Security Limits V Avangrid
Security Limits V Avangrid
Security Limits V Avangrid
Plaintiff Security Limits, Inc., (“SLI”) as and for its complaint, respectfully alleges, on
knowledge with respect to itself and its own conduct, and on information and belief as to all other
matters, as follows:
1. This action arises out of a brazen racketeering scheme, replete with bid-rigging,
procured under bogus pretenses, and the misappropriation and illicit transfer of proprietary
business secrets. The scheme (the “Bid-Rigging Scheme”) was operated through Defendant
Avangrid Networks, Inc. (“Networks”), a company operating regulated energy utilities in New
York and New England, and was conceived of by its parent, Avangrid, Inc. (“Avangrid”), along
with Defendant Iberdrola S.A., the majority shareholder of Avangrid (“Iberdrola,” and collectively
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 2 of 72
S.L. (“Prosegur”) and two of its subsidiaries, Cipher Security, LLC (“Cipher) and Prosegur
Security Monitoring, Inc. f/k/a Viewpoint CRM, Inc. (“PSM”); Defendant Unlimited Technology,
Inc. (“UTI”); and Defendant Black & Veatch Corporation (“B&V,” and collectively with Prosegur,
Cipher, PSM and UTI, the “Vendor Defendants”). The Bid-Rigging Scheme took place between
Prosegur. Former Iberdrola executives Antonio Asenjo Martin and Enrique Victorero, current
Iberdrola Global Procurement Director for Networks Ignacio Sánchez Galán, and current Prosegur
CEO Javier Tabernero have all been indicted or are under investigation by the High Courts in
Spain for corporate espionage and procurement fraud. As a result, New Mexico authorities have
delayed authorization of Avangrid’s proposed merger with PNM Resources, Inc. pending
4. As alleged in greater detail below, in combination with its confederates, the Utilities
Defendants conducted the Bid-Rigging Scheme in order to steer valuable contracts to certain of
SLI’s competitors – ones willing to participate in a pay-to-play scheme. In certain cases, the
Utilities Defendants and/or Prosegur forced SLI to partner with favored vendors such as Cipher,
PSM and B&V as a condition of bidding for contracts that SLI should have otherwise been able to
caused to be shared the misappropriated trade secrets and bidding information of Plaintiff SLI with
its competitors, effectively foreordaining the award of valuable contracts to those vendors and
resulting in the wholesale subversion of Avangrid’s bid process. On numerous occasions, the
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 3 of 72
Utilities Defendants reissued earlier RFPs – for which SLI had already submitted best and final
offers –to facilitate favored vendors, which would submit new bids styled to incorporate
bidding, engaged in customer and market allocation, and steered contracts to vendors willing to
provide equipment and services that were neither competitively priced nor situationally
appropriate (and in some cases, unnecessary altogether). The Utilities Defendants awarded these
inappropriate contracts in order, inter alia, to aid it in meeting critical quarterly capital expenditure
targets in order to claim consistent depreciation benefits, and for personal gain such as securing
vendors, by giving them an unfair and improper advantage in the bid process, and by enriching
their EBIDTA with excessive payments for unnecessary equipment and services.
of retaliation against SLI, because, inter alia, SLI principal Paulo Silva would not permit SLI to
participate in the corruption of the bidding process and had, in a whistleblower capacity, called
attention to corporate waste and major lapses in critical infrastructure’s cyber security. Moreover,
the Utilities Defendants defamed SLI and Mr. Silva, by maligning them and otherwise making
false claims about the quality of their work, injuring SLI financially and reputationally.
9. The Bid-Rigging Scheme, and its inherent waste, deprived SLI of valuable
contracts it would have otherwise been awarded in an unrigged bidding process, wasted millions
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 4 of 72
10. Defendants’ conduct caused SLI significant financial and reputational harm, for
which it seeks redress in this action. Based upon the foregoing described scheme and conspiracy,
SLI asserts claims against the Defendants herein pursuant to (i) the Racketeer Influenced Corrupt
Organizations Act (“RICO”), 18 U.S.C §§ 1962(c), (d) and 1964(c), (ii) Section 2(c) of the
Robinson-Patman Act, 15 U.S.C. § 13(c), and Section 4 of the Clayton Act, 15 U.S.C. § 15, and
11. This Court has jurisdiction over this matter under 28 U.S.C. §§ 1331 and 1337,
since this action arises, inter alia, under Sections 1962(c) and (d) and 1964(c) of RICO, Section
2(c) of the Robinson-Patman Act, and Section 4 of the Clayton Act. Supplemental jurisdiction is
12. Venue in this district is proper pursuant to 18 U.S.C. § 1965(a) and 15 U.S.C. §§
15(a) and 22 because, inter alia, many of the Defendants reside, can be found, have an agent, or
13. This Court has personal jurisdiction over Defendants pursuant to 18 U.S.C. § 1965
because, inter alia, each of the Defendants either resides, maintains offices, or conducts substantial
business in New York, and/or conspired to and engaged in substantial conduct in connection with
PARTIES
14. Plaintiff Security Limits Inc. is a New York corporation having a principal place of
15. Defendant Avangrid Networks, Inc. is a New York corporation having a principal
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 5 of 72
16. Defendant Avangrid, Inc. is a New York corporation having a principal place of
17. Defendant Iberdrola S.A. is a global energy company having a principal place of
18. Defendant Prosegur Gestión de Activos, S.L. is a global security company having
Pennsylvania corporation having a principal place of business at 20 Senn Drive, Chester Springs,
Pennsylvania.
20. Defendant Cipher Security, LLC, a risk management and cybersecurity firm, is a
Florida company having a principal place of business at 703 Waterford Way, Suite 490, Miami,
21. Defendant Prosegur Security Monitoring, Inc. f/k/a Viewpoint CRM, Inc., a video
22. Defendant Black & Veatch Corporation, a civil engineering firm, is a Delaware
corporation having a principal place of business at 6800 W. 115th Street, Suite 2292, Overland
Park, Kansas.
23. Defendant David Lathrop was Manager, Security Technical Services at Avangrid
during the Relevant Period, and maintains a residence at 7220 Dryer Rd, Victor, New York.
24. Defendant John Allen was a Senior Director of Corporate Security at Avangrid
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 6 of 72
26. Defendant Enrique Victoreo was International Security Director at Iberdrola during
the Relevant Period, and visited the United States frequently in the course of business during the
Relevant Period.
27. Defendant Antonio Asenjo Martin was Global Head of Security at Iberdrola during
the Relevant Period, and frequently participated in meetings in the United States by video
conferences and other means in the course of business during the Relevant Period.
28. Defendant Ed Boucas was Chief Executive Officer of Cipher during the Relevant
29. Defendant Andre Viera Rolim was Chief Financial Officer of Cipher during the
Relevant Period, and frequently participated in meetings in the United States by video conferences
and other means in the course of business during the Relevant Period.
30. Defendant Bill Reilly was Executive Vice President, Sales at Prosegur Security
Monitoring, Inc. f/k/a Viewpoint CRM, Inc. during the relevant period.
31. Defendants John Does 1 to 100 are other Defendants who are liable to SLI based
upon their participation in the Bid-Rigging Scheme alleged herein, but whose identities are
FACTS
32. Defendant Avangrid is an energy services and delivery company with $36 billion
global energy company with assets worth more than €123 billion. Defendant Networks, a
subsidiary of Avangrid, owns and operates eight electric and natural gas utilities, serving 3.25
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 7 of 72
monopolies that are the only companies allowed to deliver electricity within the geographic areas
they serve. The companies are charged with providing efficient, reliable, environmentally safe
energy at the lowest cost. In exchange, utilities are allowed to recover their costs, plus a profit.
Such utilities are subject to both state and federal regulation, and subject to the oversight of the
Public Utility Commission (“PUC”) of the state in which the utility operates.
34. PUC’s generally determine a given utility’s revenue requirements in what is called
a “rate case” – a process designed to contemplate both what monies a utility must collect to cover
its costs, and what additional monies it should collect to realize a reasonable profit.
35. Under PUC regulations, investor-owned utilities are generally able to recover their
spending on operational expenses (“OPEX”), but are not compensated above and beyond those
outlays. In contrast, PUCs allow for the recovery of investment in capital expenses (“CAPEX”)
plus a profit of 7-15%, depending on the State. CAPEX contemplates the acquisition of a broad
array of assets, including hardware such as transformers, fiberoptic cables, and data center
36. Utilities can also apply for rate increases on the basis of CAPEX investments in
infrastructure upgrades, to the extent that they can demonstrate such improvements are necessary,
prudent, and reasonable, given that they will be passed on to consumers via rate-case filing, and
thus need to be recoverable over time. Thus, while utilities are required to justify investment in
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 8 of 72
37. Unsurprisingly, the Utilities Defendants set quarterly CAPEX profit targets in
38. Consistent with the mission of PUCs to ensure the delivery of safe and reliable
energy at the lowest cost, utilities are supposed to obtain competitive bids in the course of the
procurement process. To that end, when seeking goods and services, utilities are obliged to invite
qualified suppliers to provide bids, which Avangrid purports to do through the issuance of requests
for proposals (“RFPs”), or tenders. Qualified bidders then submit detailed bids in response to the
tenders, culminating in the bidder’s best and final offer (“BAFO”). In a normal and transparent
bidding process, the utility awards a given contract to the bidder judged most qualified on the basis
of its BAFO, the quality of its submission submittal, and its overall experience and track record.
39. Each of the Utilities Defendants had a role in the Avangrid procurement process.
Networks issued the RFP tenders to prospective vendors. The resulting bids and BAFOs were
aggregated in Iberdrola’s procurement system, which is housed in Spain. The actual procurements
40. Tenders generally contemplate five service categories that, from an accounting
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 9 of 72
41. The five categories constitute complementary and interrelated service areas specific
to the data centers and network at issue. As a result, it is inefficient (and highly unusual) for a
utility to disaggregate a category of service (or a portion of work from that category) and reissue
engineering, architecture, and consulting solutions firm. SLI is among the leaders in many service
categories, including Hyper Converged Data Center design and engineering services, and Smart
Grid-AMI cyber security design and engineering. Particularly notable in its portfolio is a
proprietary secure integrated private cloud architecture and design that, in or about mid-2018, SLI
43. In 2017, Defendant Avangrid was attempting to improve the quality and reliability
of its cyber security program and its constituent transport networks in accordance with benefits
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 10 of 72
disclosed in various rate-case filings (the “Phase I” program). To that end, Avangrid awarded a
44. By early 2018, Avangrid had grown dissatisfied with SNC-Lavalin’s performance.
SNC-Lavalin had not yet been able to provide a working design and appeared unable to timely
address problems and otherwise advance the program. Silva, as SLI’s principal, contacted
Defendant David Lathrop, then Avangrid Network’s Technical Security Manager, seeking an
opportunity to work with Avangrid. Silva shared with Lathrop his vision for a secure
45. Impressed with Mr. Silva, Lathrop decided to involve SLI in an attempt to get the
program back on track, and introduced Mr. Silva to SNC-Lavalin to explore whether SLI’s design
that would eventually manifest as IroncladTM could be integrated into the Avangrid Security
Program. Because SLI was not an approved vendor of Avangrid, on or about March 1, 2018, SLI
entered into an independent contractor agreement with the then-prime contractor, SNC-Lavalin.
46. Even though initially constrained to use limited personnel already in the program,
SLI was able to turn the program around. Silva wholly reshaped the project, identifying and curing
various flaws in SNC-Lavalin’s original systems design package, and engaging an outside agency
47. After carefully evaluating SNC-Lavalin’s design, Silva realized that SLI could not
employ the IroncladTM design in the Avangrid Security Program without significant modification.
Utilizing Silva’s intellectual property and expertise, SLI identified the changes necessary to ensure
the compatibility of IroncladTM with the developing design. SLI successfully completed these
steps, resulting in the creation of the Avangrid Secure Domain (the “ASD”). Central to the actual
operation of the ASD was the IroncladTM Runbook, SLI’s comprehensive, proprietary
10
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 11 of 72
compendium of, inter alia, blueprints, technical specifications, and equipment necessary to build
48. The ASD, which established an overall architecture for securing the critical
infrastructure of Avangrid, was implemented to conform and comply with hundreds of security
controls, including those established by the Federal Energy Regulatory Commission (“FERC,”),
the North American Electric Reliability Corporation (“NERC”), and the National Institute of
Standards and Technology (“NIST”). The ASD was built to introduce value to rate-payers by
allowing both consolidation and integration of data centers to and systems across several operating
utility companies in the Northeast of the United States, and provided a secure and orderly path for
migrating critical systems, applications, and services from a legacy infrastructure onto a 21st
century secure private cloud architecture, ultimately savings rate-payers hundreds of millions of
dollars.
49. Consistent with the achievement the ASD represented, and recognizing the
centrality of the IroncladTM Runbook and its benefit to grid security, Avangrid licensed the
technology by entering into an end-user license agreement with SLI on or about February 11, 2019
(the “EULA”).
