Loading...
Item C09 BOARD OF COUNTY COMMISSIONERS AGENDA ITEM SUMMARY MEETING DATE: 4/21/04 DIVISION: COUNTY ADMINISTRATOR BULK ITEM: YES DEPARTMENT: AIRPORTS AGENDA ITEM WORDING: Approval of a contract with Quality Communications Fire & Security, as specifically named contractor, to provide and install Object Recognition & CCTV upgrades at the Key West International Airport, and to waive the competitive bid process outlined in the Monroe County Purchasing Policy. ITEM BACKGROUND: This security project will be funded under a 100% cooperative research agreement with the Transportation Security Administration. This is an unusual grant and an unusual project. We were approached by Quality Communications (who is currently performing another large Security Project here on the Airport) to apply for a very limited research security grant funded by the FAA and supervised by the TSA. We were one of seven airports in the Nation selected to install experimental "Virtual Fences". Because Quality Communications was our partner on this project from the beginning of the design and application phase for the Grant through project acceptance by the FAA and TSA, they should be considered the'sole source for procurement and installation for this project only, PREVIOUS RELEVANT BOCC ACTION: Approval of Cooperative Research Agreement with TSA, 2/18/04. CONTRACT/AGREEMENT CHANGES: New contract STAFF RECOMMENDATION: Approval TOTAL COST: $194,000.00 BUDGETED: Yes COST TO AIRPORT: None COST TO PFC: None COST TO COUNTY: None SOURCE OF FUNDS: TSA agreement REVENUE PRODUCING: No AMOUNT PER /YEAR: APPROVED BY: County Attorney X OMB/Purchasing X Risk Management X DIRECTOR OF AIRPORTS APPROVAL ~1t- eter J. Horton DOCUMENTATION: Included X To Follow Not Required AGENDA ITEM # Cq DISPOSITION: /bev APB MONROE COUNTY BOARD OF COUNTY COMMISSIONERS CONTRACT SUMMARY Contract # Contract with: Quality Communications Fire & Security, Inc., (as specifically named contractor) Effective Date: Execution Expiration Date: - 90 days Contract Purpose/Description: Provide and Install Object Recognition & CCTV Upgrades Contract Manager: Bevette Moore (name) # 5195 (Ext.) Airports - Stop # 5 (Department/Courier Stop) for BOCC meeting on: 4/21/04 Agenda Deadline: 4/6/04 CONTRACT COSTS Total Dollar Value of Contract: $194,000.00 Current Year Portion: $194,000.00 ~udgeted? Yes Account Codes: Pending setup, 4/21/04 BOCC Grant: Yes - 100%, Transportation Security Administration County Match: None Estimated Ongoing Costs: N/A (not included in dollar value above) ADDITIONAL COSTS For: . (eg. maintenance, utilities, janitorial, salaries, etc.) CONTRACT REVIEW Date In Changes Needed Yes No Reviewer Date Out Airports Director :tJ.b..JC2.4- Risk Management 1.Ji[l 0 '1 O.M.B.lPurchasing ~ )CA ) (~ m G~halfs a~ /) Sheila. Barker re. d f\-6 ~l Q "-CAt J 0 Pedro Merc do 4/~Cf1- DiY /~ ~/~:3 / JJf i0-.L/o4 / GENERAL CONTRACT PROVIDE AND INSTALL OBJECT RECOGNITION & CCTV UPGRADES Project: The Use of Smart Video Surveillance to Provide Enhanced Perimeter Security at Key West International Airport Agreement made on this Date: , 2004 between Quality Communications Fire & Security, Inc (QCFSI), of 3700 SW 30th Ave, Ft Lauderdale, Florida 33312 ("Seller"), and County of Monroe board of County Commissioners, DBA Key West International Airport, 3491 S Roosevelt Blvd, Key West, Florida 33040 ("Buyer"). 1. ITEMS PURCHASED. For value received and other consideration, the Seller agrees with the Buyer to provide the Buyer the following products ("Goods") in accordance with the terms and conditions of this Contract: Descrimion Object Video added solution to existing CCTV to provide enhanced security Ouantitv 1 Unit Price Total Price $194,000.00 $194,000.00 Total Price: $194,000.00 2. PRODUCT STANDARDS. Goods shall comply with the Seller's quotation dated October 07, 2003 and incorporated into this Contract by this reference. This quotation is based upon the TSA grant for The Use of Smart Video Surveillance to Provide Enhanced Perimeter Security at Key West International Airport 3. TITLEIRISK OF LOSS. Upon Beneficial Use 4. PA YMENT. Payment shall be made to Quality Communications Fire & Security, Inc (QCFSI), 3700 SW 30th Ave, Ft Lauderdale, Florida 33312. Buyer agrees to pay to Seller the sum of $194,000.00 as follows: $110,000 upon delivery of Object Video Servers and Software $32,500.00 upon installation of additional cameras and Object Video hardware & software $51,500.00 upon completion of acceptance testing Payment terms are net 30 days after receipt of invoice. If the Buyer should fail to make any of the payments set out in the above schedule, the Seller at its option may treat the Buyer's failure to pay as a material breach of this Contract, and may terminate this Contract and/or seek legal remedies. The buyer may take a 1 % discount if payment is received within 10 days of invoice 3l~~ Page I General Contract to Provide and Install Object Video at Key West Airp[}~ 5. DELIVERY. Time is of the essence in the performance of this COflCract. Delivery of Goods shall be made according to the following schedule: Ouantitv I Descriotion Object Video added solution to existing CCTV to provide enhanced security Deliverv Date July 1,2004 Seller is responsible for proper packaging of Goods so the Goods will arrive at the destination without damage. Any damage sustained due to improper packaging will be charged to Seller. f},.~!sr:!an estimated date based on 90 days delivery and iostallation time frame from the execution date of the contract, projected as April 1 2004 . 6. WARRANTIES. Seller warrants to Buyer that the Goods will conform to the applicable drawings and design standards, to meet the TSA Grant proposal submitted by QCFSI & Object Video. . Other Limitation of Warranty is included in attached Terms and Conditions 7. INSPECTION. The Buyer, upon receiving possession of Goods, shall have a reasonable opportunity to inspect the Goods to determine if the Goods conform to the conditions of this Contract. If the Buyer, in good faith, determines that all or a portion of the Goods are non- conforming, the Buyer may return the Goods to the Seller at Key West International Airport (EYW)'s costs. The Buyer must provide written notice to the Seller of the reason for rejecting the Goods. The Seller will have 30 days from the return of the Goods to cure any and all defects, or be held in breach. NOTE Attached is a copy of terms and conditions and a copy of the site plan (Attachment A) for camera and Object Video software coverage dated 2/25/04 that are hereby incorp9rated into this contract. ~d~lo l\ General Contract to Provide and Install Object Video at Key West Airpcl1 Page 2 8. TERMS AND CONDITONS. Att.1Ched The parties have executed this Contract at Key West, the day and year above written. Buyer: County of Monroe BDA Key West International Airport By: Monroe County Date~ By: BY DATE Date: :='{~(IJ Lf . General Contract (0 Provide and Install Object Video at Key West Airport Page 3 ",j' Quality Communications Fire & Sexurity, fnc, Terms and Conditions Introduction: For good and valuable consideration. the parties agree that the tenns and conditions contained herein are the sole tenns and conditions of sale and/or for service and represent the sole and complete Agreement between the parties and supersede all prior oral and/or written representations. understandings. proposals, agreements. and communications regarding the subject matter hereof. The parties agree that no additional tenns will be binding upon Quality Communications even if they appear on Purchaser's fonnal purchase order, acceptance fonn. or any other of Purchaser's documents unless signed by an authorized representative of Quality Communications. PA YMENT TERMS: [fnot otherwise specified in the Contract Documents. the following applies: A. General Payment Tenns are net thirty (30) days from date of invoice where satisfactory open account credit is established and maintained. Quality Communications reserves the right to revoke or modify Purchaser's credit at its sole discretion. A mobilization payment up to fifty percent (50%) will be invoiced upon acceptance of customer's order. Progress payments to one hundred percent (100%) of order value will be invoiced monthly based upon equipment delivered or stored and work perfonned. At Quality Communications' sole option. Purchaser shall pay cash in advance. or upon delivery, or as otherwise specified by Quality Communications. In the event that Purchaser defaults on its obligation to pay each invoice when due. then. in addition to all other rights and remedies available to it. Quality Communications shall have the option to withhold any further shipments of materials and/or the proyision of services. if any, until Purchaser's account is fully