in ,n,hnlc in anv fnrm to anv nnmmornial nnn_nrnicrnmen+ on+i+v PENLiNK o.e4 1.00 LINCOLN Install $10,000.00 $10,000.00 3 -Days, Single Engineer PLX SOFTWARE LICENSE - INTERCEPT EDITION (IP) to be combined with PROFESSIONAL or 2.00 INTERCEPT EDITION (TELEPHONE) $6,250.00 $12,500.00 Intercept internet protocol data to include pens, log -in session data, social media, email, and other IP sources. 1.00 PenPoint Setup $2,500.00 $2,500.00 2.00 PENPOINT 1 -PACK $799.00 $1,598.00 PLX's mobile app maps target location data on iOS and Andriod devices: 1 -year Subscription Subtotal $70,573.41 Discount $0.00 Tax $0.00 Total Price $70,573.41 Pen -Link, Ltd, Maintenance and Support Terms and Conditions 1. Terminology The following terms and definitions apply throughout this document. 1.1. Pen -Link Software. Pen -Link Software is software developed and manufactured by Pen -Link, Ltd. 1.2, Pen -Link Customer (also "Customer"). A Pen -Link Customer, or Customer, is any agency or other entity that has one or more current, valid Licenses for Pen -Link Software purchased from or through Pen -Link, Ltd. Pen -Link, Ltd, Maintenance and Support Terms and Conditions 1.3. Basic Technical Support Package. Entitles our customers to normal business hours telephone support at Pen -Link, Ltd.s published number and/or assistance via e-mail. 1.4. Standard Maintenance and Support. Standard Maintenance is a Maintenance option that includes Software Updates, Software Upgrades, and Basic Technical Support as defined herein. 1.5. Premium Maintenance and Support. Premium Maintenance is a Maintenance option that includes Software Updates, Software Upgrades, and Premium Technical Support as defined herein. 1.6. Software Update. A Software Update is an enhancement including additions, changes, and bug fixes to Pen -Link Software that is already in the applicable commercial market. Software Updates occur within the same major version number of an existing software Pen -Link, Ltd is a U.S. - Based Small Business DUNS: 195956635 /TIN: 47-07075851 CADGE: OK6H9 This document contains confidential and proprietary information and is the copyrighted property of Pen -Link, Ltd. Distribution of this document within the receiving agency or company is permitted, but only to such personnel as may be required to meet the goals of the project for which this document was provided. Recipients of this document may not reproduce it, in part or in whole, in any form, or convey its contents to external agencies by any means, without the express written consent of Pen -Link, Ltd. This document may not be distributed, in part or in �nrhnlo in anv fnrm to anv nnmmarnial nnn_nrniarnmont ontity Quote product. For example, replacing Pen -Link v8.1.29.0 with Pen -Link v8.1.30.0 would constitute a Software Update. Such an update is often referred to as a New Build of the Pen -Link Software. 1.7. Software Upgrade. A Software Upgrade is the replacement of an older major version of an existing Pen -Link Software product or products, with a newer major version of a Pen -Link Software product or products, to the extent required to maintain the same operational functionality that was supported by the Pen -Link Software prior to the upgrade. For example, upgrading from Pen -Link Version 7 to Pen -Link Version 8 (where 8 is the newer major version) would constitute a Software Upgrade, so long as the installation of the newer version of the PenLink Software supported at least the same operational functionality that the Customer had under Pen -Link version 7. Upgrades do not apply to new software products that Pen -Link, Ltd. may release to the commercial market from time to time in the future. 1.8. Basic Technical Support (also Basic Support Basic Technical Support is a Support option that includes telephone -based Technical processes such that Pen -Link, Ltd. may deem fit to offer. Basic Technical Support may be obtained by contacting Pen -Link, Ltd. via its published, main telephone number (currently 402-421-8857), its general support email account (support@penl ink. com), or its World Wide Web site (www.peniink.com). Basic Technical Support is available Monday through Friday, from 8:00 AM to 5:00 PM Central time, except for holidays. 1.9. Premium Technical Support (also Premium Support Premium Technical Support is a Support option that includes all of the support services offered with Basic Technical Support (Section 1.8), plus Emergency After -Hours support for live communication interception and collection operations. Emergency After-HCUfS support services may be accessed through methods, including telephone access, that are provided to the customer at the time of purchase. Emergency After -Hours support services are available Monday through Friday, from 5:01 PM - 7:59 AM Central time and all day Saturday & Sunday, including holidays. 1.10. Maintenance and Support Agreement ("Agreement'). This Maintenance and Support Agreement is the Agreement between Pen -Link, Ltd. and the Customer regarding the terms and conditions under which the Maintenance and Support Services described in this document are purchased and provided. 2. Software 2.1. Maintenance is an optional service offered by Pen -Link Ltd. to augment a purchase of Pen -Link Software. Maintenance may be purchased by a Pen -Link Customer along with, or subsequent to, the purchase of Pen -Link Software. 2.2. Maintenance is offered only pursuant to a Maintenance and Support Agreement between the Customer and Pen -Link, Ltd. 2.3. Pen -Link, Ltd. offers two levels of Maintenance that a Customer may purchase: Standard Maintenance and Premium Maintenance, as defined in Sections 1.4 and 1.5 respectively. 2.4. Maintenance applies only to software developed and manufactured by Pen -Link, Ltd. Maintenance does not apply to software developed and the Customer, to which Pen -Link, Ltd. is a signatory party, Maintenance does not include updates, upgrades, or bug fixes to, or new releases of, any third -party software or hardware purchased through Pen -Link, Ltd. or with the assistance of Pen -Link, Ltd. Support for third party software and hardware products bundled with Pen -Link, Ltd. licensed Pen -Link Software is available only according to the third -party manufacturer 2.5. All Maintenance deliveries are subject to the terms and conditions of the applicable End User License Agreement EULA for the Licensed Software. 3. Technical Support ("Support") 3.1. Technical Support Support is an optional service offered by Pen -Link, Ltd, to support a Customer in the authorized use of licensed PenLink Software. 3.2. Support is offered only pursuant to a Maintenance and Support Agreement between the Customer and Pen -Link, Ltd. 3.3. Pen -Link, Ltd. offers two levels of Technical Support: Basic Technical Support and Premium Technical Support, as defined in Sections 1.8 and 1.9 respectively. 3.4. Pen -Link, Ltd. will make every reasonable attempt to answer a Customers Support questions and address a Customer s Support concerns. However, Support is offered on a good faith, diligent effort basis only, and Pen -Link, Ltd. may not be able to resolve every request for Support. 