50. Notwithstanding the centrality of Silva and SLI to the ASD, SLI was not an
“approved vendor” of Avangrid as to the Phase I work, and thus had to perform its pivotal work
in the capacity of a subcontractor. SNC-Lavalin was briefly displaced as the prime contractor by
Defendant B&V, which itself was displaced by Defendant UTI. In light of Silva’s expertise,
Avangrid encouraged SLI – a design and engineering firm – to oversee implementation of the ASD
11
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 12 of 72
51. Thus, on March 28, 2019, SLI entered into a subcontractor agreement with UTI
(the “UTI Subcontractor Agreement”). Throughout the tenures of SNC-Lavalin, B&V and UTI as
prime contractor, Mr. Silva, through SLI, assumed the role of Chief Security Architect of the
52. The turn-around that SLI and Silva had managed to bring about was total. The
creation and implementation of the ASD was viewed by Avangrid management as a resounding
success.
Phase II of the
Avangrid Security Program
53. In light of its successful implementation of the ASD, and the completion of Phase
I of the Avangrid Security Program, SLI anticipated being awarded valuable contracts related to
Phase II of the project. Entirely apart from the enthusiasm Avangrid had expressed over SLI’s
earlier performance, and the respect that SLI’s hand-picked engineers had garnered, the ASD relied
on SLI’s own intricate knowledge of the IroncladTM design, making SLI an obvious choice for
assuming broad responsibilities in connection with the Phase II design and implementation. SLI
had already been asked to bid on a September 11, 2018 tender, in the form of a Statement of Work,
for the Optical Transfer Network -Automated Metering Infrastructure project (the OTN-AMI-
SOW).
54. The foundational services and procurement contemplated by the Phase II work was
embodied in Avangrid’s “Security Program II ICT Engineering RFP,” and it was first proffered
for bidding on February 18, 2019, in the form of RFP Tender No. 776388 (the “Original ICT
Engineering RFP”). The Original ICT Engineering RFP included professional services, hardware,
12
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 13 of 72
55. SLI, along with three competing firms – WiPro, Insight, and Accenture – made bids
responsive to the Original ICT Engineering RFP between March and June 2019. SLI made its first
bid on the lucrative Original ICT Engineering RFP on or around March 18, 2019, and made a its
BAFO as to the Original ICT Engineering RFP on or around April 30, 2019. SLI would make
further bids and BAFOs to progressively diminishing portions of the Original ICT Engineering
RFP in the months to come, not realizing the RFPs were being refined and reissued on the basis of
SLI’s own bidding information, as a means of facilitating the bids of SLI’s competitors.
procure services and equipment by issuing requests for proposals, and reviewing responsive bids
in an unbiased and transparent manner in accordance with statutory procurement guidelines and
the United Nations Sustainability Goals in which AVANGRID participates. Yet when conducting
bidding for Phase II of the project, Avangrid did the precise opposite.
57. As would soon become evident, Avangrid, through its subsidiary Networks, wholly
subverted the bidding process. First, it tolerated (if not encouraged) the misappropriation and
sharing of SLI’s confidential bidding information between Defendants PSM and Cipher, vendors
that were subsidiaries of Prosegur, a Spanish company with close ties to Avangrid’s parent
company, Iberdrola.
58. Second, it manipulated the bidding process to facilitate the improper bids of
Prosegur subsidiaries and UTI, foreordaining the award to SLI’s competitors of valuable contracts
that SLI would have otherwise been awarded under a transparent and fair bidding process.
59. Third, forgoing any pretext of competitive bidding, Avangrid and Iberdrola sole
sourced to SLI’s competitors dubious equipment purchases prices far in excess of those which SLI
13
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 14 of 72
(the owner of the design) would have charged, in order to contrive, and benefit from, capital
expenditures.
60. Silva first became aware of the ongoing Bid-Rigging Scheme in or around March
2019, when two Avangrid executives, Defendants David Lathrop and John Allen, introduced Silva
to Defendant PSM, a security monitoring company then known as Viewpoint. Viewpoint had been
recently acquired by Prosegur. Bill Reilly, a Viewpoint executive, introduced Silva to Prosegur,
through which Silva was introduced to Defendant Cipher, another security firm acquired by
Prosegur, and to Cipher’s CEO, Defendant Ed Boucas. Unbeknownst to Silva, Prosegur – with
Avangrid’s knowledge and cooperation – intended to poach from SLI lucrative Avangrid contracts
Boucas, three senior Prosegur executives with strong ties to Iberdrola, SLI agreed to explore a
potential working relationship with Cipher. Thus, on or about or about August 5, 2019, Cipher
and SLI executed a Mutual Confidentiality Agreement (the “NDA”) in anticipation of a possible
62. Relying on the NDA, SLI provided confidential information to, inter alia, Cipher’s
Chief Financial Officer, Andre Viera Rolim, and Vice President, Troy Wachter. The information
included business secrets regarding bid proposal requirements, including pricing and corporate
capabilities to be offered in in support of a bid for the Original ICT Engineering RFP.
63. SLI provided this highly confidential information to Cipher based on the NDA and
Boucas’s representation that the parties would work together in good faith, that Cipher would help
SLI better position itself to win the contract for that Original ICT Engineering RFP, and that the
parties would explore a joint bid or some other mutual business transaction. The subsequent
14
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 15 of 72
misuse by Cipher and Prosegur of SLI’s business secrets belied any notion that either company
64. Exploiting SLI’s good faith, Cipher and Prosegur used SLI’s proprietary
in connection with the Original ICT Engineering RFP, employing SLI business secrets and
confidential details concerning its methodology and business plans. The Prosegur Dashboard
contained data based on confidential SLI information concerning every aspect of the Avangrid
program and was explicitly designed to help Prosegur entities win business from the Utilities
Defendants on the basis of SLI’s expertise, and its confidential trade secrets.
65. The highly inappropriate Prosegur Dashboard was far more than a dossier
compiling wrongly appropriated business secrets: it was a playbook brazenly detailing strategy for
how best to exploit SLI’s proprietary bidding information. It openly acknowledged Prosegur’s
coordination with the Utilities Defendants, and explicitly spelled out the strategy for establishing
Prosegur’s credentials and securing Avangrid’s business while squeezing out Silva and SLI.
66. Not even attempting to conceal its planned bid-pilfering, the Prosegur Dashboard
included in its entirety SLI’s 15-page bid for the Original ICT Engineering RFP, inserting Cipher’s
own name as a header. A copy of SLI’s original bid with the added Cipher header, as extracted
67. As if the wholesale annexation of SLI’s own bid were not brazen enough, the
Prosegur Dashboard is breathtakingly forthright about its creators’ planned misfeasance. That
much is plain from the Prosegur Dashboard’s “Next Steps” page, which bears close examination,
15
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 16 of 72
Next Steps:
1. Out of the 3 scena rios, we focus (initially) in "Plan A" (Subcontract Scenario). Leaving " Pl an B" (Joint Venture " LLC"
Scenario) and "Plan C" (M&A Scenario) as potential future alternatives. "Plan A" give us t he ability to comply w/ curren t tender.
a. Action: Need to build an argument document and Q&A that supports the rationa le behi nd "Pla n A" (Subcontract
Scenario) and that we all can use in a coordinated way interna lly and more important w/ Avangrid and Iberd rola. Focus in the
positive reasons behi nd it. Owner: Andre (w/ Legal and Troy)
2. MoU - APPENDIX A - SCOPE OF SERVICES ALLOCATION : Not sure if best approach is an allocation based in% of services
and instead based in the type of service. We should be able to show a ramp-up and ramp-down of Paulo in the project. That
way we "lock" Pa ulo to t he project (till the end) while we show Ava ngrid/lberdrola t hat we are progressively red ucing Paulo
dependency and taking control.
a. Action : An alyze type of services (Presales analysis) and optimal all ocat ion based in Cipher services cu rrent capabilitie,
(day 1) and "SL". Progressive t ransit ion t ill a% that we fee l comfortable. Owner: Troy
3. APPENDIX B - SUPPLIES AND EQUIPMENT: Map infrastru ctures needs and best buying/pricing negotiation capacity
(Prosegur/Cipher/Paulo) as well as identify wh ich technologies are need it to provide the service versus which technologies are
pure resale.
a. Action: List of procurement list w/ pricing quotes, margin, "negotiation owner" (Prosegur/Cipher/Paulo) . Owner:
Andre (w/ Prosegur Corporate Procurement and Paulo)
b. Action: List of technologies need it to provide the service. Owner: Troy
4. Risk & Liabi lities: Understand all risks and liabilit ies stated in the MSA and also from the technical/commercial perspectiv1
(e.g. specific energy tech nology platfor ms)
a. List of risks and liabilities assess ident ifying proposal to mitage/eliminate risk/liabilit ies. Owner: Andre (w/ Legal and
5. Security Limits Financials: Analyze the numbers and prepare the report w/ assessment. Owner: Andre
68. First, and notably, the “Next Steps” page speaks of the strategic importance of
developing an “argument document and Q&A” supporting a rationale for confining SLI to
subcontractor status, which it refers to as “Plan A.” While wanting to obtain the lucrative ICT
Engineering Contract for itself and limit SLI’s role, Prosegur still needed to ensure SLI’s
involvement, not only because it was dependent on SLI’s know-how, but because, unlike SLI,
neither Prosegur entity had formally entered a bid in response to the Original ICT Engineering
69. More astonishing still, the “Next Steps” page openly acknowledges Prosegur’s
coordination with Avangrid – issuer of the RFP – and its parent, Iberdrola, wholly belying any
notion that the Utility Networks conducted an unrigged bidding process; the “argument document
and Q&A” were intended to be tools “we all can use in a coordinated way internally and more
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 17 of 72
70. Paragraph 2 of the “Next Steps” page openly muses over the best strategy for
developing Prosegur’s own bona fides while simultaneously ensuring a diminishing role for SLI
and Silva (here referred to by his first name, “Paulo”) in the contemplated work. “We should be
able to show a ramp-up and a ramp-down of Paulo in the project” (emphasis in the original).
71. The very fact of the Prosegur Dashboard’s creation (and its unblushing, wholesale
integration of SLI’s bid) evidences Prosegur’s willingness to employ improper means to secure
business from the Utilities Defendants. But the continuation of paragraph 2 of the “Next Steps”
page vividly demonstrates (i) Prosegur’s acknowledged inability to secure or perform the ICT
Engineering contract without the support of Silva and SLI, (ii) the Utilities Defendants’ awareness
of Prosegur’s dependency on Silva and SLI, and (iii) Prosegur’s desire to take control of the
lucrative ICT engineering work, to the exclusion of SLI: “That way we ‘lock Paulo’ to the
project (till the end) while we show Avangrid/Iberdrola that we are progressively reducing
misfeasance central to the Bid-Rigging Scheme, and exposes its participants for the racketeers that
they are. The subsequent actions of the Utilities Defendants and the Vendor Defendants, all taken
in furtherance of the Bid-Rigging Scheme, would simply confirm the pattern of misfeasance.
73. At that time unaware of the Prosegur Dashboard, and Prosegur’s bad faith
generally, SLI provided Cipher with yet additional information, including copies of SLI’s financial
statements, its capabilities and its bid information. The confidential information was provided
under the NDA via emails, phone calls and recorded video conferences, and continued through
17
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 18 of 72
74. In the course of the ongoing discussions with Cipher, SLI was alarmed to learn
through a third-party vendor that Defendant Reilly – the Viewpoint executive who had introduced
SLI to Prosegur – had been contacting SLI’s vendors, seeking bid prices for the precise materials
and hardware included in SLI’s bid for the Original ICT Engineering RFP. That another Prosegur
company appeared to be mirroring SLI’s bid strongly suggested that Cipher had failed to honor
the NDA by sharing SLI’s confidential bidding information with a Cipher affiliate and potential
competitor of SLI.
75. It soon became evident that Networks was not the victim of collusive bidding
practices – it was a participant and a ringleader. On or around September 25, 2019, Networks
issued a new tender – RFP no. 789546, on which SLI was not invited to bid. Troublingly, RFP
substantially identical to those suggested by SLI in its bid for the Original ICT Engineering RFP.
Of equal concern, especially in the teeth of SLI’s exclusion from the RFP, was that SLI’s
76. SLI would later learn that, employing SLI’s confidential bid information, Prosegur
subsidiaries Viewpoint and Cipher had, in fact, coordinated to request pricing from third-party
vendors for the constituent subparts of SLI’s earlier bid, even before the issuance of RFP 789546
77. Afterward, Networks did its part by issuing a suitably tailored RFP, excluding SLI
from bidding. Tender no. 789546 appears to have been little more than a vehicle for corrupt
Avangrid insiders to remove hardware and software from its original tender, refine the tender
using SLI’s expertise, and to serve it up to their favored vendors. To change a multi-million dollar
public RFP several times – as Networks eventually did -- required tremendous awareness and
18
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 19 of 72
access control of the procurement system, and could not have been achieved without the active
78. Understandably, SLI voiced alarm over Viewpoint’s having been solicited to bid
on an RFP from which SLI had been excluded, one plainly based on hardware, software, and
professional services specifications contained in SLI’s bid for the Original ICT Engineering RFP
– bid information that SLI had shared with Cipher pursuant to the NDA under the erroneous
expectation that it would be kept confidential, and would not be misappropriated and exploited for
79. SLI decided to walk away in or around September 2019 and to cease negotiations
with Prosegur and its subsidiaries. Notwithstanding that Networks had excluded SLI from bidding
on what appeared to be a tailored RFP derived from SLI’s own specifications, SLI still held out
hope that it could be awarded the still-pending Original ICT Engineering RFP – or what was left
The Wrongdoing
Grows More Brazen
80. There were additional signs of Avangrid’s steering bids and playing favorites with
vendors. It was not uncommon for vendors to spend significant time in Avangrid’s executive
suites, among them, UTI executive Charlie Von Stetten. It became clear that, beginning in or
around September 2018 and continuing through 2019, Avangrid executive Lathrop worked in
81. Lathrop would habitually leave vendors’ bids open on his desk. On various
occasions during that period, Silva witnessed Von Stetten whispering to Lathrop, after which
Lathrop would leave his office. During Lathrop’s absence, Von Stetten would take notes on the
19
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 20 of 72
82. Silva was understandably concerned about witnessing what appeared, at best, to be
plain disregard for the confidential nature of bids, and at worst, a flagrant attempt to hand a
competitive advantage to UTI. When Silva brought up with Lathrop his cavalier treatment of
sensitive documents, and more specifically, his failure to safeguard confidential bid information,
83. Lathrop’s efforts to give improper advantage to UTI was at least partly explained
by a quid pro quo. Lathrop, approaching retirement from Avangrid, was seeking a post-retirement
sinecure with an Avangrid vendor, and initially asked Silva for a position with SLI. Silva thought
the request inappropriate and a possible conflict of interest, and rebuffed Lathrop.