paid. Further, in the event payment is not received according to Tenns. Quality Communications may. at its discretion. assess interest at the mlUimum rate allowed by law or at the rate of 1.5% per month, whichever is less. Purchaser also agrees to pay all costs incurred by Quality Communications in pursuit of payment which is past due including. but not limited to, collection agency commissions and attorneys fees. B. Cancellation: Any cancellation must be made in writing. Recognizing that Quality Communications' damages arising from cancellation will be difficult to estimate or detennine. the following charges shall be consttued as liquidated damages representing an approximation of the administrative. engineering, and other costs Quality Communications will actually incur in reliance upon this Agreement. and not a penalty: If. prior to shipment. Purchaser cancels this Agreement or any pOllion thereof. for any reason not attributable to Quality Communications. Purchaser agrees to pay :)uality Communications an amount equal to 20% of the price of the products canceled if the cancellation occurs more than 21 days after Quality Communications receives Purchaser's order or Purchaser accepts this Agreement. If Purchaser cancels after shipment. Purchaser agrees to pay the above 20% of the price of the products canceled. return the products already shipped. and to pay Quality Communications an additional amount equal to 20% of the value of the returned products to cover the estimated costs of transportation and restocking. C. Custom Software PaYment Tenns are as provided in section A. above with the following exceptions. A non-refundable twenty percent (20%) down payment will be invoiced upon acceptance of Purchaser's order. A non-refundable progress payment of fOlly percent (40%) of order value will be invoiced upon Purchaser's approval of a Custom Software Development Specification, The final fOlly percent (40%) payment will be invoiced upon delivery by Quality Communications of Custom Software. . D Security System I Access Control System PaYment Tenns are as provided in Section A. above with the following exceptions. A non-refundable 20% down payment is required with Purchaser's order. Progress Payments will be invoiced based upon shipments to Purchaser. Quality Communications Services: Purchaser further agrees that Quality Communications offers various levels of services and that the Purchaser. after reviewing the same, has contracted with Quality Communications to perfonn only the services described in writing in this Agreement. Quality Communications denies liability for materials. supplies or work provided by other persons. Unless specifically contracted for. Quality Communications denies any supervisory role and this Agreement shall not commit Quality Communications to any supervisory role. including. but not limited to. the placement or routing of any wires or other Product. Security Interest: The Purchaser grants to Quality Communications. and Quality Communications retains. a security interest ;n all Product. Software. and proceeds thereof shipped pursuant to this Agreement until the Purchaser shall have made full payment for the Product. Such interest is intended to be effective as a purchase money security interest. Purchaser agrees that Quality Communications may file this Agreement as a financing statement. In the event of failure to make payment on the due date in accordance with tenns designated. the entire balance shall become due and payable at once. In case of default of payment. and to the extent pennitted by law, Quality Communications shall have the right to take possession of the Product or Software immediately. wherever it may be found, and remove it with or without process of law and may retain all money paid hereunder as LIQUIDATED DAMAGES and rental for said product or Software. For the purposes of assisting Quality Communications in perfecting its security interests. in any Quality Communications Product or Software delivered to the Purchaser, Purchaser agrees to inform Quality Communications immediately if any other entity has or may have any security interest. perfected or otherwise. in the Quality Communications Product or Software described on the face of this Agreement and shipped to Purchaser. The Purchaser agrees to pay Quality Communications' costs of collection, including without limitation reasonable attorneys fees and legal expenses. and that the same are secured by the security interest granted herein. The Purchaser shall not sell. prior to payment. (except in the ordinary course of business). mortgage. pledge. or lease said Product or Software without prior written pennission of Quality Communications. Limitation or Warranty: Purchaser understands that Quality Communications is not an Insurer, Subject to the limitations below, Quality Communications warrants that the Product (as distinguished from Software) be free from defects in material and workmanship under nonnal use for a period of one year from the date of fil".it beneficial use of ail or any part of the Product gr 18 months after Product shipment whichever is earlier, provided. however. that Quality Communications' sole liability. and purchaser's sole remedy. under said warranty. shall be limited to the repair or replacement of any Product. or parts thereof. which Quality Communications detennines to be defective at Quality Communications' sole option and subject to the availability of service personnel and parts. as detennined by Quality Communications. Quality Communications warrants expendable items including. but not limited to. video and print heads. television camera tubes. video monitor display tubes. and batteries and certain other products in accordance with the applicable manufacturer's warranty. Quality Communications does not warrant devices designed to fail in protecting a system such as. but not limited to, fuses and circuit breakers. Quality Communications warrants that any Quality Communications Software described in this Agreement. as well as '..Jat Software contained in or sold as part of any Product described in this Agreement, will substantially confonn to its published specifications in effect at the time of delivery and for ninety (90) days after delivery. However. Purchaser agrees and General Contract to Provide and Install Object Video at Key West Aitpoll T enns and Conditions - Page I Quality Communications Fire & Security. Inc. acknowledges thaI the Software may have inherem defects because of its complexity, Quality Communications' sole obligation with respect to software. and purchaser's sole remedy, shall be to make available published modifications. designed to correct inherent defects. which become availabic during the warranty period. THIS WARRANTY DOES NOT APPLY TO ANY PRODUCTS OR SOFTWARE WHICH HAVE BEEN SUBJECTED TO ABUSE, MISHAl'o'DLING. OR IMPROPER USE AS DETER..\fiNED BY QUALITY COMMUNICATIONS AND IS IN LIEU OF ALL OTHER WARRANTIES. EXPRESS OR IMPLIED. INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Warranty service will be performed at no charge belween the hour; of 8:00 am to 5:00 PM local time. Monday through Friday exclusive of Quality Communications' holidays. Warranty service requested to be performed at other than during Quality Communications' normal work hour; shall be chargeable at Quality Communications' standard ovenime rates, All repair; or adjustments that are or may become necessary under the warranty provisions of this agreement shall be performed only by an authorized representative of Quality Communications. Any repair;. adjustments. ~r interconnections performed by the purchaser or anyone other than an authorized Quality Communications representative shall void all warranties. LIMITATION OF LIABILITY: QUALITY COMMUNlCATIONS SHALL NOT BE LIABLE FOR ANY INDIREcr, INCIDENTAL ECONOMIC. OR CONSEQUENTIAL LOSS OR DAMAGE TO THE PURCHASER OR USER OF THIS PRODUcr ANDIOR SOFTWARE AR[SING OUT OF. AMONG OTHER THINGS. THE OPERATION OR FAILURE OF THE PRODUcr ANDIOR SOFTWARE TO OPERATE, THIS AGREEMENT, THE INSTALLATION. USE. DESIGN OR FUNcnON OF ANY QUALITY COMMUNICATIONS PRODUcr AND/OR SOFTWARE. LIMITA TION OF REMEDY: [t is under;tood and agreed that since it its impractical and extremely difficult to fix actual damages. if any. or ascenain what. if any. ponion of any loss or injury would be proximately caused by the failure of Quality Communications' Product and/or Software to operate. or to operate properly, or Quality Communications to perform any of its obligations or services described herein. UNDER NO CIRCUMSTANCES Will.. ')UALITY COMMUNICATIONS'S UABILITY FOR ANY DAMAGES. INCLUDING BUT NOT LIMITED TO THOSE. ARISING IN ANY WAY OUT OF THE INSTAllATION. USE. DES[GN OR FUNcnON OR FAILURE TO FUNCTION OF ANY PRODUcr AND SOFTWARE