3.5. Technical Support is provided for ongoing, operational use of the licensed Pen -Link Software; Support is not intended to be a substitute for training or professional services necessary for the implementation or system redesign of the licensed Pen -Link Software, which are outside the scope of this agreement. All such services, including without limitation, training, on-site assistance, consultation, custom programming and other software customizations, network design, and database and network administration, may be provided pursuant to separate agreements with and by Pen -Link, Ltd. 3.6. Unless otherwise specified in a separate, written agreement between Pen -Link, Ltd. and the Customer, to which Pen -Link, Ltd, is a signatory party, Support is available only for the current and immediately preceding version of the licensed Pen -Link Software. Pen -Link, Ltd is a U.S. - Based Small Business DUNS: 195956636 / TIN: 47.07075851 CAGE: OK6H9 This document contains confidential and proprietary information and is the copyrighted property of Pen -Link, Ltd. Distribution of this document within the receiving agency or company is permitted, but only to such personnel as may be required to meet the goals of the project for which this document was provided. Recipients of this document may not reproduce it, in part or in whole, in any form, or convey its contents to external agencies by any means, without the express written consent of Pen -Link, Ltd. This document may not be distributed, in part or in ­hnlo in env fnrm to —, rnmmorrial nnn_nnvornmont ontihi Quote Support for a previous version of Pen -Link Software is provided up to a maximum of eighteen (18) months after the release of the current version of software, provided that the Customer and Pen -Link, Ltd. are paries to a current Maintenance and Support Agreement. 3.7. Unless otherwise specified in a separate, written agreement between Pen -Link, Ltd. and the Customer, to which Pen -Link, Ltd. is a signatory party, Support does not include any of the following: 3.7.1. Support for database products or so-called DBMS or Database Management Systems, including without limitations, setup and alteration and/or configuration of such products, and resolution of errors related directly to such products. 3.7.2. Resolving network, workstation, or other environmental errors not directly related to the licensed Pen -Link Software. 3.7.3. Support for any licensed Pen -Link Software working on or with any version of any database, Database Management System, operating system, or other hardware or software product or system that Is not specifically identified as interoperable and compatible with the specific version of the license Pen -Link Software being used. 3.7.4. Support for any alpha, beta, or other preproduction release of any software, including Pen -Link Software. 3.7.5. Support for any changes to Pen -Link Software made outside of the product s scope by a customer or by any third party. 3.7.6. Support for any licensed Pen -Link Software that is used for a purpose, or in a manner, for which it was not designed. 4. Terms and Conditions 4.1. Maintenance and Support Agreements are options made available by Pen -Link, Ltd. for a Customer to purchase. 4,2. Maintenance and Support Agreements are offered on an annual basis. 4.3. Unless otherwise specified in a separate, written agreement between Pen -Link, Ltd, and the Customer, to which Pen -Link, Ltd. is a signatory party, Maintenance and Support Agreements will renew automatically at the end of each annual term, provided that the Customer pays the applicable renewal fees. 4.4. Unless otherwise specified in a separate, written agreement between Pen -Link, Ltd. and the Customer, to which Pen -Link, Ltd. is a signatory party, a Customer s Maintenance and Support Agreement is to be paid at the start of each annual term. 4.6. Pen -Link, Ltd.s obligations hereunder are subject to the Customer s timely payment for Maintenance and Support. Failure of the Customer to pay fees in a timely manner for any term of Maintenance and Support may, at the sole discretion of Pen -Link, Ltd., result in the termination or suspension of Maintenance and Support services. 4.7. Lapses and Reinstatement. If a Customer s Maintenance and Support agreement terminates as a result of expiration or otherwise pursuant to this Agreement, and the Customer decides to reinstate the Agreement, the Customer will be required to pay the applicable Maintenance and Support, fees for the lapsed period (the time elapsed between the Agreement expiring and subsequently being reinstated), plus a reinstatement fee equal to 10% of the fees for the lapsed period. 4.8. Taxes, The Customer is responsible for payment of all applicable taxes, value added taxes, or other taxes (however designated) related to the Maintenance and Support of the Licensed Software, unless otherwise agreed upon and stated in writing. 4.5. Payment. agrees to make payment to Pen -Link, Ltd, no later than thirty (30) days from the date of the invoice, unless otherwise agreed upon in writing. Unless otherwise instructed, the Customer will make payment directly to Pen -Link, Ltd. 4.9. This Agreement will automatically terminate for each Licensed Pen -Link Software product upon termination of the EULA corresponding to such Pen -Link Software product. 4.10. The Customer may terminate this Agreement for Convenience, but the Customer will not be entitled to a refund of any paid fees in such an event. 4.11. Additional Orders. Orders by the Customer for additional Pen -Link Software products or additional licenses of Pen -Link Software products will increase the Customers Maintenance and Support fees under this Agreement. 4.12. We reserve the right to impose a convenience fee of 2.0% for credit card processing on amounts over $10,000. 5. Warranty and Liability Disclaimer 5.1. Pen -Link, Ltd. warrants that the Maintenance and Support services provided to the Customer under this Agreement shall be performed with due care, and in a professional and workmanlike manner. Pen -Link, Ltd. does not otherwise warrant the accuracy or completeness of any services provided pursuant this Agreement. PEN -LINK, LTD. DISCLAIMS ANY AND ALL OTHER WARRANTIES, EXPRESS, IMPLIED OR OTHERWISE, IN CONNECTION WITH THE SUBJECT OF THIS AGREEMENT. IN NO EVENT, UNDER ANY THEORY OF LAW, SHALL EITHER PARTY AND/OR ITS AFFILIATES BE LIABLE TO THE OTHER FOR ANY INDIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES OR LOST PROFITS AND/OR ITS AFFILIATES ARE ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. PEN -LINK, LTD. S LIABILITY UNDER THIS AGREEMENT SHALL NOT EXCEED THE PREPAID AND UNUSED PORTION OF THE CUSTOMER S MAINTENANCE AND SUPPORT FEES PAID TO PEN -LINK, LTD. PEN -LINK, LTD. SPECIFICALLY DISCLAIMS ALL RESPONSIBILITY FOR ANY SERVICES PROVIDED BY ANY PARTNER OR ANY OTHER THIRD PARTY. 