84. UTI did not feel similarly constrained by conflict of interest principles, and offered
Lathrop the post-Avangrid engagement that he had sought and that SLI had denied him. Before
14, 2019 and December 2019, Lathrop authorized a purchase order styled “ICT7” for
approximately $15 million in “ICT Additional Services.” By February 2020, Lathrop had retired
from Avangrid, and assumed the position of Vice President of Utilities at UTI.
85. Perhaps most critically, Lathrop facilitated the steering of procurements to UTI by
providing it with a copy of SLI’s IroncladTM Runbook, a flagrant breach of the EULA governing
Avangrid’s use of the IroncladTM technology it had licensed. Without the IroncladTM Runbook,
Lathrop would not have known what to requisition, and UTI would not have known what to
procure.
86. Finally – whether in retaliation against Silva or for some other reason, on or about
July 8, 2019, Lathrop provided Defendant Victorero a copy of SLI’s IroncladTM Runbook – another
20
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 21 of 72
87. Avangrid’s bid-rigging had never been confined to steering contracts to Prosegur
subsidiaries and UTI. On or around December 2018, Avangrid gave SLI the opportunity to bid on
a $45 million Design and Engineering Services project (the “AMI-OTN SOW”). Avangrid
executive Tom Fitzgerald told Silva that SLI’s competition was Defendant B&V. SLI prepared
88. SLI would later learn that Fitzgerald was appalled by B&V’s significant delays, the
lack of detail in its bid, and its lack of familiarity with the technical aspects of the contemplated
service delivery. Nonetheless, Avangrid wanted B&V awarded the contract. To Silva’s disbelief,
two Avangrid executives – Defendants David Lathrop and John Allen – demanded that Silva share
the contents of SLI’s bid with B&V. They likewise demanded that SLI not seek the outright award
89. Silva initially refused to share SLI’s bid information with B&V, but was told by
the Avangrid executives that failure to share the contents of SLI’s bid would ruin SLI’s chances
of being awarded the lucrative Original ICT Engineering RFP. In the teeth of that threat, Silva
relented, and shared SLI’s bid with B&V on April 3, 2019. SLI would later learn that B&V – well
aware that it was using trade secrets extorted from SLI – used the specifications contained in SLI’s
bid in order to improve the B&V bid, and that B&V was ultimately awarded this lucrative, sole-
90. B&V hardly stopped there. In or about the Fall of 2019, Bill Bernoe, a B&V
executive, unsuccessfully attempted to obtain a copy of the IroncladTM Runbook through artifice,
by misleadingly suggesting to one of Silva’s assistants that he was authorized to possess and use
it. Suspicious, Silva’s assistant refused, and reported the incident to Silva.
21
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 22 of 72
91. The manipulation of the bidding process continued. Prosegur wanted to revive its
earlier collaboration with SLI, and Cipher’s CEO, Defendant Boucas, had intimated on several
occasions that the only way SLI would ever be awarded any of the remaining ICT Engineering
contract would be through a partnership with Cipher because of its parent Prosegur’s strong
connections with Iberdrola’s Chairman, Jose Ignacio Sanchez Galan, and Global Head of Security,
Antonio Asenjo Martin, and Prosegur’s connections in Avangrid’s security department. Defendant
Rolim, Cipher’s CFO, told Silva “We are so tight that we monitor the Chairman’s emails to protect
information pertaining to the Original ICT Engineering RFP and to an additional, unreleased
Avangrid project – RFP No. 792241 – and again suggested that SLI would need to partner with
Prosegur subsidiary Cipher as a condition of doing business with Avangrid, and of being
93. Soon, the suggestions turned into threats. In a text message of the same day, Boucas
stated “Paulo, I have some new relevant information about the RFP that will be important to your
decision making but if I don’t hear from you soon we will have to communicate to Avangrid that
94. When Silva called back, the threats became more animated. Boucas told him, in
substance, “you cannot just walk away now, you still have ICT Engineering worth $50MM! You
are a small business, think about it . . . it is better than nothing! You now know we are connected
to Avangrid. Here is what I can offer, 15% on hardware which was your original mark-up anyway.
22
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 23 of 72
95. Concluding it had no other options, on or about October 10, 2019, SLI reluctantly
entered into an MOU with Cipher (the “MOU”). Under it, SLI would forgo a full 60% of its
expected profits in order to perform the services contemplated under the Original ICT Engineering
RFP worth $50MM, even though neither Cipher nor Prosegur had the know-how to deliver the
Phase II services. A copy of the executed MOU was shared with Avangrid’s Procurement
Original ICT Engineering RFP. On or about November 13, 2019, Avangrid released the tender to
which Prosegur executive Boucas had earlier alluded – RFP no. 792441 – which was limited to
information communications technology (“ICT”) services only. The hardware and professional
services components had earlier been removed from the Original ICT Engineering RFP and
97. RFP no. 792241 sought bids for a contract worth approximately $49 million, rather
than the roughly $134 million in services and equipment contemplated by the Original ICT
98. Avangrid’s bid-rigging then grew even more brazen. To SLI’s surprise, it received
a third tender – RFP No. 795776 – on February 3, 2020, after having gone through the “Best And
Final Offer” stage multiple times with respect to all of the previous RFPs. Avangrid sought an
unusually fast turn-around of four days. Silva, when preparing a bid on SLI’s behalf, realized that
ICT Engineering Tender 795776 sought proposals for services that had been the subject of
previous tenders issued after the submission of best and final offers.
99. Because it was irregular for an RFP to be reissued several times after the receipt of
best and final offers, Silva contacted Tamara Jones-Smith at Networks, and learned that RFP
23
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 24 of 72
Tender 792241 had in fact been reissued as RFP No. 795776, and later found out that Prosegur
subsidiary Viewpoint had been invited to bid against SLI even though Avangrid’s procurement
department had received a legal and written notification that Prosegur s subsidiary Cipher had
officially partnered with SLI pursuant to the MOU. This, in combination with Avangrid’s having
sought an unusually fast turn-around of four days, led Silva to conclude that Iberdrola and
Avangrid, once again, were engineering the delivery of a contract to a favored Prosegur company.
100. Knowing that Prosegur and its recently acquired subsidiaries in the U.S. had an
inside track with Avangrid and Iberdrola regarding the RFP award process – and hoping to claim
at least a portion of the work it had earlier bid on – SLI, honoring the MOU, shared its bid materials
for RFP no. 795776 with Cipher on or about February 7th, 2020, the same day bids were due.
Defendant Rolim, Cipher’s CFO, requested a meeting with Silva on that same date.
101. During the meeting, Rolim formally disclosed that Cipher affiliate (and Prosegur
subsidiary) Viewpoint had also been invited to bid on RFP tender no. 795776, and pointedly
suggested that SLI abandon its attempt to become prime contractor by allowing a Prosegur
subsidiary to bid lower on the ICT Engineering Contract, and that SLI forgo the control and profits
that would have come with the prime contractor designation. Not bothering to conceal Prosegur’s
insider status, Rolim proposed that SLI agree to be a subcontractor on Viewpoint’s bid for RFP
No. 795776, which Viewpoint would submit using the SLI bid pricing and information SLI had
provided Cipher pursuant to the MOU. In a separate phone conversation, Rolim made clear to
Silva that if he did not accede to Rolim’s request, SLI would forfeit the prospect of being awarded
the contract.
102. SLI refused to assume a subcontractor role, and objected to any further use if its
24
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 25 of 72
point, however, with the assistance of the Utilities Defendants, Prosegur entities had managed to
capture, through improper means, substantial amounts of business that SLI had hoped to win
legitimately.
103. In conducting the Bid-Rigging Scheme, the Utilities Defendants abandoned any
pretext of conducting a fair procurement process, flouting their own internal guidelines, as well as
rate-cases. The Utilities Defendants not only openly favored SLI’s competitors; they awarded those
competitors contracts on the basis of bids restyled to incorporate SLI’s trade secrets, to lend the
inferior bids a veneer of legitimacy, to give the appearance of a normal bidding process, and to
104. SLI became an Avangrid approved vendor for the purposes of the Phase II work.
Consistent with the Utilities Defendants’ requirements, SLI obtained letters of credit and
insurance, and began to hire staff in anticipation of performing the roll out of its own technology
in respect of the Phase II work. At all times during the relevant period, SLI stood ready to perform
the work, was capable of performing the work, and was the most qualified vendor to perform the
work.
105. But for the Bid-Rigging Scheme, and the resulting subversion of the bidding
process, SLI would have been awarded millions of dollars in lucrative business wrongly steered to
SLI’s competitors.
106. The Bid-Rigging Scheme surely injured SLI and enriched its competitors. But in
time, it became obvious why the Utilities Defendants were engaging vendors ill-suited for the
25
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 26 of 72
contracts they received, and sole-sourcing unnecessary procurements at premium prices through
those vendors.
107. In light of the regulatory rate structure governing public utilities, the Utilities
Defendants saw the inflation of capital expenses as a dependable basis for ensuring short term
legitimate CAPEX provided Avangrid with a pretext for seeking rate increases to which they were
not otherwise entitled, along with depreciation benefits they did not deserve.
109. Given the ability to goose their own profits by channeling funds into capital
to the benefit of rate-paying consumers in any way – the Utilities Defendants sought to find any
possible means of contriving, and inflating, CAPEX. Instead of making prudent and reasonable
investments intended to upgrade infrastructure and benefit rate-paying customers, the Utilities
Defendants, putting shareholder value ahead of any other concerns, sought to exploit the
110. The Utilities Defendants conceived of the Bid-Rigging Scheme to achieve just
those goals. But to implement the Bid-Rigging Scheme, the Utilities Defendants needed pliant
111. SLI, having itself designed the ASD and created the IroncladTM technology, would
have been the obvious contractor for the Utilities Defendants to choose to procure necessary
equipment and support services. But the Utilities Defendants knew that SLI would not assist them
26
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 27 of 72
112. SLI only recommended procurements that were necessary to maintaining the ASD
it had spearheaded, and to ensuring the continuing efficacy of the IroncladTM technology around
which the ASD was designed. In fact, SLI had communicated concerns regarding purchases of
PIVOT3 equipment in the fourth quarter of 2018 that were excessive and unjustified because not
enough personnel were made available to adequately implement these products, resulting in waste
as products began to experience lifecycle depreciation or obsolescence without ever being fully
utilized.
113. Yet more inconveniently – and as well-known both to the Utilities Defendants and
the Vendor Defendants – SLI made procurements on a straightforward, open book contract basis,
with a fixed margin of 15%, providing no ready channel for the CAPEX inflation the Utilities
Defendants sought. The Utilities Defendants thus turned to the Vendor Defendants, contractors
that were wholly aware that the Utilities Defendants wanted to inflate CAPEX, and were happy to
114. To accommodate the Utilities Defendants (and to enrich themselves), the Vendor
“CAPEX Premiums”) that they presented on non-standard and poorly documented invoices. The
Vendor Defendants did not purport to supply any additional value or to otherwise provide any
meaningful basis for charging the CAPEX Premiums to the Utilities Defendants. Indeed, the
Vendor Defendants lacked meaningful technical familiarity with IroncladTM and the ASD – whose
architecture and operation should have been the only variables informing procurement decisions.
115. But the Vendor Defendants stood to profit greatly from Avangrid’s seemingly
limitless appetite for making capital expenditures and had little reason to serve as a check against
27
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 28 of 72
overequipping and overbuilding, making them ideal partners in the Bid-Rigging Scheme in the
absence of a Design and Engineering firm and the lack of any meaningful procurement oversight.
116. The Bid-Rigging Scheme achieved its central goal. That much is clear from
Avangrid’s own 10-K filings, which demonstrate that Avangrid increased its CAPEX from $1.777
billion in 2018 to $2.735 billion in 2019, an increase of nearly one billion dollars.
117. The procurements resulting from the Bid-Rigging Scheme were never designed to
benefit rate-payers. More remarkably, the Utilities Defendants did not even purport to advance a
pretext for the legitimacy of the cynical and profligate purchases they made.