SOLD BY QUALITY COMMUNICATIONS BE IN EXCESS OF THE PURCHASE PRICE PAID FOR THE PRODUcr. SOFTWARE AND/OR SERVICES. TH[S SUM SHAll BE THE PURCHASER'S SOLE, COMPLETE AND EXCLUSIVE REMEDY AND SHALL BE PAID AND RECEIVED AS UQUIDATED DAMAGES OR A LIMITATION OF LIABILITY AMOUNT AGREED ON BY THE PARTIES AND NOT AS A PENALTY. IN NO CIRCUMSTANCES Wll.L QUALITY COMMUNICATIONS BE HELD LIABLE FOR ANY CLAIMS , LOSSES, DAMAGES OF INJURIES AR[SING FROM OR CAUSED BY. THE PURCHASER'S OR ANY OTHER PARTY'S MATER[AL. EQUIPMENT, AcnONS, OR OMISSIONS, [f Purchaser wishes Quality Communications to increase the amount of the above limitation of liability or liquidated damages amount stated in this Agreement. Purchaser may inquire about obtaining an increase to this amount in exchange for an increased purchase or contract price. Under no circumstances will an incrcase in the purchase or contract price be construed to mean that Quality Communications is an insurer or that the obligations of obtaining and maintaining insurance are not with the Purchaser, INSURANCE OBLIGATIONS: It is under;tood and agreed by the Purchaser that Quality Communications is not an insurer and that it is the Purchaser's obligation to obtain and maintain any insurance covering any losses to propeny or per;onal injury or any other damage which may occur at the premises where the Quality Communications Product. Software or Services. which form the basis of this Agreement. are delivered. assembled. installed. used. or performed. The Purchaser agrees to list Quality Communications as an additional insured on all such policies and to provide Quality Communications a copy of the Cenificate of Insurance upon request. Purchaser funher agrees that the Cenificate of Insurance shall contain a provision that coverage afforded under the policies will not be canceled or materially altered until at least thiny (30) days after wrillen notice is given to Quality Communications. WAIVER OF SUBROGATION: Purchaser does hereby for itself and all other panies claiming under it release and discharge Quality Communications from and against all hazards covered by Purchaser's insurance. it being expressly agreed and under;tood that no insurance company, insurer, or any other third party will have any right of subrogation against Quality Communications. LIMITATION OF ACTIONS: The Purchaser hereby agrees that no claim. suit or action of any kind shall be brought against Quality Communications. its agents, employees. and/or officer; more than one year after the claim arises. whether known or unknown when the claim arises, provided however, that if there is a claim, suit. or cause of action arising under the Warranty. it must be brought. if at all. within six months of expiration of the Warranty period stated above. This clause is in no way to be interpreted as an extension of the Express Warranty stated in paragraph 4 above. DRA WINGS: All drawings and wire diagrams provided by Quality Communications in connection with this Agreement are protected under United States Copyright Laws and intended solely for the use of the installing contractor as a guide for the fabrication and installation of the system. These drawings and wire diagrams are prepared in accordance with the project plans and specifications available to Quality Communications at the time of the bid and are NOT intended to be System design or approval documents. Quality Communications is not a design professional. Under no circumstances is any clause in this agreement or any actions taken by Quality Communications to be construed in such a way as to impose upon Quality Communications the duties or liabilities of a design professional. ' CHANGE ORDERS: This Agreement can be modified. amended or altered only by an Agreement in writing. signed by both panies or their duly authorized representatives. General Contract to Provide and Install Object Video at Key West Airpon Terms and Conditions. page2 3~ Quality Communications Fire & Security. Inc. SOFTWARE LICENSE AND USE: Software Products provided by Quality Communications are licensed. not sold. to the Customer. Customer has only a non-exclusive. non-transferable license to use the Software ("License"). Quality Communications ret?;ns all right, title and interest to the Software. In some cases. Quality Communications may have a right to relicense the Software, "Software" shall mean any pan of Software provided by Quality Communications in machine readable fOml indicated on this Agreement or contained in any Quality Communications Product indicated on this Agreement or ordered subsequently, any modified versions and all related documentation. Customer shall use the Software only on the Product and at the Product Site listed herein. Any Software received by Customer at any time is subject to this Agreement. The License teml begins upon delivery of the Software and continues until the last use of the Software with the Product, unless temlinated. Quality Communications may temlinate this License if Customer: (I) fails to perfOml any obligation under the Agreement; (2) ceases to do business as a going concern; or (3) has its assets aSSIgned or attached by law, Within five (5) days after the License temlinates, Customer shall. at its expense. return the Software to Quality Communications and destroy all copies of the Software. including memory or storage copies, PROTECTION AND NON.DISCLOSURE: Customer shall maintain the Software in strict confidence and shall disclose it only to its employees requiring access. Customer shall implement adequate procedures controlling access to and use of the Software consistent with the protection of Quality Communications' rights. Customer may duplicate Software only for internal use on the Product according to Quality Communications instructions. The Quality Communications legend restricting Software use must appear on any copies of the Software. Customer shall not reverse compile the Software, TITLE: The Software and any relevant Product as described in this Agreement shall remain the personal propeny of Quality Communications, even if attached to realty or other propeny, Customer shall not sell. assign, encumber or remove the Product or Software without the prior written consent of Quality Communications. Customer shall perfOml all necessary acts to preserve and protect the right. title and interest of Quality Communications in the Product and Software including but not limited to signing any financing statements or other documents requested by Quality Communications or its agents. Quality Communications may inspect the Product and Software during nOmlal business hours and may affix labels or notices of ownership on the Product and Software. FORCE MAJEURE: Quality Communications shall not be liable for any loss or damage of any kind resulting from delay. inability to deliver, or install. or to perfoml any other work under this Agreement on account of fire, flood. labor problems, access to premises, accidents. acts of civil or military authorities, acts of God. or from any other causes beyond Quality Communications' control. TAXES, LICENSES AND PERMITS: The Purchaser is responsible for obtaining all licenses, and pemlits and for paying all applicable taxes and fees unless otherwise agreed to in writing. INST ALLA nON: The installation of the Goods is included as specifically provided for in this Agreement. DRUG FREE WORKPLACE POLICY: Quality Communications has a written drug free workplace policy available for review by written request. EXPORT COMPLIANCE: All sales hereunder shall at all times be subject to the expon control laws and regulations of the Government of the United States. Purchaser agrees that it shall not make any disposition, by way of trans-shipment. re-expon. diversion. or otherwise. except as said laws and regulations may expressly provide. Purchaser expressly agrees, to the fullest extent pemlitted by law, to indemnify Quality Communications for any and all damage arising from the violation of any expon law or regulation with respect to any goods delivered to Purchaser or at Purchaser's direction. Said damages include. but are not limited to, legal fees. coun costs. expen fees, and any and all other resulting costs and expenses. EVENTS OF DEFAULT: Purchaser shall be in default of this Agreement upon the occurrence of, but not limited to. any of the following: A. The Purchaser's failure to make due and punctual payment of any payment due pursuant to this Agreement; B. The Purchaser's failure to perfoml any obligation under this Agreement; C. An order. judgment or decree entered. with the approval or consent of Quality Communications. by any coun of competent jurisdiction. approving a petition seeking reorganization of the Purchaser or appointing a receiver. trustee. or liquidator (or other officer having power. under applicable law, similar to those of a receiver. trustee. or liquidator) of the Purchaser or of all or a major ponion of its assets. and such order. judgment. or decree shall continue unstayed and in effect for any period of si:o;ty (60) consecutive days; D. The Purchaser fails to provide Quality Communications with adequate assurances of due perfomlance under the Agreement. after receiving a written request for same from Quality Communications; E. The Purchaser's fi nancial posi tion materially deteriorates; or F, The Purchaser shall cease to do business as a going concern. GENERAL: Any provision of this Agreement which is prohibited by the law of any state shall. as to such state. be ineffective to the extent of such provision without invalidating the remaining provisions of the Agreement. This Agreement. shall be construed under the laws of the Stale of Florida. General Contract to Provide and Install Object Video at Key West Airpon Teml5 and Conditions - Page3 ....... _I 1..:)8BYING AND CONJ'UCf OF INTI:REsr CLA~ ~. ORN STATEMENT tlNDJ:B. OIlDlNANCE NO. 010-1990 MONROI COWrY. FLORIDA E'f.HlCS CLAUSE ~I.v.. 