5.2. It is the sole responsibility of the Customer to make and maintain adequate backup copies of software and data. 5.3. In no event will Pen -Link, Ltd. be responsible for lost data. Pen -Link, Ltd is a U.S. - Based Small Business DUNS: 195956636 / TIN: 47-0707585 / CAGE: OK6H9 This document contains confidential and proprietary information and is the copyrighted property of Pen -Link, Ltd. Distribution of this document within the receiving agency or company is permitted, but only to such personnel as may be required to meet the goals of the project for which this document was provided. Recipients of this document may not reproduce it, in par or in whole, in any form, or convey its contents to external agencies by any means, without the express written consent of Pen -Link, Ltd. This document may not be distributed, in part or in uhnlo in onv form +n env nnmmnrniol nnn_nnvomman+ anti+" ,.xp'.. _ 6. Miscellaneous Quote 6.1. Entire Agreement. This Agreement constitutes the entire Agreement between the Customer and Pen -Link, Ltd. related to the subject matter hereof, and additions or modifications shall be binding upon the parties only if the same shall be in writing and duly executed by the Customer and a duly authorized officer of Per -Link, Ltd. The Licensed Pen -Link Software is licensed under a separate End User License Agreement (EULA) and professional services, if any, are provided under a separate professional services agreement. The terms and conditions of any Customer purchase order are only binding on Pen -Link, Ltd. if they are agreed to in writing by an authorized Pen -Link, Ltd. officer and in a document other than the purchase order. 6.2. Waiver. The waiver or failure of either party to exercise in any respect any right shall not be deemed a waiver of any further or future right. 6.3. Assignment. The Customer may assign this Agreement only in connection with a proper and valid assignment of the corresponding EULA to the extent permitted there under; provided that the Customer gives written notice of such assignment to Pon -Link, Ltd. Pen -Link, Ltd. may freely assign this Agreement to a purchaser of that portion of Pen -Link Ltd. s business to which this Agreement relates, to the surviving corporation in the event of a merger, and to any affiliate or third -party whore Pen -Link authorizes to provide Maintenance and Support for the Licensed Pen -Link Software of the nature contemplated hereby. Pen -Link, Ltd is a U.S. - Based Small Business DUNS: 195956636/ TIN: 47-0707585 J CAGE: it This document contains confidential and proprietary information and is the copyrighted property of Pen -Link, Ltd. Distribution of this document within the receiving agency or company is permitted, but only to such personnel as may be required to meet the goals of the project for which this document was provided. Recipients of this document may not reproduce it, in part or in whole, in any form, or convey its contents to external agencies by any means, without the express written consent of Pen -Link, Ltd. This document may not be distributed, in part or in ­hm to in —, fnrm to arni nnmmornial nnn_nnvornmont o fity JUSTIFICATION FOR E'EN -LINK LINCOLN SYSTEM WITH SOFTWARE 1. Q: Explain why the product/service requested is the only product/service that can satisfy your requirements, and explain why the alternatives are unacceptable. Be specific with regard to specifications, features, characteristics, requirements, capabilities and compatibility. Describe what steps have been undertaken to make this determination. A: This highly sophisticated product would be utilized to trap and/or trace violent felony offenders. The Pen Link system will allow the City of Miami to be self sufficient in these endeavors. In cases of major catastrophes and major cases as in Officer involved incidents or major violent cases the City of Miami would request the assistance of our Partner Police Departments. In order to be compatible with our Partner Police Departments; Miami Dade Police Department, FDLE and the United States Secret Service, just to name a few we would need the Pen Link system. All the local municipalities and Federal Agencies within the South Florida utilize the Pen Link system; therefore to give us full compatibility we would need to utilize the same Pen Link system. See attached Pen Link System Quote and sole source package for all specifications and characteristics of this system. 2. Q: Explain why this service provider, supplier or manufacturer is the only practicable available source from which to obtain this product or service, and describe the effort that was made to verify and confirm whether, or not this is so. A: The Pen Link system would give us fall capabilities with other Law Enforcement Agencies in the surrounding areas. 3. Q: Will this product obligate us to a particular vendor for future purchases (either in terms of maintenance that only this vendor will be able to perform and/or if we purchased this item, will we need more "like" items in the future to match this one. A: The Pen Link system provides one (1) year full warranty and two (2) years additional warranty for an added cost.(listed in the purchase quote). Since Pen Link is sole source provider of all Pen Link software systems, we would have to contact them for any maintenance to the system. If the City of Miami seeks future expansion of the wiretap system, other items are provided at an additional cost'from Pen Link. P I\� 4. Q: Explain why the price for this product or service is considered to be fair and reasonable. A: Pen Link has standard prices .for Federal, State and Local law enforcement agencies. 5. Q: Describe the negotiation efforts, if any, that have been made with the supplier to obtain the best possible prices. A: We worked with. the Pen Link sales representative to provide the,best possible price on the products and services that the City of Miami needs in ord6r to provide services to the citizens of Miami. 6. Q: Explain the consequences to the City, including the dollar estimate of the financial impact, if this sole source is not approved. A: We are currently using the Miami -Dade Police Department's Pen Link system for all cellular phone pen requests. This access is necessary to gather intelligence to successfully track cellular phones. We have established a great working relationship with the Miami -Dade Police Department's Technical Assistance Unit. While they have no obligation to do so, they, have fully assisted us. Due to overtime budget restraints, they have canceled access to their system by all agencies, except the City of Miami. Our access to the Miami -Dade Police Department's Pen Link system is temporary, as they will have to eventually cancel our access. When this occurs, it will end our ability to track cellular, phones. This will have a. great impact and consequences to the City of Miami. We will be unable to track violent felony offenders and assist in solving cases against citizens of the City of Miami. There is no other way to track these violent offenders without an active Pen System. 