118. The primacy of inflating CAPEX was revealed, inter alia, by the award of contracts
to Vendor Defendants for work well outside of the service categories in which they were
119. Defendant B&V is a civil engineering firm that would normally be engaged for
services falling within the Civil Engineering and Construction Service Category. Mystifyingly,
B&V was awarded a primary contract to assume responsibility for Program Management in the
120. Likewise, Defendant UTI is a company that primarily installs and maintains video
cameras to monitor large facilities. It has no particular expertise, much less experience, in
designing or building private cloud data centers or in cloud systems integration. Yet throughout
2018 and 2019, Avangrid authorized UTI to hire over thirty full-time equivalent contractors to
provide Design and Engineering Services with respect to such data centers.
28
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 29 of 72
121. UTI was also selected by Avangrid to provide both Systems Integrations and
Design & Engineering services, and tasked with building a critical facility – the core ICT Disaster
Recovery Site, a complicated undertaking for which UTI was self-evidently unsuited.
122. For its part, Prosegur is a physical security company that would normally engage
in the installation of video cameras, and provide physical security and monitoring services. It has
neither particular expertise in hardware and software sourcing nor in Design and Engineering
Services. Yet Prosegur entities were repeatedly chosen to bid on contracts requiring largescale
hardware acquisitions they were self-evidently unqualified to undertake and were awarded
123. The Utilities Defendants knowingly collaborated with the Vendor Defendants to
procure a mountain of radically overpriced hardware – including scores of routers and multiplexing
units that, curiously, they took pains to unpack and install in racks – as if to vaguely suggest that
they were configured and operational. Yet those units were never put into service, are quickly
124. Yet more cynically, the Utilities Defendants actually paid to have structures erected
to house the dust-gathering hardware that lacked any discernable purpose (apart from serving as a
125. The Utilities Defendants acquired tens of millions of dollars of overpriced and/or
connection with the design and implementation of the ASD. The equipment purchases were
invariably sole source to UTI, at premium prices. The same equipment, however, could have
been purchased directly from SLI using SLI’s straight pass-through 15% open book contract
29
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 30 of 72
126. To accommodate the profligate spending, UTI has expanded its warehouse three
times in the past 3-4 years, all to store tens of millions of dollars in hardware equipment
principles that would have otherwise prevented waste. As a result, the warehouse contains
equipment that has been in storage for years, remains unused, and is depreciating daily.
127. In the fourth quarter of 2018 and the first quarter of 2019, Avangrid engaged UTI
and Nokia to procure tens of millions of dollars in Nokia Dense Wavelength Division
Multiplexing (DWDM) equipment at premium prices, and with no competition. Much of the
equipment remained as of January 2021 in storage in UTI warehouses in Maine and New York.
128. Likewise, at the Utilities Defendants’ behest, during the fourth quarters of 2018
and 2019, UTI procured Nokia, CISCO, and PIVOT3 equipment in wildly excessive quantity,
resulting in warehoused equipment far out alignment with any technical justification. Similarly
(and again, through UTI) the Utilities Defendants purchased excessive amounts of data storage,
all at premium prices, with a two-year half-life that all but ensured that the storage would never
be utilized.
129. In 2017 and 2018, the Utilities Defendants paid for a variety of unnecessary
software systems at premium prices. The Utilities Defendants later paid for the renewal of the
licenses, despite the fact that the systems were never fully configured or put into service.
130. Likewise, in the first quarter of 2019, the Utilities Defendants awarded Defendant
B&V a $34 million sole-source contract in connection with the AMI-OTN data center convergence
project. Personnel were hired directly through B&V to support a $1.5 billion automated metering
infrastructure initiative. B&V billed (and the Utilities Defendants paid) for contractors at premium
30
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 31 of 72
procurement of PIVOT3 equipment. In 2018, Avangrid paid Defendant UTI $37,323 per unit
for PIVOT3 HyperV Devices. A comparison of SKU numbers reveals that, in 2019, Avangrid
paid UTI an astonishing $124,245.33 per unit for substantially identical HyperV Devices, with
a minor upgrade that should only have justified a minor price increase.
132. The Bid-Rigging Scheme resulted in bloated, questionable capital investments with
no seeming relation to actual infrastructural needs. While the Bid-Rigging Scheme enriched the
Utilities Defendants and the Vendor Defendants, it also injured rate-paying consumers, who ought
to have enjoyed the lower costs that competitive bidding and non-contrived infrastructure would
have afforded them. It likewise injured competitors, especially SLI, which was denied, and thus
unable to profit from, contracts that its qualifications would otherwise have entitled it to win.
133. Finally, because many of the bloated expenditures were made in connection with
the Avangrid Secure Domain and OSG-Telecom, they had an additional, pernicious effect:
providing industry with the erroneous impression that employing IroncladTM technology was
inefficient and costly, thereby diminishing the perceived value of one of SLI’s principal assets,
* * *
134. As with other corporate strategy, the Bid-Rigging Scheme was established by
Avangrid’s parent, Iberdrola – and more specifically, by Defendant Asenjo Martin and his
lieutenant, Defendant Victoreo, both of whom oversaw corporate security in general, and directly
managed the Corporate Security Departments at both Avangrid and Networks. Asenjo Martin was
indicted in Spain and Victorero put under investigation by the Spanish high Courts for corporate
31
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 32 of 72
espionage and procurement fraud. It is hardly a surprise that Defendants Asenjo Martin and
135. Defendants Asenjo Martin and Victoreo exercised complete control and oversight
of the very Corporate Security Departments making the profligate purchases permitted by the
craven manipulation of Avangrid’s bidding process. The Bid-Rigging Scheme could not have
taken place, and did not take place, without the blessing, if not the imprimatur, of Asenjo Martin
and Victoreo.
136. SLI repeats and realleges, as if fully set forth hereto, the allegations contained in
137. At all times during the Relevant Period, Networks was an “enterprise” within the
meaning of 18 U.S.C. §§ 1961(4) and 1962(c) that was engaged in, or the activities of which
138. At all times during the Relevant Period, Networks purported to maintain procedures
necessary to protect the integrity of Avangrid’s procurement process, and to ensure that potential
contractors and service providers be selected on the basis of a fair and impartial evaluation of the
technical merit of their proposals. These procedures required bidders seeking the award of
procurement contracts to provide proposals including information sufficient in scope and detail to
32
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 33 of 72
demonstrate whether the bidder had the necessary capability, experience, knowledge, expertise
139. At all relevant times, Defendants Iberdrola, Avangrid, Lathrop and Allen (the
“Networks Control Defendants”), and Defendants Prosegur, Cipher, B&V, Boucas, and Rolim (the
“Networks Vendor Defendants,” and collectively with the Networks Control Defendants, the
“Networks Enterprise Defendants”) were associated with Networks through their participation in
and their direct and/or indirect control over the affairs of Networks, including, without limitation,
the issuance of RFPs by Networks, and the resulting award of procurement contracts to bidders
140. The means by which the Networks Enterprise Defendants exercised influence and
control over, and participated in, the affairs of Networks included, but were not limited to, (i) the
procurement by the Networks Control Defendants of SLI’s proprietary bidding information; (ii)
the unauthorized use by the Networks Control Defendants of SLI’s proprietary bidding
information in order to refine their RFPs and to convey to the Network Vendor Defendants and
other of SLI’s competitors how they should style proposals submitted in response to such RFPs;
(iii) the misappropriation, by extortion or theft, by the Networks Vendor Defendants of SLI’s
business secrets; (iv) the wrongful and unauthorized use by the Networks Vendor Defendants of
SLI’s trade secrets in the preparation of bids to be submitted by or on behalf of the Networks
Vendor Defendants under the false pretense that such proposals were prepared based upon the
capability experience, knowledge, and expertise of the Networks Vendor Defendants; and (v) the
award, by the Networks Control Defendants of contracts in response to bids from the Network
Vendor Defendants and other of SLI’s competitors that the Networks Control Defendants knew
33
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 34 of 72
141. The Networks Enterprise Defendants influenced, participated and controlled the
affairs of Networks through a pattern of racketeering activity within the meaning of 18 U.S.C. §§
1961(1) and (5), and 1962(c). The conduct and acts of the Networks Enterprise Defendants are
related to each other as parts of a common or shared purpose, intent and economic motive, namely,
to violate and circumvent the legitimate, authorized bidding procedures of Networks in order to
control the award of procurement contracts for the respective financial benefit (i) of the Networks
Vendor Defendants, through their receipt of lucrative services and procurement contracts, and (ii)
142. The pattern of racketeering activity of the Networks Enterprise Defendants during
the Relevant Period consisted, inter alia, of acts chargeable under New York law and punishable
by imprisonment under such law for more than one year and which fall within the scope of 18
143. Such chargeable acts included larceny by extortion, as proscribed, inter alia, by
New York Penal Law § 155.05(2)(e), in that certain of the Networks Enterprise Defendants, with
intent to appropriate the property of SLI to a third party, wrongfully induced SLI to deliver the
property to that third-party by instilling a fear in SLI that, failing the delivery of such property,
144. Individual chargeable acts under New York Penal Law § 155.05(2)(e) include, inter
vi) With the intent to wrongfully appropriate SLI’s property to a third person,
Defendants Lathrop and Allen compelled or induced SLI, inter alia, to
provide Defendant B&V with SLI’s bid information for the AMI-OTN-
SOW as a condition of obtaining any of the AMI-OTN-SOW work to which
SLI otherwise would have been entitled on the basis of its proposal.
vii) With the intent to wrongfully appropriate SLI’s property to a third person,
Defendant Boucas compelled or induced SLI, inter alia, to share its
34
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 35 of 72
145. The pattern of racketeering activity of the Networks Enterprise Defendants also
included numerous acts perpetrated during the Relevant Period that are indictable under 18 U.S.C.
§ 1951 (relating to interference with commerce by threats or violence) and which fall within the
scope of 18 U.S.C. §§ 1961(1)(B) and (5), in that certain of the Networks Enterprise Defendants,
through the wrongful use of fear of economic loss, induced or attempted to induce, or conspired
to induce or to attempt to induce SLI, with its consent, to part with property in such a way as to
146. SLI’s trade secrets relate to services used in and intended for use in interstate
commerce.
147. Individual indictable acts under 18 U.S.C. § 1951 include, inter alia, the following:
ii) By wrongfully causing SLI to fear that it would otherwise be barred from
obtaining any of any of the Original ICT Engineering RFP work to which it
would have been entitled on the basis of its proposals, Defendant Boucas
induced SLI, with its consent, to share its business secrets with Prosegur
subsidiary Cipher.
iii) By wrongfully causing SLI to fear that it would otherwise be barred from
obtaining any of any of the Original ICT Engineering RFP work to which it
would have been entitled on the basis of its proposals, Defendant Prosegur
conspired with Defendant Boucas to induce SLI, with its consent, to share
its business secrets with Prosegur subsidiary Cipher.
iv) By wrongfully causing SLI to fear that it would otherwise be barred from
obtaining any of any of the work contemplated by RFP No. 795776,
Defendant Rolim attempted to induce SLI, with its consent, to withdraw its
35
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 36 of 72
bid for that work, and to agree to serve as Defendant PSM’s sub-contractor
in connection with that work.
148. The pattern of racketeering activity of the Networks Enterprise Defendants likewise
included numerous acts perpetrated during the Relevant Period that are indictable under 18 U.S.C.
§ 1832 (relating to theft of trade secrets) and which fall within the scope of 18 U.S.C. §§
1961(1)(B) and (5), in that certain of the Networks Enterprise Defendants, with intent to convert a
trade secret related to a service produced for interstate commerce, to the economic benefit of
anyone other than the trade secret’s owner, and knowing that the offense will injure the trade
or received or possessed that information, knowing it to have been obtained without authorization.
149. SLI’s trade secrets relate to services used in and produced for use in interstate
commerce.
150. Individual indictable acts under 18 U.S.C. § 1832 include, inter alia, the following:
ii) Defendant Victorero, with intent to convert a trade secret to the economic
benefit of himself and Iberdrola, and knowing that such conversion would
injure SLI, knowingly received a copy of the IroncladTM Runbook, knowing
the same to have been obtained without authorization.
iii) Defendant Lathrop, with intent to convert a trade secret to the economic
benefit of Defendant UTI, and knowing that such conversion would injure
36
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 37 of 72
iv) Defendant UTI, with intent to convert a trade secret to the economic benefit
of itself, and knowing that such conversion would injure SLI, knowingly
received a copy of the IroncladTM Runbook, knowing the same to have been
obtained without authorization.
v) Defendants Rolim and Cipher, with intent to convert a trade secret to the
economic benefit of Defendants Cipher, PSM and Prosegur, and knowing
that such conversion would injure SLI, knowingly replicated without
authorization SLI’s trade secrets and placed them on the Prosegur
Dashboard.
vi) Defendants Cipher, PSM and Prosegur, with intent to convert a trade secret
to the economic benefit of themselves, and knowing that such conversion
would injure SLI, knowingly possessed SLI’s trade secrets by incorporating
them into the Prosegur Dashboard, knowing them to have been obtained
without authorization.
vii) Defendant B&V, with intent to convert a trade secret to the economic
benefit of itself, and knowing that such conversion would injure SLI,
knowingly replicated without authorization SLI’s trade secrets and
incorporated them into its bid for the OTN-AMI-SOW.
viii) Defendant B&V, with intent to convert a trade secret to the economic
benefit of itself, and knowing that such conversion would injure SLI,
knowingly attempted to appropriate a copy of the IroncladTM Runbook by
deception and artifice.
ix) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
bid submission templates, and other trade secrets SLI supplied on or about
December 11, 2018 in its bid made in response to the OTN-AMI-SOW.