'l1~ - ~ C-P-rI: ~ 1hal hoIil hu DOt ~~....w.I or otherwise had ~~ ')1\ bislita behalf my former County officer or employee in viola.ition of . , . I , I Section 2 ofOrdim,::,,~ No. to-I990 or any County officer Qt" employee in violation c>f . . I , i Section 3 ofOrdim.l:.t:c No. 10-1990. For breech or vio1atioo oftbis provision the ccAunty , .,. . I 111&)', in ,its disc~':~1 tc:mliDate this contract without liability IDd may also, in ita d~on. . i . deduct from the em: ';tact ar "".....base price, or otbcr:wise recOver. 1ho fullamoum of aW fee, .. Y-- , I . . . I commission, percell UE#, .tift, or consideration peidto the :fonner County officer or ~loyec. I .. -fil~&t- -rP . . Qate: sJ2..ct {o If ; I STATE OF ~\Dr-jd~ COUNrYOF _~( LJGr?:f I . .1 PERsONAU Y M. 'jWtED BEFOlm ME. the uMcrsiaDCci aulborlty. .. -JOhn ~ who, ~er firSt hem, swam by ~ aB:'lXOd ~ . , I sipatun: (Dame of:i::.~UviduaJ sisning) in the space provided above on this ,C::; ~y of ~ _~~.2od i My commission,c:;(p, ~:s: OMB - MCP FOR;'~ ;14 """~:'-"" . Cari Breaban . /!~"'f. ~ CDl1l!l'j'~iOil #D 0174692 ;~. .~:~: ExplJ'CS. Oct 05. 2004 "'~~O;;;.~-' ~nd;;.d Thru """1" 'AIlIlIIIC Bonding Co.,/nc. R9C9ived Tj~e'Ma:.24. 2:13PM I ,~ . . _ ... .... _ _ ... . 1_." ... _ _ ,f.~JI.LIC EtiTlTY C~IME .Sf A TE"1E!fi "A persOn or affiliate who has been placed on the convicted vendOr list following a C011\,jction for public entity crime may not submit a bi~ on a contract to ~.,'ide any goods or services to a'. public entity. may n~t submit a bid on a cant flct with a public entity for the construction or repalr of a public buiJdiIlg (Ir public work, may not submit bidS on leases ofr~ . I property to pliFic entity, may not be awarded or perform work asia contractor,. sup)Her. subcontractor, or consultant under a contract ~th any public entity~ a;;d may not transact business with any public entity ~n excess of the thre$ok amount provided in Section 287.017, for CAT:EGqRY TWO for a ~;r.i:id of 36 months from the date ofbeing pla~ on ~e convicted vencJ..,w list. t, . . By: _tJP ~ ,Received Tille'Mar.24. 2:13PM I I . I !"'IIIr'If'nnI. GS VOICE I DATA I FIBER SYSTEMS DESIBN . INSTALLATION . FINANCINB February 9,2004 Jerome Fain - Airport Security Director Key West International Airport 3491 S. Roosevelt Blvd. Key West, Florida 33040 Ref: TSA Grant for Pilot Projects Dear Mr. Fain: Thought I would take a moment to summarize our conversations to this point. It was good to hear that the airport is on the county agenda to accept the grant money this month. Of the seven (7) airports to be approved for these grants, Key West is the only one who has not yet accepted the grant and started the project. Obviously, we want to do what we can to help. We are also concerned at the recent suggestion that Key West might "bid" out this project. Quality Communications Fire and Security, Inc. worked closely with Object Video and Key West International Airport to write this grant and push it through the TSA. If you reference the grant proposal, Oualitv Communications Fire and Security is s~ecificallv named as the contractor for this iob. The funds were awarded for this project to be installed by this team. There are many additional reasons, QCFSI and Object Video (OV) must execute this work. QCFSI is currently installing the new base camera system. This base system i~ tied into the TSA grant system on many levels (hardware and software). QCFSI must be the integrator to tie into this system to maintain the integrity of the base system and to provide any type of warranty. QCFSI and OV designed this entire system specifically to integrate into the existing system and meet specific TSA guidelines for security and testing. We are using six (6) of the cameras in the QCFSI base project for part of the TSA project. QCFSI, as you can see from the attached letter, is the only Florida certified Object Video installer/service in Florida. We are the only ones who can do this. QCFSI and Object Video are specifically mentioned in the grant under "Project Team", and it the project was funded by the TSA with this understanding. 3700 SW 30TH AVE- FT LAUDERDALE, FL. 33312 - PHONE (954) 584.4111 - FAX: (954) 584.7940 '.('LALlTY IS 1'-: F',i:!('..' :;!'-:.:: \X'f u",- -2- February 9,2004 If you were to bid this job, you would have to hire an engineering consultant to "design" a system as well as someone to write specifications and bid documents. Not only are these expenses not covered by your grant ($20,000-$30,000), it would take 6-9 months for this process to occur. You must accept and use this grant by ~e end of the year. This includes the testing phase of the project. Basically, installation needs to be finished by May. In addition, you would violate all confidentiality rules in place by the TSA. This is a need-to-know project and should not be advertised publicly. This is why the grant asked for the project team up front. QCFSI and Object Video were granted clearance to do this project when Key West was chosen for the grant. Our companies were thoroughly researched by the TSA. Jerome, QCFSI feels very strongly that it is in the best interests of Key West International Airport to award this job to our team. As you know, QCFSI did all of the up-front design, engineering, and document preparation and submittal. All of this ($12,000 in billable work) was done at no cost to Key West Airport as we were to recoup our costs as part of this grant. If the grant is accepted by Key West, it is accepted for a specific design, product and team. That was its purpose. Finally, by selecting QCFSI and OV as the grant stated, Key West International airport would minimize its responsibility, as the airport would be using QCFSI's design and team, as aooroved by the TSA, to execute this project. I am available to talk to your county attorney at any time about this project. It is our hope that, at your county meeting in mid-February, the county would not only accept the grant money from the TSA, but also award the project, in its entirety, to Quality Communications Fire and Security, Inc. as the prime contractor. We would., of course, then subcontract the software portion of the job to Object Video and proceed with installation. Should you have any questions, or require any further information, please do not hesitate to contact me, Sincerely, /} / /-;) /}~'v~:r C< .J II ~ .(JvJlfi<-oyf-- Bart C. Savage Account Executive QUALITY COMMUNICATIONS FIRE AND SECURITY; Inc. ~ ObjectVideoN 11600 Sunrise Ve)ley Drive, Suite 290 Reston, Virginia 20191 Phone (703)654-9300 Fax (703)654-9399 www.obiectvideo.com February 2, 2004 Jerome Fain Airport Security Director Key West International Airport Key West, Florida Dear Director Fain, In reference to the TSA-FAA Grant Application for using ObjectVideo intelligent video surveillance to enhance the perimeter security of Key West Airport, ObjectVideo indicated a desire to work with Quality Communications, Inc., (QCI). QCI is a preferred partner of ObjectVideo, as it is the only integrator in Florida who is trained and certified to support and install ObjectVideo technology. As such, QCI will be responsible for providing Key West Airport with first tier troubleshooting and maintenance support, as well as helping to install the system. ObjectVideo will, of course, provide factory support from our offices in Reston, Virginia, but aCI is the only company certified to provide customer support for us in Florida. Sincerely, Melchior Baltazar Director, Critical Infrastructure Protection .