11 Please provide the following information in order to document the sole source request: 1. Explain why the product/service requested is the only product/service that can satisfy your requirements, and explain why alternatives are unacceptable. Be specific with regard to specifications, features, characteristics, requirements, capabilities, and compatibility. Describe what steps have been undertaken to make this determination. Pen Lin k's PLX system is the only system in the industry capable of intercepting, processing and analyzing both Telco and IP data. PLX is the combined investigative power of communications collection and analysis tools in one comprehensive platform, Normalize multiple data sets, find commonalities, de -conflict targets and cases. There are no other systems in the market that combine these capabilities. Live interception is supported by a wide variety of network -based mediation, delivery, and handover standards and protocols. PLX supports all U.S. Communications Assistance for Law Enforcement Act (CALEA) delivery standards, all European electronic surveillance delivery standards, all delivery standards used in South and Central America, and a variety of other, proprietary electronic surveillance delivery methods deployed in the United States and abroad. 2. Explain why this services provider, supplier or manufacturer is the only practicably available source from which to obtain this product or service, and describe the efforts that were made to verify and confirm whether, or not, this is so. (Obtain and include a letter from the manufacturer confirming claims made by distributors or exclusive distributorships regarding the product or service, if that is cited as a reason for this Sole Source.) PLX is the only software that can ingest and normalize native file formats or delivery standards, regardless of the telco or IP data type. Cellphone forensic extracts, Call detail records, Email, social media files, Cell tower dumps, Live telephonic delivery standards, Live or historic packet data. Pen Link is also the only provider in the industry that has been building systems for over 30 years. 3. Will this product obligate us to a particular vendor for future purchases (either in terms of maintenance that only this vendor will be able to perform and/or if we purchase this item, will we need more "like" items in the future to match this one)? Yes, there is an annual maintenance fee that we will continue to pay. Maintenance covers all updates, upgrades and 24/7 support 4. Explain why the price for this product or service is considered to be fair and reasonable. Software licensing is capable of processing both Telco and IP data, something no other vendor supplies. Pen Link's software is in-line with other vendors who don't provide the equal to or better than the same service. 5. Describe the negotiation efforts, if any, that have been made with the supplier to obtain the best possible price. Software was discounted due to quantity discounts. Upgrade was at NO CHARGE due to current maintenance account. 6. Explain the consequences(s) to the City, including the dollar estimate of the financial impact, if this Sole Source is not approved. If The City of Miami Police Department does not purchase PenLink's PLX system, we would continue relying on outside agencies to assist us at their convenience. Time is essence when dealing with criminal cases and at times outside agencies cannot attend to us in a timely manner, and possibly risking the loss of evidence and effecting the outcome of the case. By having our own Pen Link's PLX system we would be self-reliant, thus assisting us in locating and apprehending criminal offenders and evidence needed for proper prosecution. Lawful Interception Systems. (A Brief Technical Overview) Hakan EKIZER Chief Advisor, Monitorto KP U N MIK-DOC / Support&Services Cybercrime&Computer Forensics Expert Telecommunications&Networks Specialist What is Lawful Interception ? Lawful interception (LI) is the legally authorized process by which a network operator or service provider gives law enforcement officials access to the communications (in every kind of telephone calls, internet traffic and satellite communications etc) of private individuals or organizations. Lawful interception is becoming crucial to preserve national security, to combat crimes and to investigate serious criminal activities. The work in Lawful Interception has its foundation in the European Council Resolution of January 1995 [291 which outlined the International Requirements for the Lawful Interception of Telecommunications now known widely as the IUR. This was the result of several years of work by the European governments in cooperation with Australia, New Zealand, Canada and the USA. The standardization of lawful interception is vital to provide an economically and technically feasible solution that complies with national and international conventions and legislation. ETSI has played a leading role in the standardization of lawful interception since 1991; today work is concentrated in Technical Committee Lawful Interception (TC LI), which enjoys the active participation of the major telecom manufacturers, network operators, Law Enforcement Agencies and regulatory authorities of Europe and from around the world. ETSI's LI work covers the whole spectrum of interception aspects, from a logical overview of the entire architecture and the generic intercepted data flow, to the service -specific details for e-mail and Internet. According to ETSI standards my aim within this white paper is briefly describing How a LI system can build up. You can also find out ETSI documentations for much more detailed and technical information. LI Overview from ETSI Perspective. Lawful Interception (LI) is a requirement placed upon service providers to provide legally sanctioned official access to private communications. With the existing Public Switched Telephone Network (PSTN), Lawful Interception is performed by applying a physical 'tap' on the telephone line of the target in response to a warrant from a Law Enforcement Agency (LEA). However, Voice over IP (VoIP) technology has enabled the mobility of the end-user, so it is no longer possible to guarantee the interception of calls based on tapping a physical line. Whilst the detailed requirements for LI may differ from one jurisdiction to another, the general requirements are the same. The LI system must provide transparent interception of specified traffic only and the subject must not be aware of the interception. The service provided to other users must not be affected during interception. Architecture Overview Although the detail of LI may vary from country to country we can look at the general logical and physical requirements and also explain much of the common terminology used. The primary purpose of the service provider network is to enable private communications between individuals; any LI functionality built into the network must not affect the normal service to those individuals. The architecture requires a distinct separation of the Public Telecom Network (PTN) and the networks used for distribution and processing of LI information. The interfaces between the PTN and the Law Enforcement Monitoring Facility (LEMF) are standardized within a particular territory, LI deals with