37
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 38 of 72
xi) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
bid submission templates, and other trade secrets SLI supplied on or about
March 18, 2019 in its bid in response to RFP Tender No. 776388.
xii) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
bid submission templates, and other trade secrets SLI supplied on or about
April 30, 2019 in its BAFO in response to RFP Tender No. 776388.
xiii) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
bid submission templates, and other trade secrets SLI supplied on or about
October 3, 2019 in its bid in response to RFP Tender No. 789546.
xiv) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
bid submission templates, and other trade secrets SLI supplied on or about
November 12, 2019 in its bid in response to RFP Tender No. 792241.
xv) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
bid submission templates, and other trade secrets SLI supplied on or about
November 13, 2019 in its BAFO in response to RFP Tender No. 792241.
xvi) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
38
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 39 of 72
bid submission templates, and other trade secrets SLI supplied on or about
February 7, 2020 in its BAFO in response to RFP Tender No. 795776.
xvii) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
bid submission templates, and other trade secrets SLI supplied on or about
April 6, 2020 in its bid in response to RFP Tender No. 798582.
xviii) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
bid submission templates, and other trade secrets SLI supplied on or about
April 8, 2020 in its BAFO in response to RFP Tender No. 798582.
additionally included numerous acts perpetrated during the Relevant Period which are indictable
under 18 U.S.C. § 1343 (relating to wire fraud) and which fall within the scope of 18 U.S.C. §§
1961(1)(B) and (5), in that certain of Networks Enterprise Defendants, intending to obtain property
152. Defendants Iberdrola and Avangrid caused Defendant Networks to use interstate
wires to issue RFPs to, inter alia, SLI, with no intention of considering the award of the contracts
to SLI. Defendants Iberdrola and Avangrid did not intend the RFPs to serve as a vehicle for
assessing SLI’s qualifications for the award of each relevant contract to SLI, but rather, as a
fraudulent solicitation intended to elicit and misappropriate the trade secrets of SLI as a means of
aiding SLI’s competitors, of enriching themselves through the CAPEX that those competitors
would provide, and of aiding in the furtherance and/or concealment of the Network Enterprise
39
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 40 of 72
Defendants’ scheme to interfere with the legitimate procedures of Networks for the award of
contracts.
153. Individual indictable acts under 18 U.S.C. § 1343 include, inter alia, the following:
154. The conduct of the scheme to rig the bidding of Avangrid’s procurement contracts
through a pattern of racketeering activity (the “Networks Enterprise Scheme”) was continuous.
The Networks Enterprise Scheme took place between 2018 and 2020, involved multiple acts of
theft, extortion and fraud, was directed at numerous procurement contracts, and caused numerous
155. By means of the foregoing violations of RICO, Plaintiff was injured in its business
40
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 41 of 72
156. SLI repeats and realleges, as if fully set forth hereto, the allegations contained in
157. Defendants Iberdrola, Avangrid, Prosegur, Cipher, PSM, UTI, B&V, Lathrop
Victorero, Asenjo Martin, Allen, Boucas, Rolim, Fitzgerald and Reilly (the “Networks Enterprise
158. At all relevant times, the Networks Enterprise Conspirators agreed and conspired
to participate, directly and indirectly, in the conduct of Networks through a pattern of racketeering
series of overt acts in furtherance of the conspiracy alleged herein and to effect the objectives of
the Networks Enterprise Scheme, each member Defendant knowing the general nature of the
conspiracy and that the conspiracy extended beyond that Defendant’s role.
160. By means of the foregoing violations of RICO, SLI was injured in its business and
161. SLI repeats and realleges, as if fully set forth hereto, the allegations contained in
41
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 42 of 72
162. At all relevant times, Defendants Iberdrola and Avangrid, Lathrop and Allen (the
“Control Defendants”), and Defendants Prosegur, Cipher, B&V, Boucas and Rolim (the “Vendor
Defendants,” and collectively with the Control Defendants, the “Core Enterprise Defendants”)
were associated with each other to form an association-in-fact which was an “enterprise” (the “Bid-
Rigging Enterprise”) within the meaning of 18 U.S.C. §§ 1961(4) and 1962(c), and which was
163. The Bid-Rigging Enterprise continued as a unit with a core of the same membership
164. At all relevant times, the Core Enterprise Defendants participated in the conduct of
the Bid-Rigging Enterprise through a pattern of racketeering activity within the meaning of 18
165. At all times during the Relevant Period, Networks purported to maintain procedures
necessary to protect the integrity of Avangrid’s procurement process, and to ensure that potential
contractors and service providers be selected on the basis of a fair and impartial evaluation of the
technical merit of their proposals. These procedures required bidders seeking the award of
procurement contracts to provide proposals including information sufficient in scope and detail to
demonstrate whether the bidder had the necessary capability, experience, knowledge, expertise
166. The conduct and acts of the Core Enterprise Defendants are related to each other as
parts of a common or shared purpose, intent and economic motive, namely, to violate and
circumvent the legitimate, authorized bidding procedures that Networks undertook on behalf of
Avangrid, in order to control the award of procurement contracts for the respective financial
42
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 43 of 72
benefit of the Core Enterprise Defendants. The financial interests of the Bid-Rigging Enterprise
were served by the misappropriation of the trade secrets of SLI to facilitate the diversion of awards
from SLI to other bidders, and to provide financial benefits to (i) the Vendor Defendants and other
of SLI’s competitors, through the grant of lucrative services and procurement contracts they would
not have otherwise been awarded, and (ii) to Iberdrola and Avangrid, by providing them access to
167. The illicit assistance provided by the Core Enterprise Defendants included, inter
alia, (i) the procurement by the Control Defendants of SLI’s proprietary bidding information; (ii)
the unauthorized use by the Control Defendants of SLI’s proprietary bidding information in order
to refine their RFPs and to convey to the Vendor Defendants and other of SLI’s competitors how
they should style proposals submitted in response to such RFPs; (iii) the misappropriation, by
extortion or theft, by the Vendor Defendants of SLI’s business secrets; (iv) the wrongful and
unauthorized use of by the Vendor Defendants of SLI’s trade secrets in the preparation of bids to
be submitted by or on behalf of the Vendor Defendants under the false pretense that such proposals
were prepared based upon the capability experience, knowledge and expertise of the Vendor
Defendants; and (v) the award, by the Control Defendants of contracts in response to bids from
the Vendor Defendants and other of SLI’s competitors that the Control Defendants knew were
168. The pattern of racketeering activity of the Core Enterprise Defendants during the
Relevant Period consisted, inter alia, of acts chargeable under New York law and punishable by
imprisonment under such law for more than one year and which fall within the scope of 18 U.S.C.
43
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 44 of 72
169. Such chargeable acts included larceny by extortion, as proscribed, inter alia, by
New York Penal Law § 155.05(2)(e), in that certain of the Core Enterprise Defendants, with intent
to appropriate the property of SLI to a third party, wrongfully induced SLI to deliver the property
to that third-party by instilling a fear in SLI that, failing the delivery of such property, they or
170. Individual chargeable acts under New York Penal Law § 155.05(2)(e) include, inter
ii) With the intent to wrongfully appropriate SLI’s property to a third person,
Defendant Boucas compelled or induced SLI, inter alia, to share its
business secrets with Prosegur subsidiary Cipher as a condition of obtaining
any of the Original ICT Engineering RFP work to which SLI otherwise
would have been entitled on the basis of its proposal.
171. The pattern of racketeering activity of the Core Enterprise Defendants also included
numerous acts perpetrated during the Relevant Period that are indictable under 18 U.S.C. § 1951
(relating to interference with commerce by threats or violence) and which fall within the scope of
18 U.S.C. §§ 1961(1)(B) and (5), in that certain of the Core Enterprise Defendants, through the
wrongful use of fear of economic loss, induced or attempted to induce, or conspired to induce or
to attempt to induce SLI, with its consent, to part with property in such a way as to adversely affect
interstate commerce.
172. SLI’s trade secrets relate to services used in and intended for use in interstate
commerce.
173. Individual indictable acts under 18 U.S.C. § 1951 include, inter alia, the following:
44
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 45 of 72
ii) By wrongfully causing SLI to fear that it would otherwise be barred from
obtaining any of any of the Original ICT Engineering RFP work to which it
would have been entitled on the basis of its proposals, Defendant Boucas
induced SLI, with its consent, to share its business secrets with Prosegur
subsidiary Cipher.
iii) By wrongfully causing SLI to fear that it would otherwise be barred from
obtaining any of any of the Original ICT Engineering RFP work to which it
would have been entitled on the basis of its proposals, Defendant Prosegur
conspired with Defendant Boucas to induce SLI, with its consent, to share
its business secrets with Prosegur subsidiary Cipher.
iv) By wrongfully causing SLI to fear that it would otherwise be barred from
obtaining any of any of the work contemplated by RFP No. 795776,
Defendant Rolim attempted to induce SLI, with its consent, to withdraw its
bid for that work, and to agree to serve as Defendant PSM’s sub-contractor
in connection with that work.
174. The pattern of racketeering activity of the Core Enterprise Defendants likewise
included numerous acts perpetrated during the Relevant Period that are indictable under 18 U.S.C.
§ 1832 (relating to theft of trade secrets) and which fall within the scope of 18 U.S.C. §§
1961(1)(B) and (5), in that certain of the Core Enterprise Defendants, with intent to convert a trade
secret related to a service produced for interstate commerce, to the economic benefit of anyone
other than the trade secret’s owner, and knowing that the offense will injure the trade secret’s
owner, knowingly and without authorization delivered, transmitted, replicated or conveyed that
45
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 46 of 72
175. SLI’s trade secrets relate to services used in and produced for use in interstate
commerce.
176. Individual indictable acts under 18 U.S.C. § 1832 include, inter alia, the following:
ii) Defendant Victorero, with intent to convert a trade secret to the economic
benefit of himself and Iberdrola, and knowing that such conversion would
injure SLI, knowingly received a copy of the IroncladTM Runbook, knowing
the same to have been obtained without authorization.
iii) Defendant Lathrop, with intent to convert a trade secret to the economic
benefit of Defendant UTI, and knowing that such conversion would injure
SLI, knowingly caused to be copied, and delivered and/or transmitted
without authorization a copy of the IroncladTM Runbook to Defendant UTI.
iv) Defendant UTI, with intent to convert a trade secret to the economic benefit
of itself, and knowing that such conversion would injure SLI, knowingly
received a copy of the IroncladTM Runbook, knowing the same to have been
obtained without authorization.
v) Defendants Rolim and Cipher, with intent to convert a trade secret to the
economic benefit of Defendants Cipher, PSM and Prosegur, and knowing
that such conversion would injure SLI, knowingly replicated without
authorization SLI’s trade secrets and placed them on the Prosegur
Dashboard.
vi) Defendants Cipher, PSM and Prosegur, with intent to convert a trade secret
to the economic benefit of themselves, and knowing that such conversion
would injure SLI, knowingly possessed SLI’s trade secrets by incorporating
them into the Prosegur Dashboard, knowing them to have been obtained
without authorization.
vii) Defendant B&V, with intent to convert a trade secret to the economic
benefit of itself, and knowing that such conversion would injure SLI,
46
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 47 of 72
viii) Defendant B&V, with intent to convert a trade secret to the economic
benefit of itself, and knowing that such conversion would injure SLI,
knowingly attempted to appropriate a copy of the IroncladTM Runbook by
deception and artifice.
ix) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
bid submission templates, and other trade secrets SLI supplied on or about
December 11, 2018 in its bid made in response to the OTN-AMI-SOW.
xi) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
bid submission templates, and other trade secrets SLI supplied on or about
March 18, 2019 in its bid in response to RFP Tender No. 776388.
xii) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
bid submission templates, and other trade secrets SLI supplied on or about
April 30, 2019 in its BAFO in response to RFP Tender No. 776388.
xiii) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
47
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 48 of 72
bid submission templates, and other trade secrets SLI supplied on or about
October 3, 2019 in its bid in response to RFP Tender No. 789546.
xiv) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
bid submission templates, and other trade secrets SLI supplied on or about
November 12, 2019 in its bid in response to RFP Tender No. 792241.
xv) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
bid submission templates, and other trade secrets SLI supplied on or about
November 13, 2019 in its BAFO in response to RFP Tender No. 792241.
xvi) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
bid submission templates, and other trade secrets SLI supplied on or about
February 7, 2020 in its BAFO in response to RFP Tender No. 795776.
xvii) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
bid submission templates, and other trade secrets SLI supplied on or about
April 6, 2020 in its bid in response to RFP Tender No. 798582.
xviii) Defendants Iberdrola and Avangrid, with intent to convert a trade secret to
the economic benefit of one or more of themselves, Prosegur, Cipher, PSM,
UTI and B&V, and knowing that such conversion would injure SLI,
knowingly replicated and conveyed without authorization to one or more of
Prosegur, Cipher, PSM, UTI and B&V, inter alia, the prices, proprietary
bid submission templates, and other trade secrets SLI supplied on or about
April 8, 2020 in its BAFO in response to RFP Tender No. 798582.