~ July 16, 2003 To: Nicole Feriozzi WJ Hughes Technical Center A viation Research Center Office, ACX-50 Atlantic City International Airport, NJ 08405 Proposal For TSA Grant to Airport Authorities for Pilot Projects For Key West International Airport Key West International Airport is pleased to submit the enclosed proposal in response to the TSA Announcement of Funding for Grants (Cooperative Agreements) to Airport Authorities for Pilot Projects, dated June 12,2003. Should you have any questions regarding this proposal or the associated documents, please don't hesitate to contact us. ~~ COVER SHEET FOR PROPOSALS TO THE FEDERAL AVIATION ADMINISTRATION Form Approved: a.M.B, No 2120-0559 u.s. DeporTment 01 'tcnsportorlon Federal Aviation Admlnlstratlon FOR CONSIDERATION BY FAA ORGANIZATION UNIT Indicate the most specific unit known i.e, program, division, etc, Dept. of Homeland Security / Transportation Security Administration EMPLOYER IDENTIFICATION NUMBER (EIN) or TAXPAYER IDENTIFICATION NUMBER (TIN) 59-6000749 I NAME OF ORGANIZATION TO WHICH AWARD SHOULD BE MADE: Kev West International Air ort ADDRESS OF ORGANIZATION (INCLUDE ZIP CODE) SOLICITATION NUMBER Announcement for Funding of Grants (Cooperative Agreements) to Airport Authorities for Pilot Projects, June 12,2003 SHOW PREVIOUS GRANT NUM8ER IF THIS IS A SUPPLEMENT TO AN EXISTING GRANT 3491 South Roosevelt Blvd., Ke West, FL 33040 CONGRESSIONAL DISTRICT 20th SUBMITTING ORGANIZATlm: o ACADEMIC INSTITUTION IS THIS PROPOSAL BEING SUBMITTED TO ANOTHER FEDERAL AGENCY? YES_ NO-X- IF YES. LIST ACRONYM(S) INSTITUTION NAME (IF KNOWN) Not applicable COUNTY Monroe o NON-PROFIT ORG xD FOR.PROFIT ORG o OTHER BRANCH/CAMPUS/OTHER COMPONENT (Where work is performed, if different from above) TITLE OF PROPOSED PROJECT The Use of Smart Video Surveillance to Provide Enhanced Perimeter Security at Key West International Airport. REQUESTED AMOUNT: $195,400.00 PI/PO DEPARTMENT Not applicable PROPOSED DURATION 12 months REQUESTED STARTING DATE 9/1/2003 PI/PO FAX NUMBER PI/PO PHONE NUMBER NAMES (TYPED) SOCIAL SECURITY NO, PI/PO Po:or l><iortClA f HIGHEST DEGREE & YEAR #', .{ ch o,//??! SIGNATURE I 51' signing and submitting this proposal, the autMrlzed official of the applicant Institution IS provloing cer1lficatlon regarding federal debt status, debarment ana suspenSion. I arug-tree workplace. and lobbying activities , (If answering .yes. to either, please provide explanation.) NO I is lne organization delinquent in any Federal debt? I IS tne organization or ItS pnncipals presently debarred, suspended, proposed for debarment. declared Ineligible. or voluntary excluded from covered transactions by any Federal department or agency? I AUTHORIZED INSTITUTIONAL REPRESENTATIVE ! NAMEITITLE (TYPED) Direct0r Jerome Fain J I ,... .,...' . TELEPHONE NUMBER 305-296-8099 ;:-;.:. r';)'m 955:..' (' ::'.;5. Superseoes Prev!oiJs EdItion I DATE 7-/t' -t:J,S 74 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport Table of Contents 1. Pro j ec t Sum m ary ........ ...... ............ ...... ............... ........................................................................ .......... 2 ~o j ect Descri p ti 0 n .......... ..... ........: ......... ...... ..... .......:....................... ........................... .................. ......3 ~ Project Team..... ....... ...... ...... ....... ................ .......... ........ ............ ...,......,........................................3 2.2. Purpose......................................................................................................................... ................4 2.3. Objectives........ .............. ...... ........ ........................... .... ........................ .................................... ...,..4 2.4. Pilot Project Work Plan.......................................................,..,.....................................................6 2.4.1. Secure Virtual Perimeter - SIDA After Hours .....................,...........................,..................,...6 2.4.2, Enhance Perimeter Security - Aircraft Quarantine Area............,.. ,................. ,......................8 2.4.3, Enhance Perimeter Security - Fuel Depot .................,...........................,....,........................... 9 2.5. Relation of Proposed Work to Other Work in Progress and Long Term Goals ..,......................11 2.6. Project Reporting.......... .......... ............... ............................................................................ .........1 ] 3. P rinci pal Investiga tor Biographical Sketch .....................................................................................12 4. Bib Ii 0 gr a p h Y . ........... ............................. ....... ..................................................................................... ..13 5. A P pen rli ces............................. ....... ..... ................................................................................... ............. .16 5.1. Facilities and Equipment ...............................................................................................................16 5.2. Summary Proposal Budget Form....................................................................................................] 7 1 The Use of Smart "ideo Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 1. Project Summary U.S. airports currently face an extremely challenging security environment, with threats ranging from common, opportunistic criminal-activity, through activities by more sophisticated organized criminal elements to terrorist activity. As advances are made in fields, like computer vision, with the potential to improve physical security systems, it is important to make the benefits of those advances, in the form of enhanced security systems or capabilities, available as soon as possible. In order to ensure that promising R&D efforts do translate into gains for airport security, Key West International Airport, in concert with ObjectVideo™, is proposing an innovative pilot project to exploit the advanced features of ObjectVideo'sTM Video Early Warning (hereinafter VEW) product to provide a virtual, secure perimeter for the airport's SIDA area, and to strengthen perimeter security for the aircraft quarantine area and the fuel depot. An aggressive plan is being proposed for the deployment and testing of smart video surveillance capabilities (including automatic target detection, classification and tracking, detection of threats like left bags and loitering in security areas, etc) at Key West International Airport with the goal of enabling 6e fast and efficient proliferation of the most successful of these capabilities to other airports in the US. 2 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 2. Project Description U.S. airports currently face an extremely challenging security environment, with threats ranging from common, opportunistic criminal activity (e.g. thefts by untrustworthy baggage handlers), through activities by more sophisticated organized criminal elements (e.g. organized drug smuggling efforts) to terrorist activity (e.g. terrorist operatives attempting to bring down airliners with shoulder-held rocket launchers). As advances are made in fields, like computer vision, with the potential to improve physical security systems, it is important to make the benefits of those advances, in the fornl of enhanced security systems or capabilities, available as soon as possible. In this response to the Department of Homeland Security (hereinafter DHS) / Transportation Security Administration (hereinafter TSA) announcement of funding for grants to airport authorities for pilot projects, the Key West International Airport (hereinafter KWT) is proposing an extensive pilot project to bring smart video surveillance capabilities and advanced computer vision techniques to bear in providing an innovative virtual secure perimeter for KWI's SIDA area, and strengthening perimeter security for other vital areas at the airport. Project Team For this effort, KWI has assembled an outstanding team that includes ObjectVideo™ and Quality Communications Fire & Security of Florida, Inc. (hereinafter QCI). ObjectVideo™, the leading developer of intelligent video surveillance software for physical security applications, was founded in 1998 by a team of former research scientists from the Defense Advanced Research Projects Agency (hereinafter DARPA) whose expertise in an elite area of artificial intelligence known as computer vision provided the nucleus around which the company was formed. In keeping with this foundation, ObjectVideo'sTM corporate mission is to provide a reliable conduit for the efficient movement of computer vision research from the laboratory into commercially successful software products and solutions addressing both the current and future video surveillance needs of customers and potential