two 'products', these are; Contents of Communications (CC) and Intercept Related Information (IRI). Contents of Communications is exactly what it sounds like: the voice, video or message contents. Intercept Related Information refers to the signaling information, the source and destination of the call etc. Public Network I LEA Network Network Operator's Administration HI I Function / IIF ' Internal Wercept Function IRI Mediation Intercept Related on Hit Information JIRD Content of 7 _ Communication (CC J+f CC � Medichon t ' _ # Function s _ HI3 . r }nerno) Networle -- Infe'rfaces INI _ LI Handover Interface HI LEMF Figure 1 - General Network Arrangements for Interception (L -TSI) Figure I shows the logical flow of Intercept Related Information (IRI) and Contents of Communications (CC) from its collection in the Public Network to the handover interface to the Law Enforcement Monitoring Facility (LEMF) as defined by ETSI. In North America CALEA (Communications i Assistance for Law Enforcement Act) requires operators to provide LI capabilities. The network architecture and handover specifications are based on the PacketCable'"' surveillance model shown in Figure 2 below, the general architectural similarities can be seen. Lav€fur Authorization PacketCable Te�ecominunication Service Provide nterceItAccess Intercept Access (for Ce1I Da a (for Cali Content} PSTN GMS MG Service { Intercept Access Provider Deli�iery Funct on t`or GaII Con=_a-itl ,, Subscriber Administration CIvITS CM; MTA Figure 1- PacketCable— Surveillance Model Figure 3 below shows the high-level functions and interfaces as defined by ETSI, the Mediation Function (MF) provides standardized interfaces, H12— Intercept Related Information, and H13 — Call Contents, from the Public Telecom Network to the LEA Network. Hit Administration" Function (ADMF) Z�Communicatio Comrttunicetiort, Mode INI2,INI3� '1NIN�I3 -_' � Mediation Function Public Telecom Network (MF) ----------------------- ------ ----------------------- H12, H13 LEA Network Figure 3 - Distinction between PTN and Law Enforcement Network Basic Elements of LI in a Public Telecom Network There are three primary elements required within the public network to achieve Lawful Interception, these are: -.• An Internal Intercept Function (IiF) located in the network nodes. A Mediation Function (MF) between the PTN and LEMF. •3 An Administration Function (A®MF) to manage orders for interception in the PTN Internal Intercept Function (IIF): These functions are located within the network nodes and are responsible for generating the Intercept Related Information (IRI) and Contents of Communications (CC). Mediation Function (MF): This function clearly delineates the PTN from the LEMF. It communicates with the Ill's using Internal Network Interfaces (INIs) which can be proprietary. The MF communicates to one or more LEMFs through locally standardized interfaces: the Handover Interfaces (1-I12and H13). Administration Function (A®MF): This function handles the serving of interception orders and communicates with the IIFs and MF though an Internal Network Interface. Implementing LI within an VolP Network one of the primary problems that service providers face when managing VolP and multimedia calls is the separation of the signaling and media streams. In other words it is quite possible that the two streams may take completely different paths through the network. In addition, even when they do pass through the same device, it may not be aware of the relationship between the streams. Some devices within the network are however specifically designed to understand and manage the separate signaling and media streams— session border controllers. Typically located at the borders of the service provider's network, these offer an ideal location to implement the IIF as they receive Intercept Related Information from the signaling stream and can intercept Contents of Communication directly from the media stream. Figure 4 below shows the physical elements of the LI system, their logical functions and the interfaces to the LEMF. (all page) Public Telecoms Network „ „...:... .............. . Secure Connection i Tasking} Data i ;ntercepticn Data i Web Based GUI � i y AMM 58C �•' {lIF) i Backuo Administration Unit Ls Administration Function (ADMF) ,. 50C i Backup Mediation Unit LI Mediation Function � i ------------------------------------------------------- H12 - Intercept Related Informatio H13 - Contents of Communication h .t M -0- - Law Enforcement Law Enforcement Monitoring Facility Agency f LEA) (LEMF) Figure 4 —Example Physical Architecture ( 5 ) LI Administration Function (ADMF): ADMF is typically implemented on a hardened Management Unit; it provides a secure method to enable traffic to be targeted and routed. The ADMF uses a secure connection to one or more of the IIFs and to one or more Mediation Units. The ADMF is often backed up by a warm standby, which replicates all data between the units. LI Mediation Function (MF): MF performs the mediation and delivery functions, it is typically implemented on a hardened Mediation Unit; it receives generic formatted IRI and CC data from one or more IIFs and translates it into the country specific format for the Handover Interfaces (H12& H13) to the LEMF. The MF receives target details from the ADMF and validates the received IRI and CC data to ensure that only the warranted data is passed to the LEMF. The MF usually supports the forwarding of intercepted traffic to many LEMF interfaces simultaneously. The Mediation Unit is often backed up by a slave unit which takes over in case of failure of the primary unit. Internal Intercept Function (IIF): IIF is most effective when implemented in hardware within the network nodes in order to provide the most effective and rapid detection without incurring additional software processing and delays which may allow the presence of the intercept to be detected. The IIF collects Intercept Related Information (IRI) and Contents of Communication (CC) ask requested by the ADMF, and converts these to a generic format which is passed to the MF. �•�r r - +� _� �-r The ADMF must only be accessed by authorized users. It will manage the deployment of tasks to the other LI elements. Tasking Targets — Each target will require a Warrant ID and Case ID assigned by the LEA. Each case may require IRI or CC or both to be intercepted. Each task is assigned a start date and an end date, upon which the case will expire. Auditing Tasks — The ADMF is typically responsible for auditing the network of IIFs to ensure that the target lists match; differences should be automatically reconciled. Mediation Function Configuration — Each interface to the LEMF must be individually specified to match the required standard output. Information Volatility Essential target information must be encrypted by the ADMF and any information stored in the IIF in encoded form, thereby preventing unauthorized access to sensitive warrant information. Any information stored within the IIF should be stored in volatile memory, so that this information is erased f6l if a component