177. The pattern of racketeering activity of the Core Enterprise Defendants additionally
included numerous acts perpetrated during the Relevant Period which are indictable under 18
48
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 49 of 72
U.S.C. § 1343 (relating to wire fraud) and which fall within the scope of 18 U.S.C. §§ 1961(1)(B)
and (5), in that certain of Core Enterprise Defendants, intending to obtain property by fraudulent
178. Defendants Iberdrola and Avangrid caused Defendant Networks to use interstate
wires to issue RFPs to, inter alia, SLI, with no intention of considering the award of the contracts
to SLI. Defendants Iberdrola and Avangrid did not intend the RFPs to serve as a vehicle for
assessing SLI’s qualifications for the award of any given contract, but rather, as a fraudulent
solicitation intended to elicit and misappropriate the trade secrets of SLI as a means of aiding SLI’s
competitors, of enriching themselves through the CAPEX that those competitors would provide,
and of aiding in the furtherance and/or concealment of the Core Enterprise Defendants’ scheme to
interfere with the legitimate procedures of Networks for the award of contracts.
179. Individual indictable acts under 18 U.S.C. § 1343 include, inter alia, the following:
49
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 50 of 72
180. The conduct of the Bid-Rigging Scheme was continuous, and took place between
2018 and 2020. It involved multiple acts of theft, extortion and fraud, was directed at numerous
181. By means of the foregoing violations of RICO, Plaintiff was injured in its business
182. SLI repeats and realleges, as if fully set forth hereto, the allegations contained in
184. At all relevant times, Defendants agreed and conspired to participate, directly and
indirectly, in the conduct of the Bid-Rigging Enterprise through a pattern of racketeering activity,
furtherance of the conspiracy alleged herein and to effect the objectives of the Bid- Rigging
Scheme, each member Defendant knowing the general nature of the conspiracy and that the
186. By means of the foregoing violations of RICO, SLI was injured in its business and
50
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 51 of 72
ROBINSON-PATMAN ACT
187. SLI repeats and realleges, as if fully set forth hereto, the allegations contained in
191. SLI and the Vendor Defendants are competitors in the United States market for the
supply of equipment and related services relative to the securing of power grid networks for
electric utilities.
192. The equipment sought to be supplied by SLI and the Vendor Defendants to electric
utilities, including the Utilities Defendants, constitute “goods, wares or merchandise” within the
193. The Utilities Defendants were engaged in commerce during the Relevant Period.
194. The Vendor Defendants were engaged in commerce during the Relevant Period.
196. In the course of such commerce, the Vendor Defendants and/or an agent,
representative or other intermediary acting for or in their behalf, paid or granted a commission,
brokerage or other compensation of significant value to the Utilities Defendants, and/or an agent
Premiums, which were granted directly to the Utilities Defendants and retained by the Utilities
51
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 52 of 72
Defendants for their own benefit. The commission, brokerage or other compensation was not paid
or received in exchange for services rendered in connection with the purchase or sale of goods.
198. Granting the CAPEX Premiums to the Utilities Defendants constituted a per se
199. Through their Robinson-Patman Act violations, the Vendor Defendants injured,
destroyed or prevented competition in the market for the supply of power grid network security,
and data center equipment and related services to the Utilities Defendants.
200. As a result of these violations, the Vendor Defendants caused the Utilities
Defendants to award to the Vendor Defendants lucrative contracts to which SLI would otherwise
have been entitled. Because of the Vendors’ anti-competitive conduct, SLI was injured by being
201. SLI’s injuries constituted antitrust injury resulting from the direct and reasonably
foreseeable effect of the anti-competitive and unlawful conduct of the Vendor Defendants.
202. As a result of their conduct, the Vendor Defendants are liable for SLI’s losses in an
203. Pursuant to Section 4 of the Clayton Act, 15 USC § 1, SLI is entitled to recover
three-fold its damages, plus costs and attorneys’ fees from the Vendor Defendants.
BREACH OF CONTRACT
204. SLI repeats and realleges, as if fully set forth hereto, the allegations contained in
205. The MOU, as entered into between SLI and Cipher, is a valid and binding contract.
52
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 53 of 72
206. The NDA, as entered into between SLI and Cipher, and as incorporated by
207. The NDA, and by extension, the MOU, required that Cipher, its parent company,
209. Cipher, PSM and Prosegur breached the NDA and the MOU by failing to safeguard,
210. SLI performed its obligations under the NDA and the MOU.
211. Under the terms of the NDA, a party found by a court of competent jurisdiction to
have breached the NDA in any material respect is required to reimburse the non-breaching party
for all costs, expenses and attorneys’ fees incurred by the non-breaching party to enforce the terms
212. By reason of the breaches of Cipher, PSM and Prosegur, SLI was injured, and is
entitled to damages in an amount of not less than $14 million, to be determined at trial, along with
BREACH OF CONTRACT
213. SLI repeats and realleges, as if fully set forth hereto, the allegations contained in
214. The MOU, as entered into between SLI and Cipher, is a valid and binding contract.
215. The NDA, as entered into between SLI and Cipher, and as incorporated by
53
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 54 of 72
217. The NDA, and by extension, the MOU, required that Cipher, its parent company,
and its affiliates use Confidential Information for no purpose other than for considering and
218. Cipher, PSM and Prosegur breached the NDA and the MOU by conspiring with the
Utilities Defendants to orchestrate the removal of procurements valued at $84 million from the
Original ICT Engineering RFP, and the inclusion of those procurements in an RFP on which SLI
219. SLI performed its obligations under the NDA and the MOU.
220. Under the terms of the NDA, a party found by a court of competent jurisdiction to
have breached the NDA in any material respect is required to reimburse the non-breaching party
for all costs, expenses and attorneys’ fees incurred by the non-breaching party to enforce the terms
221. By reason of the breaches of Cipher, PSM and Prosegur, SLI was injured, and is
entitled to damages in an amount of not less than $5.1 million, to be determined at trial, along with
BREACH OF CONTRACT
222. SLI repeats and realleges, as if fully set forth hereto, the allegations contained in
54
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 55 of 72
223. The UTI Subcontractor Agreement, as entered into between SLI and UTI, is a valid
224. The terms of the UTI Subcontractor Agreement explicitly delegate to SLI, in its
capacity as Chief Security Architect, responsibility for, inter alia, purchasing with respect to the
Corporate Security Program, using a mix of third-party vendors, consultants, and contractors.
225. UTI breached the UTI Subcontractor Agreement by arrogating to itself Corporate
226. SLI performed its obligations under the UTI Subcontractor Agreement.
227. The terms of the UTI Subcontractor Agreement provide that the prevailing party in
any action brought to enforce its terms and provisions is entitled to recover the reasonable costs
and expenses of such litigation, including reasonable attorneys’ fees and expenses.
228. By reason of UTI’s breach, SLI was injured, and is entitled to damages in an amount
of not less than $3.9 million to be determined at trial, along with reasonable attorneys’ fees and
expenses.
BREACH OF CONTRACT
229. SLI repeats and realleges, as if fully set forth hereto, the allegations contained in
230. The UTI Subcontractor Agreement, as entered into between SLI and UTI, is a valid
231. The terms of the UTI Subcontractor Agreement provided that approved expenses
would be treated as a direct pass-through to Avangrid based on local GSA rates, and would be
55
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 56 of 72
reimbursed to SLI by UTI on the basis of reimbursement requests supported by receipts for the
relevant expenses.
232. SLI presented UTI with reimbursement requests, with supporting receipts, for
expenses incurred by SLI in connection with the ICTPRIVATECLOUD project, in the sum of
$114,750.22, as set forth in Exhibit B (the “Unreimbursed Expenses”). UTI breached the UTI
233. SLI performed its obligations under the UTI Subcontractor Agreement.
234. The terms of the UTI Subcontractor Agreement provide that the prevailing party in
any action brought to enforce its terms and provisions is entitled to recover the reasonable costs
and expenses of such litigation, including reasonable attorneys’ fees and expenses.
235. By reason of UTI’s breach, SLI was injured, and is entitled to damages in the
amount of $114,750.22 plus pre-judgment interest, along with reasonable attorneys’ fees and
expenses.
BREACH OF CONTRACT
236. SLI repeats and realleges, as if fully set forth hereto, the allegations contained in
237. The EULA, as entered into between SLI and Avangrid, is a valid and binding
contract.
238. Under the terms of the EULA, SLI granted Avangrid a license to employ SLI’s
IroncladTM technology.
56
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 57 of 72
239. Subject to inapplicable exceptions, the terms of the EULA prohibited Avangrid
from copying and/or disseminating, in whole or in part, the intellectual property constituted by
alia, blueprints, technical specifications, and equipment necessary to build and implement an
IroncladTM design.
241. The IroncladTM Runbook incorporates and reflects SLI’s IroncladTM technology.
242. David Lathrop, at the behest of Avangrid, and in his capacity as Avangrid’s agent,
breached the EULA by providing a copy of the IroncladTM Runbook to UTI, an unlicensed party,
243. By reason of Avangrid’s breaches, SLI was injured, and is entitled to damages in
244. SLI repeats and realleges, as if fully set forth hereto, the allegations contained in
245. As a result of its extensive, prior experience in the design and maintenance of
systems for securing power grid networks, SLI possesses a compilation of information regarding
the provision of such services for specific, individual utilities, and the design of technical and
pricing proposals for the provision of such services. Its IroncladTM technology, and the IroncladTM
57
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 58 of 72
Runbook that is indispensable to its implementation, are compilations of information that are
246. SLI’s possession of this information gives it the opportunity to obtain an advantage
over competitors who do not have it. SLI’s IroncladTM technology is of great value, was developed
by SLI at significant expense, and could not have been easily duplicated or acquired by others
247. SLI’s IroncladTM technology constitutes a trade secret. The IroncladTM Runbook
that SLI created to permit the implementation of the IroncladTM technology contains those trade
secrets.
248. SLI took appropriate steps to protect those trade secrets and maintain their
confidentiality.
249. UTI misappropriated SLI’s trade secrets by accepting from David Lathrop, without
entitlement, SLI’s IroncladTM Runbook, and by improperly employing it to compete with SLI. It
did so by, among other things, using the information in the IroncladTM Runbook to create and price
bids it would otherwise been unable to produce without the benefit of SLI’s trade secrets.
250. By reason of UTI’s misappropriation of SLI’s trade secrets, SLI was injured, and
251. SLI repeats and realleges, as if fully set forth hereto, the allegations contained in
58
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 59 of 72
252. As a result of its extensive, prior experience in the design and maintenance of
systems for securing power grid networks, SLI possesses a compilation of information regarding
the provision of such services for specific, individual utilities, and the design of technical and
pricing proposals for the provision of such services. That compilation of information is unique
253. SLI’s possession of this information gives it the opportunity to obtain an advantage
over competitors who do not have it. SLI’s design, provisioning and pricing expertise is of great
value, was developed by SLI at significant expense, and could not have been easily duplicated or
254. SLI’s design, provisioning and pricing expertise, and the SLI bidding information
that incorporate and reflect that expertise, all constitute trade secrets.
255. SLI took appropriate steps to protect those trade secrets and maintain their
confidentiality.
256. Cipher, PSM and Prosegur misappropriated SLI’s trade secrets by improperly using
SLI’s bidding information for purposes other than for considering and carrying out a professional
business relationship with Security Limits Inc. They did so by employing SLI’s bidding
information to help the Utilities Defendants refine and issue a superseding RFP styled Tender No.
789646, which was designed to permit Prosegur entities to bid, and to exclude SLI from bidding,
on $134 million of procurements removed from the Original ICT Engineering RFP.
257. By reason of the misappropriation of SLI’s trade secrets by Cipher, PSM and
Prosegur, SLI was injured, and is entitled to damages in an amount of not less than $5.1 million,
to be determined at trial.
59
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 60 of 72
258. SLI repeats and realleges, as if fully set forth hereto, the allegations contained in
259. As a result of its extensive, prior experience in the design and maintenance of
systems for securing power grid networks, SLI possess a compilation of information regarding the
provision of such services for specific, individual utilities, and the design of technical and pricing
proposals for the provision of such services. That compilation of information is unique and
260. SLI’s possession of this information gives it the opportunity to obtain an advantage
over competitors who do not have it. SLI’s design, provisioning and pricing expertise is of great
value, was developed by SLI at significant expense, and could not have been easily duplicated or
261. SLI’s design, provisioning and pricing expertise, and the SLI bidding information
that incorporate and reflect that expertise, all constitute trade secrets.
262. SLI took appropriate steps to protect those trade secrets and maintain their
confidentiality.
263. The Utilities Defendants misappropriated SLI’s trade secrets by improperly using
SLI’s bidding information for purposes other than for considering SLI’s entitlement to be awarded
the contract sought to be obtained through the bid that contained it. They did so by employing
SLI’s bidding information to refine and issue a superseding RFP styled Tender No. 789646, which
60
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 61 of 72
was designed to permit Prosegur entities to bid, and to exclude SLI from bidding, on $134 million
264. By reason of the Utilities Defendants’ misappropriation of SLI’s trade secrets, SLI
was injured, and is entitled to damages in an amount of not less than $5.1 million, to be determined
at trial.
(As against the Vendor Defendants, David Lathrop, John Allen, Tom Fitzgerald,
Enrique Victoreo, Antonio Asenja, Ed Boucas, Andre Viera Rolim and Bill Reilly)
265. SLI repeats and realleges, as if fully set forth hereto, the allegations contained in
266. SLI enjoyed a business relationship with the Utilities Defendants in light of its
successful design and implementation of the Avangrid Secure Grid, and its licensing to Avangrid
of SLI’s IroncladTM technology. SLI reasonably expected that business relationship to continue in
light of its intimate familiarity with its IroncladTM technology, and its understanding of the services
and equipment required to maintain and expand the Avangrid Secure Grid.