customers. This corporate mission encompasses three principal objectives: · Research aimed at advancing the state-of-the-art in the field of computer vision · Business practices aimed at accomplishing the successful, timely, and efficient transfer of advances in computer vision from laboratory to commercially viable softw"re and service offerings. · The maintenance of a high level of integrity in all dealings, and at all levels of the company. Headquartered in Reston, Virginia, ObjectVideo™ currently has close to 50 employees, with the majority being involved in product development or the delivery of professional services. ObjectVideo'sTM client list includes both commercial entities such as BP, and government organizations such as the US Department of Energy, the US Customs Service, Andrews Air Force Base, the Office of Naval Research, and the Pentagon Force Protection Agency. ObjectVideoTM was founded on the concept of providing a reliable conduit for the timely, efficient movement of computer vision research from the laboratory into commercially successful software products and solutions and continues to live up to that goal by bringing advanced video surveillance and analysis capabilities to market for its growing customer base. QCI is an experienced integrator and installer specializing in all aspects of low-voltage and telecommunications cabling systems, with demonstrated expertise in handling installations of voice grade cabling, state-of-the-art fiber optics, security systems, and access control systems, among others. Founded in 1990, the company currently has more than 60 technicians and RCDDs on staff, and boasts a management team with over 100 years of combined technical and \ \ '~ 3 The use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key \Vest International Airport engineering experience. QeI's cOI}>orate objectives are to maintain a competitive edge while providing the highest quality of service possible to their growing customer base. Figure 1: Key West International Airport - Overview 2.2. Purpose The pUI}>ose of the pilot project proposed here is to exploit the advanced features of ObjectVideo'sTM Video Early Warning (hereinafter VEW) product to investigate the use of secure virtual perimeters and to provide significantly enhanced security for physically bounded perimeters (e.g. perimeters bounded by a perimeter fence) at KWI. A detailed work plan has been developed enabling an aggressive effort to accelerate the move of smart video surveillance technologies currently in product development andlor testing from that environment into use in "real world" situations and, by doing so, to significantly enhance security capabilities available to aiI}>orts across the US. KWI is confident that the team assembled for this effort can successfully implement the proposed enhancements in a way that will not only demonstrate their value but will also establish a solid basis for their proliferation to other aiI}>orts throughout the US. KWI is confident that this pilot effort will serve as a solid initial step in enhancing air transportation safety on a national level. 2.3. Objectives The overall goal of the proposed pilot project is the enhancement of physical security at Key West International AiI}>ort by establishing a secure virtual perimeter to provide after-hours protection for the aiI}>ort's SIDA area, and strengthening security along existing physical perimeter fence lines bordering KWI's aircraft quarantine area and the aiI}>ort's fuel depot. These goals are reflected in the objectives established for this effort. Many of these objectives can be met by making use of features included in the current version ofObjectVideo's™ VEW software application while others will require the early implementation of features currently scheduled for future versions of the product. ObjectVideo'sTM schedule for implementalion and deployment of 4 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport enhancements to the VEW application will be adjusted in order to ensure that all of the objectives listed here are met within the time scheduled for this pilot project. The table below lists the objectives for this area, and provides a brief description for each objective. Objective Description Set Virtual A line is positioned across the image of an area being observed (e.g. across Tripwires a corridor, along a fenceline) when a person or vehicle moving through the area crosses the point designated by the line, or virtual tripwire, an alert is generated Establish Areas of The image of an area under observation can be sectioned and sections Interest / designated as areas of interest or areas of disinterest. Actions or events Disinterest taking place inside an area of interest will generate alerts. Actions or events occurring inside an area of disinterest will be ignored by the system Detect Loitering The system will detect people and/or vehicles remaining inside an area of interest for longer than a specified amount of time, and will generate an alert. Detect the The system will detect the removal of objects from areas of interest (e.g. Removal or the removal of a painting from its usual place on a gallery or museum Insertion of wall) or the insertion of an object into an area of interest (e.g. an Objects in Areas unattended bag or backpack left in an area where luggage should not be of Interest unattended) and will generate an alert. Detect Gross The system will detect changes in the image that may indicate tampering Changes with the camera. These might include the canlera's have been moved from its original position (pointed away from the area under observation), the camera being covered, the lens being obscured in some other way (e.g. by someone spray-painting the lens), or bright light being shone into the camera to blind it. The system will generate an alert when any of these conditions is detected. Detect and Track The system will detect people, vehicles, or other objects, or targets, of Objects interest and will be able to track those targets as they move through the area being observed. Count Tracked The system will be able to count objects, or targets, being tracked. Objects Classify Tracked The system will recognize different classes, or types, of objects, such as Objects people, and vehicles. The system also allows for user defined classes, which can be used to designate objects such as specific types of vehicles allowed within a SIDA area. Objects will be classified by attributes such as size, motion, and color. Perform Multi- The system will be capable of tracking a specific target (e.g. person or Camera Target vehicle) as the target moves through the fields of view of multiple cameras Tracking and and will maintain consistent information on the target's motion or Handoff trajectory. 5 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport Perform The system will stabilize images by compensating for camera motion (e.g. Automatic Image a stationary camera mount being shaken by a strong wind). Stabilization Provide a Map- The user interface display will be based on a map or satellite image of the site (or relevant section of the site) and will display icons indicating Based GUI camera placement and alert status. Alerts generated by the system will be clearly indicated on the interface display. 2.4. Pilot Project Work Plan The work plan presented in this section has been developed for implementation of the pilot project proposed here for KWI. The project involves the implementation of a secure virtual perimeter for the entire SIDA area at the airport and the significant enhancement of security along existing perimeter fencelines bordering the aircraft quarantine area and the fuel depot. As an initial step in this process, ObjectVideo™ VEW will be installed on a server residing in a centralized location at KWI. The server and installed copy of YEW will be capable of supporting all camera ~nstallations (both existing and new) required for this effort. Where necessary, infrastructure will be enhanced and fiber optic cable will be laid to provide high speed connections between cameras and server. The pilot project here proposed involves two specific areas of endeavor: I) The installation of cameras and the development of YEW rules necessary to establish a secure, virtual perimeter around the SIDA area. This perimeter will only be activated after normal airport hours, to protect that area when normal airport operations have shut down for the evening. 