of the network node is removed or powered down. Only the encrypted database of the ADMF should be maintained during power -down situations. In the event of a link failure between the MF and the LEMF the intercept products may be buffered for a short time in memory only. Any long term failure of the interface will result in intercept products being lost—this information must not be spooled to permanent storage. Conclusion Recently it has become increasingly clear that VoIP services will be expected to provide Lawful Intercept and Emergency Call Handling services to the same level experienced in the PSTN. The FCC in North America for example has mandated that both emergency calls and Lawful Intercept must be available. Whilst not all countries mandate this capability, any network operator building a publicly available voice or multimedia over IP service today will need to plan a network which is flexible enough to implement these regulatory services in the future. Session border controllers are being deployed at strategic points within VoIP networks to execute a number of access, security and quality management roles; they offer an ideal location to implement a Lawful Intercept solution. Carrier class SBCs already offer the levels of redundancy and resilience to provide `five 9s' availability, further endorsing their suitability for the location of the IIF. Terminology ADMF Administration Function CALEA Communications Assistance for Law Enforcement Act CC Contents of Communication ETSI European Telecommunications Standards Institute HI Handover Interface IIF Internal Intercept Function INI Internal Networks Interface IRI Intercept Related Information LEA Law Enforcement Agency LEMF Law Enforcement Monitoring Facility LI Lawful Interception MF Mediation Function PSTN Public Switched Telephone Network PTN Public Telecom Network VoIP Voice over IP References ETSI TS 101 331 - Telecommunications security; Lawful Interception (LI) Requirements of Law Enforcement Agencies ETSI TR 101 943 - Telecommunications security; Lawful Interception (LI); Concepts of Interception in a Generic Network Architecture ETSI TS 101 671 - "Telecommunications security; Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic PKT-SP-ESPI.5-101-050128; PacketCable`1 1.5 Specifications; Electronic Surveillance A summary of the ETSI LI specs is located at:http://portal.etsi.org/li/Summary,asp Current ETSI specs can be downloaded from:http://portal.etsi.org/li/status,asp Current PacketCablet'll specs can be found at:http:'/www.packeteable.com/specifications/ Pen -Link - Wikipedia Page 1 of 1 W'IKIPEDIA Pen -Link Pen -Link, Ltd., (PenLink) is a software company that develops enterprise -grade communications surveillance data Pen -Link, Ltd. (PenLink) collection and analysis solutions for domestic law enforcement f9 Their products include PLX, Pen -Link 8, LINCOLN2, PenProxy, and Xnet. Headquarters Lincoln, Nebraska, USA One of the more publicized uses of PenLink's products was during the Lad Peterson murder case, where wiretaps taken Products PLX, Pen -Link 8, with Pen -Link 8 and LINCOLN2, were used as evidence against Scott Peterson. LINCOLN2, PenProxy, Xnet See Also Website http://www.penlink.com/ • Lawful interception • Communications Assistance For Law Enforcement Act References ?,i,,ii;r., Chu ,2",-7-C9-25,. "Pen -Link employees cash in on growing surveillance business" (http://www.kearneyhub,comisiteinews.cfm? newsid=18855997&6RD=268&PAG=461&dept_.id=577571&r5=6). Omaha IKI I-Her3/d. Rat:iavaa 10 M r -h _RM, External resources • PenLink, Ltd. (Company Website) (http://www.penlink.com/) Retrieved from"hitps:/len.wikipedia.crglw/index.php?title=Pen-Link&oldid=830940178" This paga vas last edited on 17 March 2013. at 20:42 (UTC). Lcarse. auditicnal tern a may anti-•, S, r.s rg pau qg.,a to ria ` rr.' 3f'-:sa aid ?,"va"L Pel c;i a rb6iatar=_`;; �nada,rark cf the irc„ a nor+: pmflt or�anizac,on. https://en.wikipedia.org/wiki/Pen-Link 12/3/2018 The Commission I CALEA® The Commission on Accreditation for Law Enforcement Agencies, Inc., (CALEA®) was created in 1979 as a credentialing authority through the joint efforts of law enforcement's major executive associations: AU CALEA THE GOLD STANDARD N P[ PLIC SAYE:TY • International Association of Chiefs of Police (IACP); • National Organization of Black Law Enforcement Executives (NOBLE); • National Sheriffs' Association (NSA); and the • Police Executive Research Forum (PERF). The purpose of CA -LEA's Accreditation Proar s (-programs) is to improve the delivery of public safety services, primarily by: maintaining a body of standards, developed by public safety practitioners, covering a wide range of up-to-date public safety initiatives; establishing and administering an accreditation process; and recognizing professional excellence. Specifically, CALEA's goals are to: • Strengthen crime prevention and control capabilities; • Formalize essential management procedures; • Establish fair and nondiscriminatory personnel practices; • Improve service delivery; • Solidify interagency cooperation and coordination; and Page 1 of 3 http://www.calea.org/content/commission 12/3/2018 The Commission I CALEAR Increase community and staff confidence in the agency. The CALEA Accreditation Process is a proven modern management model; once implemented, it presents the Chief Executive Officer (CEO), on a continuing basis, with a blueprint that promotes the efficient use of resources and improves service deliveiy—regardless of the size, geographic location, or functional responsibilities of the agency. This accreditation program provides public safety agencies an opportunity to voluntarily demonstrate that they meet an established set of professional standards which: • Require an agency to develop a comprehensive, well thought out, uniform set of written directives. This is one of the most successful methods for reaching administrative and operational goals, while also providing direction to personnel. • Provide the necessary reports and analyses a CEO needs to make fact -based, informed management decisions. • Require a preparedness program be put in place—so an agency is ready to address natural or man-made critical incidents. • Are a means for developing or improving upon an agency's relationship with the community. • Strengthen an agency's accountability, both within the agency and the community, through a continuum of standards that clearly define authority, performance, and responsibilities. • Can limit an agency's liability and risk exposure because it demonstrates that internationally recognized standards for law enforcement have been met, as verified by a team of independent outside GALEA -trained assessors. • Facilitates an agency's pursuit of professional excellence. CALEA Structure A Commission Board (/node/io/content/caiea- commissioners) composed of 21 members governs CALEA. Eleven must be law enforcement practitioners; the balance is selected from the public and private sectors. Generally, they reflect a representation from local, state/provincial and international law enforcement and public safety