267. The Vendor Defendants, and Defendants David Lathrop, John Allen, Tom
Fitzgerald, Enrique Victoreo, Antonio Asenja, Ed Boucas, Andre Viera Rolim and Bill Reilly (the
“Interfering Defendants”) interfered with that business relationship by reason of their participation
enabled the Utilities Defendants and the Vendor Defendants to misuse SLI’s confidential bidding
61
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 62 of 72
information in order to benefit the Vendor Defendants with, inter alia, the award of lucrative
269. The Interfering Defendants acted knowingly, dishonestly, unfairly and improperly,
depriving SLI of lucrative contracts and associated procurements that would have otherwise been
270. By reason of the Interfering Defendants’ knowing, dishonest, unfair and improper
acts, SLI was injured, and is entitled to damages in an amount of not less than $36.6 million, to be
determined at trial.
UNJUST ENRICHMENT
271. SLI repeats and realleges, as if fully set forth hereto, the allegations contained in
272. The preparation by SLI of bidding materials created in response to the Utilities
Defendants’ Requests for Proposals required the commitment by SLI of substantial time, effort
273. The Vendor Defendants made improper use of SLI’s bidding materials by using the
274. Through those improper means, the Vendor Defendants were able to secure from
the Utilities Defendants the award of valuable contracts they would not otherwise have obtained,
275. Through their improper use of SLI’s bidding materials, the Vendor Defendants
62
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 63 of 72
276. Under those circumstances, equity and good conscience require that the Vendor
277. SLI is entitled to damages for the amount, to be determined at trial, by which the
Vendor Defendants were unjustly enriched by their improper use of SLI’s bidding materials.
(i) On SLI’s first cause of action, awarding SLI treble damages in an amount
attorneys’ fees;
amount of not less than $110 million, to be determined at trial, along with
attorneys’ fees;
(iii) On SLI’s third cause of action, awarding SLI treble damages in an amount
attorneys’ fees;
amount of not less than $110 million, to be determined at trial, along with
attorneys’ fees;
(v) On SLI’s fifth cause of action, awarding SLI treble damages in an amount
attorneys’ fees;
(vi) On SLI’s sixth cause of action, in an amount of not less than $14 million,
63
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 64 of 72
(vii) On SLI’s seventh cause of action damages in an amount of not less than
attorneys’ fees;
(viii) On SLI’s eighth cause of action, damages in an amount of not less than
attorneys’ fees;
(ix) On SLI’s ninth cause of action, damages in the amount of not less than
attorneys’ fees;
(x) On SLI’s tenth cause of action, damages in an amount of not less than $1
(xi) On SLI’s eleventh cause of action, damages in an amount of not less than
(xii) On SLI’s twelfth cause of action, damages in an amount of not less than
(xiii) On SLI’s thirteenth cause of action, damages in an amount of not less than
enriched, and the imposition of a constructive trust on such profits that are
64
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 65 of 72
(xvi) Awarding SLI such other and further relief as the Court deems just and
proper.
Respectfully submitted,
-and-
65
11018316.3
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 66 of 72
EXHIBIT A
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 67 of 72
Menu
SECURJTV
TABLE OF CONTENTS
SECTIO N I: EXECU TIVE SUM MARY & COM PANY OVERVIEW
SECTIO N I: EXEC UTIVE SUMMARY & COMPANY OVERVIEW ................................................ 2 Officiol registered name {Cofpotote, D.BA, Porinenhip,
e fc: .J, Ovn &. Brod~! Numbe<', Primcwyond se,x,ndory SIC
COM PANY INFORMATIO N .... ... ... ... ... . .......•..•..•................................... .... ............... ... 3
numben. oddreu . moin tele phone number, toll-free
Regional Presenc e .......................... ........... ........... ........... ........... .................................... .. ..... .4 numbers, and foc:simie numbers .
IC,e-y Contoet nome. fitte . oddn!u r,1 ditfer.nt from obov•I.
SECTIO N II: PROJ ECT OBJECTIV ES.. .... ................................... ................... ... 5 d irecl telephone or.al la:it number.
Person ovthorized to cOl'llroclually bind 1he o,gor'i:zatiOl'l for
SECTION III: PRO JECT TEAM .. .......................................................................... ,.. ... ,...... ,..... ,.. ,.. ,.. ,... I,
o ny proposail.
Project Team Overview ....................................... ........... ........... .................................... .. ......6 Brief history. includng year established and numbef of years
S ~ Lirrih Inc:. ~ be@-n o fferin11 S}'Uems OeS>!in ond
Program Ma nager and Collabo rn fio n ........ ............................. ........... ............................... ..7 Engineering. lnformofion Secuity. Risk MonQgement,
lnclu<:ing Asseuments ond Compiance Consulting Setvioes.
SECTIO N IV: PROGRAM GOVERNA NC E...... .................................... ... ... ... ... ... ............... ,.. ,.. 7 8V$ine-.s Cont in.;ty onel Oisast"" Re-c:overy T..sting with
Proje ct Manager and Collabora tion ................................................................................... 8 ~oecffic em sis on eleciric vii indus s Gsvei.
Management and QNOC. ............... .................. ........... ........... ............................................ 9 Security Lim its Inc. is pleased to provid e Avangrid v..tth o response to l ender;! CXXX)77636S fo,
Change Management ........................................ ........... ........... .......................................... 10 assisting AVANGRID with cont inued m a intenance an d maturity of its Physical and Cyber Security
Program (ASD-ICT] . There is tremendous voh.>e in ensuring o c e ntralized engineering approach to
Change in Scope o f Services ........................................ ........... ........... ............................... 10 management of architectural service delivery across Avongrid and the ASD-ICT. Security Limits
Curriculum Vitae o f Proposed Resources ......................................................................... 10 Inc. is currently supporklg the Avongid Physical and Cyber Security Program in accordance with
fromework. on e lfA l ) design and engineering requirements esta blished through Security Lim its
On-Going Communica tions and Repooing {Service Deivery Level} ........... ........... .... JO lnc.' s design USPTO SEC20.00 1-U.S. No. 62/818,390entiHed i nt egrated Secure Platform. We would
In itia l Project Risks & Assu mptions ....................................................................................... 11 wek:ome the opportunity to continue this portnel!ihip ttvough fromewort:-two (FA2 J; thus. ensllTTlQ
contin ued mat lrity and cyber gowth o f the pkrtform in accOl'dance with design specifications.
Accep t ance Cri teria .......... .. ............................... ............ ........... ........... ............................... 13
Customer Roles & Responsibilities ....................................................................................... 13
In addition. Security Lirrifs Inc. to kes odvontoge ol this opportunity to provide insight regarding it s
Travel Expenses ......... .. ......... ...................... ............ ........... ........... .......................................... 13 experience a nd various lines of businesses. Security Limits is o smol boutique IT engineering,
arct'itecture, a n d cybet security com pany that thrives on the development of intelectual
SECIIO N V: ICT PRICING SHE£T SUMMARY - LABOR . ....................... ... ... ... ... .......... 14
property a nd also offers regula t ory compliance p,ogram maintenance and risk management
SECTJO N VI: ICT PRICING SHE£T SUMMARY - MAIERIALS .. .. .. ........ 14 services.
....................... .... ............ ........... ........... ........... ........... ........... ........... .......................................... 14 This p roposal documents Securtty li"nils " understa nd ing of the crtent requirements. partnership
objectives, scope. and assumpt ions with respect to tender# OCXIJ77638a. It a lso describes our
Phose l · Summary ...................................... ........... ........... ........... .......................................... 14 approach with respect to va rious services. including but not limited to desig n and engineering ,
l
Phose ll Sumrncry ....................................... .......... ........... ........... .......... ............................... 15 cyber security compliance. Vulnerability Management. risk assessments, pene tra t ion testing,
e-discovery. and IT consulting services.
~the,-sill~-Seo.arity~lnc.l>ftd~~b•.dtcyber_,ty~~•mwstruelUr'"for
~'" than 25CUSlDrT1'"rs -mdudinc;"'-j.- " " - llliitiH and Bank!. on h United~ fortune 500
....imedum-~R,:ufatedby~~-~~ngtt.e.rriormaoonS)'5UfllS
~...room... _ ~
SECURJTV
SU serves ma stra tegic advisor to major utilities a nd banks. helpr"IQ them to develop comprehensive seo.,rily
managem ent system p,ogroms and to design a nd develop vrtvolzed priva te c loud systems infrostnJcl ure .
Reg!onal Prese nce
networting, and ICS migration strategies (TSCADA and DSCADAJ that enable achievement of busine~
objectives while im proving our notional security. We a ssist in providing security compliance services to
customers. partners. regulators. employees end shareholders. OUr team offers a uniqve blend of services
a nd produch that help address policy, compliance. cyber security, and systems archrlecture bot h physical (WBE)
a nd logica l; l rf./S, minirnzing vulnerabilities and risl::s.
WOMEN
OWNED
44
COM PANY INFORMATIO N
PROFESSIO NA LS
c-
security Limits rnc. consurumts PC
R~~,..,_inSlatl!'tJIN-Yorl<
SIG Addrft5 ......, , et.phwle&
Security Limits· dedica tion starts right here in t he Northeast, where team mem bers put t heir full-
- Fu
""' 87 12 95-4 570-397-0027 Poo.JSiva. service engineeri ng. orchrt ect ure, a nd security/safety e:itpertise to wort.. Beyond indust ry
Womeri 0813-48756 87'48 Lexington Conaghan leading quaHficotions o re the f11m ·s employees who will delive r team chemist ry, im plici1 trust,
Own. . Ave. Vic: e f>ne.sident and a love for the local econom y - bec ause it's the community where w e live. In addftion to our
eo,porotion, !' 10 17 President regional heodquorten in New York City. w e are looking to expand in the Greater Conn ecticut
estobi~ NewY°"'-. area Jo support several c lienJs and p,-oje-c ts in Jhe region. Sue h clienJs inc lude Do,-mon Products
2007 New York (NYSE: DORM), fve<s ourc e En ergy (NYSE: ES) , and Citigroup (N YSE: CJ.
Founded originally in '1.fX)l, Security limits LLC and changed lo Women Busriess Enterprise in 20 18
under Security Limi ts Inc. is a full-service technoJogy engineering , architecture . and consultin g
solutions firm. Secu'ity Limits Inc. is among the leaders in manv service cat egories. including Hyper
Converged Doto Center Design and Engineering Services: incltding but no t lmited l o TSCADA.
DSC ADA. and Smart Grid · AMJ cyber security design a nd engineering. Secvrity Lim its, Inc. currently
lntel ectuo l Property in cyber security modeling, pla ns, a nd design. We ore a lso currently assisting
Avangrid!> in the design. en g ineering . integration and deployment of the Avangrid Security
Domain or ASD/ICT; a seniot Security Limits Inc . resource serves os the '"C~ef Architect" "
Our Northeast Regional Office in Perv,sytvania - located less than lour hows awa, from Avangrid®
Roc~let Se--cn; I, Gc:u Heodquort~
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 68 of 72
_......,...,in~
~ a n d S!a:>ele'o<fl. - - S l 0 n 0 a 0 5 ~ ~ - , : , : , e - - . s -
pnysic:gl-=:,,wiry~ n,.~v•isl0Clbo
- ~ s y s ! - e f f l t > e l ! ~ ~ N S T a o o ~ ~. - ~ o l
~c:n.<a,...c.conm,ct.aana1projacl1«Jm~10
QlfrmlnQlno~-,,uiga n l l W ~ " ' I Q - .,,.,.ce.r,
oonwx:ieada ft110ny.
t tilCSfOroOOrcainlolc• ffiCl'-Pn'/'SKX]ISec\r.lyFrogom .... ....., s ~ i n -
in e,l"it,it SI. SOW..ooc,,..
--
P - l 0 s . 2 M g \ l A < t e l ~ ~ 1:
l"ll!er,ginNringfrmwil ce~for'IIIOOnCl"Qdel!Sel'r~T!WA~s.cuily
D O m o J \ ~ !Oioef'dy 0uSntiS Ql"Qquiwy~ - Project Team ove rview
~II001"av:JJOICDMl'IOIT-.inc:t.,sive ol<:ADES. ~f<laowr,g~
U'!Ollt:>ep,o,icMcla. ~miar..oot
,. ~arawr,g1.Cons1NCtiOn~support. Ql"Qsys::emrOOCl.fflefflCfl
,. SUpporTCICoei.q,~nec.s~bpnpoa1ar>a~u.~
-
,. IMirw-ss~go:Nlir'Q- .,..,P(Sfem.proc:),Jef,s,wvic,er,sc:ope
:,. ~ d . . . - q i n N r i r , g ~ I O l o c i i t c x • ~ ~
,. Syt-.one1 n erloceNeg0:10n~ocron~appro,,ec1projecn
Cll'W;\P(ST~ i n ~ i e . AM,O'lan0~
:.. ~ a O \ . d l y ~ Sy:item Prog'am
, tCTsy.,«r,s...-qi~~OUl0mcrionanaJUppOl'linDeV, GA,.OC1,
OC2.ondOC3 (0Q) ~ . c : o M O l c...-i. omac..re«lond~
~~O:'ld~CICarn.,otNBlCOP~•r;,,,:vcn,
Exprr~NI ond Accompli~ leclrical Staff
ro..-~,;,ryOClff"Qlignoed~~--.ono~~ Security Lrms & compris.ed of a <Ztingushed technical staff and portrteSWpi such m Per..pecta
'Nl"W'I-AYD/IICf Lobs®: o .k..o. fomier Bel Lobs; Computer Science Oeportmeflt5 ot Manchester C<>n'V'1"1Urity
Colege, Steven5 W'l:5titute of Tect-nology and New Yorl:. Univer.ity
We do our best to ensue resources alocated to this program wl mee t the folowr,g criterio
as a rririmum reqkement. depencing on po5ioon{s) :
-~euorc.o~~sr-inm~~m~
~.SorT-.onornoiesr1 ~10or~,os«;u.-..,n'Cefl,V011:>efl.rlner 10'.l. hold PhO's; I ~ hold other advanced degrees.