2) The installation of cameras and the development of YEW rules necessary to set up smart video surveillance of existing physical perimeter fencelines bordering the aircraft quarantine area, and the airport's fuel depot. Unlike the secure virtual SIDA perimeter, these measures will be active around the clock. Each of these proposed enhancements will involve the physical deployment of equipment such as cameras, camera mounts, illuminators, etc. as well as the implementation of rule sets, designed to deal with the specific security challenges presented by aspect of the project, in the bbjectVideo™ VEW system. Sections 2.4.1., 2.4.2., and 2.4.3. describe the sites or areas involved in this pilot project, the security challenges associated with each of these sites, and the measures proposed to provide the innovative virtual perimeter approach and the significant enhancements to perimeter security. 2.4.1. Secure Virtual Perimeter - SIDA After Hours While operations in the SIDA area at KWI are physically secured by the presence of airport. and specifically SIDA area assigned, personnel during normal airport operating hours, KWI is unusual among international airports in that normal airport operations shut down at a certain time in the evening and remain shut down until the following morning. It is establishing and maintaining security in this SIDA area in the hours during which the airport is shut down that are a serious concern. The installation of a permanent physical barrier such as a fence is not compatible with normal airport operations in and around this area therefore there is no easy physical way to ensure that the area is secure during those hours. KWI is, therefore, proposing an 6 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Securit)' At Key West International Airport innovative approach in which the capabilities of ObjectVideo'sTM VEW application are used to establish a virtual barrier effectively securing the airport's SIDA area. i '''tt' ... ... Figure 2: SIDA area at Key West International showing proposed camera coverage. SIDA area is the rectangular area, elongated triangular areas indicate fields of view providing almost complete coverage of the area. The SIDA area at KWI IS a long, rectangular area covering the area in front of the terminal as adjacent buildings. The physical enhancements required for the implementation of a virtual perimeter barrier include the installation of six IDN (Day / Night) cameras with overlapping fields of view providing almost complete coverage of the SIDA area. The virtual primeter itself is established by developing a set of rules in YEW that will enable the system to deal with situations that represent potential threats in this area. I) Designate an area of interest encompassing the SIDA and the some of the area immediately adjacent to it. This establishes the boundaries of the area in which rules (e.g. loitering detection) designated for this area will be applied. Establish tripwires near and at the boundary of the Tripwire 1 _ Medium Level Alert secured area. Tripwires will be established to enable the generation of alerts when people or Tripwire 2 _ High Level Alert vehicles are detected approaching the perimeter. These tripwires will be drawn in at least three places, one outside of the SIDA boundary, one at the SIDA boundary, and one just inside the boundary. An escalating series of alerts will be generated, dependent upon the tripwire crossed, to inform security personnel of the potential seriousness of any incursion threat. Figure 3 provides an example of the placement of these tripwires and the urgency level of the alerts generated at each point. Classify targets approaching or intruding into the SIDA area. The system will not only detect people, vehicles, etc. approaching or crossing into the SIDA area, but will also be able to classify the target and to deliver information on the type of target to security personnel. Target classifications will include not only target types such as people, vehicles, aircraft, etc. that represent potential threats and should generate alerts, but also targets such as wildlife that do not represent a threat and which should not generate alerts. Detect loitering in the area of interest adjacent to the SIDA area. People or vehicles loitering in this area could represent a serious threat. Loiterers could be individuals making observations or testing security provisions in preparation for an attack or individuals actively intending to carry out such an attack. . A set of rules will, therefore. be implemented enabling the detection of people, vehicles, etc. that remain in this area of interest for over a specified amount of time. If loitering is detected alerts are generated to inform security personnel. 2) 3) 4) ...., Figure 3: Illustrates placement of tripwires and levels ')f associated alerts. 7 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 5) Detect the presence of bags, packages, or other suspicious objects in the area of interest. Objects left in the area of interest could constitute a significant threat to the SIDA. Rules will be implemented, therefore, to detect the insertion of any object into the area of interest, and to generate an ~lert to inform security personnel of the presence of the suspicious object. 6) Detect the removal of an object from the area of interest. Removal of objects from the SIDA could indicate theft or attempted theft. The system will detect when/if objects are removed from the area and will generate an alert for security personnel. 7) Detect any possible tampering or attempted tampering with surveillance cameras. People wishing or intending to evade the surveillance system set up to protect the SIDA perimeter may attempt to do so by tampering with the surveillance cameras set up in the area. Rules will be implemented detecting tampering such as blinding the cameras in some way (covering cameras, spray painting lenses, etc), turning cameras off target, or interrupting either power to the cameras or video feed from the cameras. Detection of " any tampering or tampering attempts will generate alerts for security personnel. 2.4.2. Enh.mce Perimeter Security - Aircraft Quarantine Area One of the recurring problems experienced at KWI is the landing of aircraft that have been hijacked or stolen and flown from Cuba to Key West. When hijacked or stolen aircraft land at Key West the. aircraft themselves are seized by Federal law enforcement officials and are quarantined in an area of the airport to the right of the SIDA area, and bordered by the airport perimeter fence. The area is problematic for a number ofreasons. 1 ) While bordered by the airport perimeter fence on one side, this area is completely open on the other sides, with no physical barrier to prevent incursion into the area. "'...--.... , ,. / , "':l , ~ I \ :!. Aircraft 3 ~ Quarantine ;;) ., Area ~ eo: QJ ~ . ~ \ I ::s . ,., . , / It> : ~ , ,. . ~ .........-.... .; . I 0 . :: . . . . . . . . Figure 4: Aircraft qua;antine area, proposed coverage and trir}\'ire placement. Cross hatched area indicates proposed camera coverage. Solid red lines indicate tripwire placement. A signi~cant part of the aircraft quarantine area bordered by the airport perimeter fence is placed so that it is out of sight of guards in a central station, and is not currently covered by any surveillance cameras. This . constitutes a significant "blind spot". The perimeter fence section bordering the aircraft quarantine area faces a heavily wooded area just outside of that fence. The trees along this section of fence encroach closely on, and in some areas, overhang the fence. This area could easily constitute cover for people attempting to get into the quarantine area by going over the fence. The installation of cameras providing coverage of the SIDA area will also provide coverage of the aircraft quarantine area. This coverage will allow for the set up of rules in ObjectVideoTM VEW enabling KWI to virtually secure this area. These rules will include those listed below. 1) Designate an area of interest encompassing not only the aircraft quarantine area but much of the area around it, up to and slightly past the airport perimeter fence. The area of interest should extend beyond the quarantine are on the three sides that are not bordered 2) 3) 8 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport by the perimeter fence. The area of interest should cover all of the area that lies in the "blind spot". 2) Establish tripwires surrounding the area, and slightly beyond the fence. Tripwires will be established to enable the generation of alerts when people or vehicles are detected approaching or entering the area. Tripwires will be placed just inside the perimeter fence, and on the three unprotected sides of the area. A trip wire may also be placed on the far side of the perimeter fence. 