organizations, along with business, academia, the judiciary, and state/provincial and local government. The Commissioners are appointed by the four founding law enforcement organizations, and serve without compensation. Page 2 of 3 http://vvww.calea.org/content/coimnission 12/3/2018 The Commission I GALEA® CALEA operates as an independent, nonprofit (501[c]3) corporation, and maintains a professional staff managed by an Executive Director. The staff conducts all administrative and operational duties as directed by the Commission. CALEA publishes a monthly electronic newsletter, the CALEA E-Coinniuuique (calea-neivs) , and maintains a professional website. CALEA offers accreditation related training at each of it's conferences, as well as presentations on current issues in public safety. Share / Save SW I - Page 3 of 3 imormp- 1-4" If aoff. AssociationsYounding � k CALEA� @ 2010 13575 Heathcote boulevard, Suite 320 Gainesville, Virginia 20155 (703) 352-4225 FAX (703) 890-3126 http://www.calea.org/content/commission 12/3/2018 ADACS CAL EA -Compliant Surveillance Systems - SyTech Corporation Page 1 of 6 C�to CQ UG, �Ojff�FD Products ADACS CALEA-Compliant Surveillance Systems ADACS Title III Systems ADACS Pen Register Systems ADACS Web Client Evidence Modules ADACS Data Sheets Customer List FAQ Support Portal RIOS Radio Interoperability Systems RIOS LITE Smartphone LMR SmartBug Covert Listening Device R-TDIS Vehicle Intercom System ADACS ALFA -Compliant Surveillance Systems ADACS CALEA-compliant surveillance systems provide law enforcement and intelligence agencies with the ability to collect, monitor, record and analyze switch -based voice, video, and data transmissions. In use by hundreds of agencies worldwide, ADACS delivers a full range of intercept, archive, and analysis packages designed for the unique nature of evidentiary voice, video, and data collection. http://www. sytecheorp.com/products/adaes-calea-compliant-surveillance/ 12/3/2018 ADACS CALEA-Compliant Surveillance Systems - SyTech Corporation Page 2 of 6 ADACS4 Evidence Modules • Title III Voice Collection • Pen Data Collection • Location Collection and Mapping • SMS Collection • IP Data Collection • Video Interfacing • Historical Importing • Data Reporting and Analysis The ADACS4 Intercept Platform functions as SyTech's next generation voice, video, and data collector for all forms of switch -based communication including CALEA .l -STD and VoLTE voice intercept. A combination of hardware and software, ADACS4 allows the agency to discretely intercept all forms of CALEA-compliant communications directly from the target's service provider. Collection and audio playback occur in real-time in conjunction with the agency's standards of lawful intercept. Advanced T2S2 tools such as location mapping, automatic alerts and secure wireless monitoring take the intercept out of the wire room and into the digital age. The ADACS4 CALEA-Compliant Platform http://www.sytecheorp.com/products/adaes-calea-compliant-surveillance/ 12/3/2018 ADACS CALEA-Compliant Surveillance Systems - SyTech Corporation Page 3 of 6 Based upon the ADACS4 Platform, ADACS CALEA-Compliant Surveillance Systems include a full range of standalone intercept systems designed to meet the unique voice, video, and data requirements of law enforcement and intelligence agencies. ",I applaud SyTech for the superior quality hardware, the user friendly, all-inclusive software and their outstanding 24/7 customer and tech support..." -Assistant Special Agent in Charge, Georgia Bureau of Investigation ADACS Wire, Rooms and EnterDrise Servers ADACS Wire Rooms and Enterprise Servers deliver the highest level of CALEA-compliant surveillance for law enforcement and intelligence agencies. ADACS Wire Rooms and Enterprise Servers support multiple ADACS workstations monitoring multiple simultaneous calls connected within a secure IP environment. ADACS provides intercept capabilities across all medians of switch -based intercept with access to all ADACS4 Evidence Modules. r IT • Pen Data • Location Mapping http://www.sytecheorp.com/products/adacs-calea-compliant-surveillance/ 12/3/2018 ADACS GALEA -Compliant Surveillance Systems - SyTech Corporation Page 4 of 6 • Voice Intercept • Internet Intercept • Video Interfacing • GPS Tracking • Call Importer ADACS Enterprise Servers range from multi -national T2S2 intercept systems handling millions of call records to single -rack systems handling a handful of intercepts. SyTech offers options for the number of simultaneous calls supported, number of networked workstations, service - provider connectivity solutions as well as additional products and services designed to deliver unsurpassed evidence collection. SyTech Signal Intercept Engineers work with your organization to tailor a system ideal for your agency's unique intercept requirements. "It is truly a pleasure to work with professionals of this caliber... Our department has been associated with SyTech for approximately five years... The quality of the equipment is excellent, however your people are what make You special." -Narcotics/Intelligence Unit, Warner Robins, GA. ADACS Vlorkstation Servers and Pen Clicen -s The ADACS Workstation Server allows law enforcement agencies to receive real-time caller information from cellular phones, landlines, and other types of switch -based communications. By implementing the Pen Data Evidence Module, agencies can view who a target is calling, how long they're talking and where they are located. Integrate the Location Mapping Evidence Module to graphically view where the target is calling from as well as the target's location over a range of dates. http://www.sytecheorp.com/products/adaes-calea-compliant-surveillance/ 12/3/2018 ADACS GALEA -Compliant Surveillance Systems - SyTech Corporation Page 5 of 6 • Pen Data • Location Mapping • Internet Intercept • Video Interfacing • GPS Tracking • Call Importer SyTech Signal Intercept Engineers work with your organization to determine the optimal ADACS Workstation Server that's right for your agency. SyTech offers affordable pen -data packages such as our "pay -per - pen" and "unlimited -pen" options with secure, encrypted access to all service providers. Additional standalone ADACS4 Evidence Modules for Video Interfacing, Call Record Importing and GPS Tracking are also available. "'The mapping program was instrumental, displaying in real time, utilizing the tomer Faits, the target's cell phone location... The detectives and analysts are impressed with the features... in a user friendly format." -Vice and Narcotics Unit, Hernando County S0, FL. To receive an ADACS CALEA-compliant surveillance system quote, contact ADACS Sales at 703-941-7857 or by clicking Dere. http://www.sytechcorp.com/products/adacs-calea-compliant-surveillance/ 12/3/2018 PLX I PenLink Page 1 of 6 suimortOoenlink.com PENLIN COLLECTION AND sis A COMPREHENSIVE COLLECTION AND ANALYSIS SOLUTION The massive quantities of data garnered in from your investigations can be overwhelming. That is why we created PLX—the combined https://www.penlink.com/plx/ 12/3/2018 PLX