1001<. klrwc7d I O ~ 0CJCk t'OmA"'0r'ql0.
OSic:UDed. -
Security Lirrits and it5 partners hoVe potent pendng fiings in process ond po1ents O'Norded for inven t01'$
being named m 50le or co-mvent~ on over -460 patents across the software. secuity. data onotytics.
netwof1c management, operations. opticoJ and wi-eless flekts. Our intelectuol property ond lcnow-how
Yl,;f be heaviy utiized in this service deiYery to ensure a succeul\JI engineering endeavor: resumes con
be provided upon recp.>est.
6 >.h~~:;:~~n~".:\~: •~-•
, ) I 7 I
I ,, t, t
!ffieieneie1
Program Governance The folowing sections highlighj wme of the benefits o f awordng the cont?Oct fo, this RFP
-==- - -
to secu,ty WM$ Inc.• but not llrmed to:
- ~-..,-,......-..,,~uo.r,,..,_~_,,_.....,.~A5':I
SKuriqo Ufflit1 Inc. hrtner... wfltlAVAHGRIO
~ -.....,_-.i,,, _,~....,.....,._/o,•
Ol-4A M l ~ a > r l - e ~ ~ .........
Take inwnediate odvonk>ge of Sec~ Umits' knowledge of e xisting ASD-ICT Architecl\.lre
and ~ n; ovoid I~ ctKVe I usifto onolhN vNMD. Avangkl hos odopte-d and
iee-nse-d SN:UIWV Umin lnc.'s .-on0od1"' dttign . SEC20.00I -U.s. ProviStOl'lol P~ nl
Application No . 62/81S.390: we undeokmd lttc" CUflent infrostnK:tu.-e and futu.-c- roadmap
beftief than ony otheJ e xten10I ¥ endor. We hope to cONinue- tNs ¥efY cost-effc-ctive
painenhip in yean lo come.
Leverage existing · colobaotion took and orch'tectvre· supportng ASO; cost savings in
program process development/project operationolirotion
Le verage exismg l:no¥.1edgeof FtbefOptics Netwvon:. Sffes ondcomponents; tt'isfflprov~
service deive,y realzotion os l'eSOUl'ces wl come-in l'vtmg the ground running os
management oversight understands cvrreni rlfo'astructure l"Liddles and ways to
overcome it more e ffectively_
Security lirm experienced resources oo staff with prO'Ve n trock record of
irnp5ementng and oudimg AM cybe, and physical security controls; PECO Energy p.e .
Suppormg the Perw,sytvOl'Wl Act 129; greater Pt.>detphia Smart Grid Design, Engineering.
ond Deployment)_
Pet"SOl"nel 'Nith PhD ri the Fi>er Optic$ field wil be OS$igned to cwers.ee engineemg e fforts
ondsel'Yiee realil:ation.
Security. Data Go¥emonce mapping to e xistng A vangrid Compliance requkemeflis
along 'Mth a historical record ol information and ociions wit be leveraged. rt-a wit ensure
odeQUO?e compliance measures wiih rrwwnol e ffo,t as security irrits hos olreodV
implemen ted Sir'TWor contn:ts fOf the ASO program.
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 69 of 72
Security t.rms Inc. utazes Microwft SharePoint vie the K:TPrivCT.eCloud.com Design to encourage
colaboration ond sharing acroM muttiple key stakeholders witl'wl the Avongrid organizations Change M anagement
Shorei"oint enhances orgorizationa elfectiveness ttvough the folowing features·
The change Cotltrol procedures folowed wil be consistent with Project Management
Procedures and ncivde the folowing ptOCess.es:
Remote A ccess: Project team members, Cot1troctotS. and sta ff may be granted
web access to ritonnafion to enable p,oject teams i"o collaborate on t asks from
A Change Control Sha'ePoint e stoblshed by the Security l..irms Inc. Prqect
any location..
Manager. to track al changes ossocialed v.tth the proiect effort.
Content Management The project Shoref'OOt Rte serves <» a reposttory for al
Al change requests wil be assessed b y the Securtty l.irMs Inc. Program Monoge
ptOtect docunen ts. records, and Cot1tent. Version control idefltifies the most
Pro;ecl Manager to determine pcM.si:lle atematives and costs.
current ond a pproved documents. Version m tocy record$ ptevious iterofiom
Change Requesh will be reviewed ond op ptoved by the Avongrid Spon$0f.
c:honges are never 105t.
The effects of approved change requests on t h e ~ ond ~hedule of the
Secutty l.xrm Inc. plom to leverage the ICTPrivateOoud.com domain to enSU'e
pro;eci wil be rellected r1 updates k> the p,oject pan as PQ'1 of weekty dashboard
al !Aef access remain centl'olzed r1 a controled and secure envrot'lment; tN.15.
meet ings
introduc:rlg o ~ c o d saving$ to Av0f"9id.
The Change Control database wil be updated to rellect stotul o f change
requesh.
Proj e-ct Kick-Off M eeting
We wil conduct o prqect l:ick-off meemg v.tth Avongrid. ihe meetrig wil provide overall
Change in Scope of Services
coordnotion. conceph ond conzte ncy between Avangrid ond Security l..rrm prcject te(lll"T"G
ond ~ - Initial site tosb wil inclJde team review of ~ I t o sb. colection o f If unforeseen toctors change tns. scope of wc,1,:; ond/or impoc1 the term ond cost of the provided
regulatocy/corpo,a!e requiremenh. and id entificotion o f docvmenh and personnel in- services enclosed. Avongrid and Security l.rrm ~. may rn.,1uoly revise the SOW and Security
s.cope fo, the Avongrid OT f>roieci. We v.il review euiT.ent security p,odiees to detennir.e both I.mil$ Inc. shol provide customer with on estimate of the inlpact of such revisions on the tees.
mote~ ond tocfical ntiatives to fix:tlote the deVelop-ner'ltof the OT Physical and logical Fiber payment tem1$. OOl"flPletion schecklle ond othet" oppicotlle provi5ions of me sow. If the parties
Network ln t ~tion Strategy Roadmap Document. The pn:lject pion would be updated mutualy agree to such changes, a written desaiption of the agreed change 1·change
OCCOl'dingly. Authorization.. shall be ptepaied, incorporoting wch changes to ihe ANAL SOW and shall be
signed b y both parties. The terms of a Change Authorizotion Form prevoJ over those of the sow
• " · m,•~ ·~ •
. 1',.
,•
.l,,lj ,•"• •r ._.....,Yo--<. IL )
I JO 9qlexnc;ona.,,.•l v l
),.(ann~t 1n
' !
ro-.,, 'ICY '(
) I l
LI\;
F-; I
' '' . ( ' ' ' I ~' ' • > '
no_,.
Ttmeine Est.-ncr.e1 M:. T!meine ow.,mes Llnlikety T!meline to be reviewed and
Project Size Urreaistic f"rmed-vp in-pk,rri-,g phase-
Monte Corio sirruotion
Esfi"notedPro;ect H: 2-3months Unlkety Created comprehensive introduces twgher levels of
Schedule - Tentative prcject trneline with frequent
boseine re-.riews Documentation Control M:. Documentation Somewhat Wil need to be re 'ined in
ondOuolity ·Monrily Quality lkety -p1onningpnose- pos1contt0ct
Teom Size at Peak H: 26 members C effOSlty COl'rf)rehemive l e v ef-1 award; it could resut in cost
corrvn.ricotior6 ptai, frequenr red.Jction or incteose : although
meetings, tight p,oject (e .g.Some unB:.efy. Subject to amendment
monogernent ove!Sight noccurocies r1 networt as new details regording project
P10jeet0efinition diagrams and scope ore revealed
o,oce<bal
Ccxt Estimates Unreolstic l: Thorougtiy Unlicety Wil need to be refined in documentation)
predicted by -planning phase- ~ t contract
1 rro,ec! Stoffing
industry e,cperts award; if could result r1 cost
proven p,octices to reduction or increase; although
·-
OGpersed site locations M:. Sile k d s ~ l.l(ety Adcltionol itovel
1~mo9nofetrof uriik.ety. Sut:Jieci lo amendment
OS new detois regarding project
Weak Business/Customer l: Use1"S ore port-frne llnlikety User Group P o ~
,.~
scope a-e revealed
Participation on Pto;ect ieom members coordinated by U lime
Avoioble documentation M: More than 75'f. Unlicety 8olonc:e of rlformation to be
clouds establ5tvnen i of complete/cutfeflt gathered by consl.Aiont
Protect Management
p,ogombosel-
l:Oecicated Untik.ty Ensure proper p,o;ects·
Project Scope Creep l: Scope Unll<.ty Scope itwoly demed in p,oieci
coordination. e _,cecvfion <:rid
pion. te viewed rnontHy by ke y
ovenight from the program
defined. w bject stakeholders to prevent
manager:: provided by Av ongrid
to reYision undetected ~ope creep
PMO
Change Monogemen1 l: Wel-defrled Unlik.ty NIA
Procedures undefined
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 70 of 72
Acceptance Criteria
On completion of the Services covered by TM RFP response, Vencto, wil sut»Til the Deiverob'e$ to Cvston-,er
f Of review and final approval in occordonce with cootroctuol reQVl'Cment. Payment WKlll be cond:tioned
upon acceptance of the DeiYero~ desaibed in Article 7 (7nvoicing and Payment-) of the Ageement.
a- cuitroct wil be deemed completed when al of the delverobtes have been accepted or deemed to
hove been accepted in acco«:tonce with the Agreement.
(Ii) ProVDC occeu to Avongrid tterne staff and systems to provide necessary
infotmationin tmety fosNon; S ECTION VI: ICT PRICIN G S HEIT S UMMARY - MATERIALS
(ii) Provide boclcground motefiols/occess/~a neceuory to enable services;
(,A) occeu to snes, focilties. ond s~tems so tho! wen con be performed; O.X phose--1 approach focuses on maxlrrizing lisle reduction per security dolor spent. Tm
pho$e wll C<>rrYnence wi1h o romp- up PfQCCU to k:151 up to three months. and wit incl.Ide the
Trave l Expenses folowrlg:
Travel ex_oenses ore not included. Al travel expenses shot be rei-n.bu'sable b y Avangrid, such
expenses moll be feimbursed' onty in occordance with the Avongrid·s Travel Policy. and Local Office Presence in Rocheste-r. NY
subject to the lin'Wts set forth in Section ("Expenses·1 of the Moster Services Agreement. Workforce Mobilzofion
Employee SO-eefing Proceu. N=RC-OP Complionce . and Onboordng OCIMt~
Estobistrnent of Processes and Procedures fOf PMO
Employee Screefing Proceu and Oriboordng ocfivifies
Program/Project Pion and SchedlAe Oevek>pment ("1tuoly Agreed}
~hboa-d and Program Reporting Sh'ucful'e
IJ ~54 .-xr-<:;•ori Aw • .l l
,..._...,~ , • ~r "l""'Y,:y~ le 2
I 14 M&~~:;~""~,::: ~~•J
, • } ' 7 - ' • , ll J ,
Phase II Summary
During thi5 pha;e the teom wll delver business os usual to Avongid: CADES is
operatior'd. As the team reaches its peolt performonce and size. the e xpectahon i5 tho! the
overage amount of time to ~orm o fast wll ~ove: normalizing service delveryafler the lirst
year_ . .
- --
The project wll run between 2019 lhrough 2022.
--· --
Wedne<-
Jonua,y l
Fridav. Januory l ""'"-
Jonua,y l
Monday
Jonua,y20 January 18 Jonua,yl7
-- -__ - -
febluory 17 IS
_..,,.
2\._2022
_..,,, =
- -
-
Monday Mov 25 MonoayMDy31 Monday, May 30,
=
Friday JlAy 3
""""'°Y
November'l8
w-...-
Na,,embe,25
""'"- ....,__
Decem. . .25 December25 December25 Decembef25
EXHIBIT B
Case 1:21-cv-10124-GHW Document 1 Filed 11/29/21 Page 72 of 72
INVOICE
SECURITY
-LIMITS INC-
Bill To:
Unlimited Technology Inc.
20 Senn Drive
Chester Springs, PA, 19425
% discount 0%
$ -
$ -
$ -
$ -
Subtotal $ 104,508.40
If you have any questions concerning this invoice, contact Russell Late Fee 9.80%
Sands at [email protected].
Additional discount 0%