I PenLink Page 2 of 6 investigative power of all our collection and analysis tools into one all-inclusive platform. v THREE SOLUTIONS, ONE DASHBOARD All of the concerted capabilities of Pen - Link 8, LINCOLN 2, and Xnet in one easy- to-use interface. a .. _ r Ani r rll r_ i_1 I'l I._n A n 1 A Il-_ https://www.penlinlc.com/plx/ 12/3/2018 PLX I PenLink Load large quantities of communication data from an array of file types and conveniently store them in a single database. INVESTIGATE BEYOND PHONE CALLS Collect, analyze, and export massive amounts of social media and internet communication data. LIVE COLLECTION AND MONITORING Collect pen register and wiretap intercepts in real - EXTENSIVE REPORTING CAPABILITIES Query, sort, and display standard and custom Page 3 of 6 https://www.penlink.com/plx/ 12/3/2018 PLX I PenLink time for tracking, live monitoring, and analysis. and call associations using an array of charting tools reports from one or more data sets. coordinates in real-time or using historical data. Page 4 of 6 PRODUCTSUPPORT Our highly -trained staff is available to answer your questions. suoport@penlink.com https://www.penlink.com/plx/ 12/3/2018 PENLONK Raul Perez Miami Police Department Miami, FL October 3, 2018. Dear Raul Perez: Pen -Link, Ltd. is the sole source provider of all Pen -Link Software Products, services (installation and training), maintenance, and hardware configurations including PLX, Pen -Link Version 8.2 Product Suite, Xnet, and LINCOLN Administrative Software. We utilize no agents, dealers, or distributors. Pen -Link's products are proprietary and can only be purchased directly from Pen -Link, Ltd., which is located in Lincoln, Nebraska, Pen -Link's Federal Tax I.D. # is 47-0707585. Sincerely, SHELLEY SORENSEN I Territory Sales Manager 402.421.8857 office 1402.202.9546 cell shelley@penlink.com 5944 VanDervoort Drive. Lincoln, NE. 68516.402.421.8857 wwwrpeaJink.com MARKET RESEARCH Contract No.: Sole Source 18-19-017 Title: Pen -Link Software and Equipment Procurement Contracting Officer: Victoria Giraldo Background: Current Term: N/A Expiration Date: N/A Recommendation: ® Sole Source Contract ❑ Solicit Competition ❑ Access Contract ❑ Other The City of Miami's Police Department ("Police") has been tasked to search for a viable resource to continue to gather vital information from Global Positioning System ("GPS") towers. Police would like to obtain the Pen -Link software and equipment ("Software") from Pen -Link, Ltd ("Pen -Link"), a software solution that is utilized to trap and trace subscriber information from cellular providers which includes GPS tower location information. The Software's server is also used for wiretaps for voice, text and social media information for Title III warrants. Police analysts use this "real time" information, gathered by the Software, to solidify evidence on criminal suspects and to assist in the prosecution of State and Federal investigations such as missing persons, abductions/kidnappings, homicides, robberies where time is of the essence. Currently, the City obtains said information from Miami -Dade County ("MDC"). However, in recent months MDC Police have expressed that this courtesy service will be discontinued due to the current overtime budget restraints enforced at MDC and have recently limited the access to the Software. Police's ability to track cellular phones is now limited and is restricting the expeditious manner in which Police tracks violent felony offenders and solves cases against residents of the City. The initial purchase is estimated at approximately $70,573.41, inclusive of hardware, installation, software one (1) year subscription and licensing. Future renewals of Software subscription and licensing and maintenance will be covered under City Procurement Code 18-72 (b) (15), Maintenance and licensing agreements to support continued, on-going use of proprietary software application. Research Conducted: An internet search was conducted for software application solutions to help Police find the best source for gathering vital information from local GPS towers, The Department of Procurement ("Procurement") has found that Pen -Link is the sole source provider for the Software, which is compatible with the Miami -Dade Police Department, Florida Department of Law Enforcement, various federal law enforcement agencies as well as many other South Florida municipalities who also use this Software. The Software is the only system in the industry that is capable of intercepting, processing and analyzing both Telco and IP Data all in one comprehensive platform with "Real Time" information. It also supports all United States Communications Assistance for Law Enforcement Act ("CALEA") delivery standards, European electronic surveillance delivery standards, as well as, South and Central American delivery standards. These components are proprietary to Pen -Link. Comparable Contracts: No competitive solicited contracts were found for the purchase of the Software; however the following municipalities utilize the Software and have obtained it as a Sole Source: New York City, New York Contract # 20161422129 initial $80,000 State of Ohio, Columbus, Ohio Contact # AGO0100397 initial $91,961.25 Miami -Dade County, FL Contact # L9152-2/17-1 initial $212,000 for 3 years The above entities procured the services via their municipality's sole source process. The pricing listed above vary due to the quantities purchased and the equipment needed to support each license. Yearly license fees can range from $5,000 to $10,000 per year. The City of Miami will be paying $6,250 per license per year which falls in the lower end of the range. Recommendation: It is recommended that the City purchase the Software from Pen -Link as a Sole Source, to enable Police to continue to be efficient in their investigations and continue their investigations with the same compatible software, so that there is no lapse in service, before Miami -Dade County Police decides to end access to their system altogether. Procurement Contracting Officer:l� y y Date: Procurement Contracting Manager:-� Date: 7 N) Director/Asst. Director: e '~ Date:, c Detail by Entity Name Porda DecaCment of State -? T1 -ar tir u Departmer_t_of_State / Division of Corporations / Search Records / Detail By Document Number / Detail by Entity Larne Foreign Profit Corporation PEN -LINK, LTD. CORP. Filina Information Document Number F19000002577 FEI/EIN Number 47-0707585 Date Filed 05/31/2019 State NE Status ACTIVE Principal Address 5944 VANDERVOORT DRIVE LINCOLN, NE 68516 Mailinq Address 5944 VANDERVOORT DRIVE LINCOLN, NE 68516 Reaistered Aqent Name & Address INCORP SERVICES, INC. 17888 67TH COURT NORTH LOXAHATCHEE, FL 33470 Officer/Director Detail Name & Address Title CHAIRMANrPRES POPE, PHILIP K 5944 VANDERVOORT DRIVE LINCOLN, NE 68516 Title DIR./VP/TREA. OLSON, BRIAN 5944 VANDERVOORT DRIVE LINCOLN, NE 68516 Title DIR KUHN, REGINALD 5944 VANDERVOORT DRIVE LINCOLN, NE 68516 Page 1 of 2 D'Y 310N OF CORPCRATIONS http://search.sunbiz.org/Inquiry/CorporationSearch/SearchResultDetail?inquirytype=Entity... 6/4/2019