3) Classify targets approaching or intruding into the aircraft quarantine area. The system will not only detect people, vehicles, etc. approaching or crossing into this area, but will also be able to classify the target and to deliver information on the type of target to security personnel. Target classifications will include not only target types such as people, vehicles, aircraft, etc. that represent potential threats and should generate alerts, but might also include targets such as wildlife that do not represent a threat and which should not generate alerts. 4) Detect loitering in the area of interest adjacent to the aircraft quarantine area. People or vehicles loitering in this area could be planning or attempting an incursion into this area. A set of rules will, therefore, be implemented enabling the detection of people, vehicles, etc. that remain in this area of interest for over a specified amount of time. If loitering is detected alerts are generated to inform security personnel. 5) Detect the presence of bags, packages, or other suspicious objects in the area of interest. Rules will be implemented, therefore, to detect the insertion of any object into the area of interest, and to generate an alert to inform security personnel of the presence of the suspicious object. 6) Detect the removal of an object from the area of interest. The system will detect when/if objects are removed from the area and will generate an alert for security personnel. 7) Detect any possible tampering or attempted tampering with surveillance cameras. People wishing or intending to evade the surveillance system set up to protect the aircraft quarantine area may attempt to do so by tampering with the surveillance cameras set up in the area. Rules will be implemented detecting tampering such as blinding the cameras in some way (covering cameras, spray painting lenses, etc), turning cameras off target, or interrupting either power to the cameras or video feed from the camera~; Detection of any tampering or tampering attempts will generate alerts for security personnel. 2.4.3. Enhance Perimeter Security - Fuel Depot The KWI fuel depot lies beyond the terminal buildings and represents an area that requires protection for obvious reasons. Any attempt at sabotage at this site could cause serious damage to the airport facilities and could endanger airport staff or passengers. While the Fuel Depot is protected by a perimeter fence, surveillance of the area should be enhanced to prevent intruders entering the area by climbing the fence and to prevent incidents such as those where objects (e.g. explosive devices) are either thrown over the fence or left just outside the fence. In order to better secure the fuel depot area two cameras will be installed to cover the area, and will be connected to the ObjectVideo™ VEW system. A set of rules will be implemented in the VEW system to provide the coverage required for this area. The rules that will be implemented for this area will include those listed here. 9 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 1) Designate an area of interest encompassing not only the fuel depot itself but also including a significant area around the depot's perimeter fence. This will define the area in which specified actions will trigger alerts for security personnel. 2) Establish tripwires surrounding in the area slightly beyond the fence. Tripwires will be established to enable the generation of alerts when people or vehicles are detected in the areas immediately adjacent to the fence. 3) Classify targets approaching or intruding into the fuel depot area. The system will not only detect people, vehicles, etc. approaching or crossing into this area, but will also be able to classify the target and to deliver information on the type of target to security personnel. Target classifications will include not only target types such as people, vehicles, etc. that represent potential threats and sho~ld generate alerts. Classifications will also be developed for targets such as wildlife that do not represent a threat and which will be classified in such a way as to allow the development of rules specifying that Figure 5: lllustration showing camera coverage of those target do not generate alerts. Fuel Depot and surrounding area outside depot 4) Detect loitering in the area of perimeter fence. (Cross hatched areas represent interest around the fuel depot. camera fields of view. Solid black lines represent People or vehicles loitering in this tripwires.) area could be planning or attempting some destructive action. A set of rules will, therefore, be implemented enabling the detection of people, vehicles, etc. that remain in this area of interest for over a specified amount of time. If loitering is detected alerts are generated to inform security personnel. 5) Detect the presence of bags, packages, or other suspicious objects in the area of interest. Rules will be implemented, therefore, to detect the insertion of any object into the area of interest. This will include bags that are left in the area or bags, packages, etc. thrown over the perimeter fence into the fuel depot. Detection of any object left or thrown into the area will generate an alert to inform security personnel of its presence. 6) Detect any possible tampering or attempted tampering with surveillance cameras. People wishing or intending to evade the surveillance system set up to protect the aircraft quarantine area may attempt to do so by tampering with the surveillance cameras set up in the area. Rules will be implemented detecting tampering such as blinding the cameras in some way (covering cameras, spray painting lenses, etc), turning cameras off target, or intenupting either power to the cameras or video feed from the cameras. Detection of any tampering or tampering attempts will generate alerts for security personnel. 10 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 2.5. Relation of Proposed Work to Other Work in Progress and Long Term Goals ObjectVideo™ was founded in 1998 by a team of noted computer vision research scientists from DARPA and has had, since its foundation, a corporate mission encompassing the two following objectives: . To undertake research aimed at advancing the state-of-the-art in the field of computer VISIon . To pursue business practices aimed at accomplishing the successful, timely and efficient transfer of advances achieved in the course of that research from the laboratory to the video surveillance and video security systems marketplace. In the release of the ObjectVideo™ VEW product, and its subsequent success in the marketplace, the company has demonstrated its ability to successfully meet both those objectives. ObjectVideo™ continues to pursue a policy of aggressively moving technologies from R&D into features and upgrades to the existing product, and new software offerings. Participation in programs such as the pilot project proposed here for KWI are essential both as a motivator and a testbed for technology in the process of commercialization. Technology developed or fine-tuned under this award is designed to be integrated into either current or future versions of ObjectVideo™ products and services. KWI sees a vital connection between work proposed for this pilot project and advanced video surveillance capabilities resulting from this pilot that will then be available for proliferation to airports throughout the US, thus enabling a general enhancement in airport security throughout the country. 2.6. Project Reporting An established set of project management procedures which include the generation of a standard set of reports for all projects will be followed for this pilot project. The reports to be produced under this effort will include the following: · Monthly Project Status Report - providing information on progress made during the reporting month, including progress against project milestones and discussion of any issues, problems, etc encountered during the month · Monthly Project Financial Report - providing information on money expended on the project during the previous month, and on funds remaining. · Final Project Summary Report - A Final Project Summary Report will be delivered following the conclusion of the project. This report will provide information on work done, accomplishments and results of the project. In addition, if circumstances require, ad hoc reports may be generated regarding the specific circumstances or situations. All reports will be provided by the KWI Principal Investigator or KWI Project Manager to the TSA Program Manager, or to an appropriate point of contact designated by the TSA Program Manager. 11 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Securit), At Key West International Airport 3. Principal Investigator The Principal Investigator for this effort will be Peter Horton. ~ 12 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 4. Bibliography l.G. Di Battista, P. Eades, R. Tamassia and I.G. Tollis, "Graph Drawing: Algorithms for the Visualization of Graphs," Prentice-Hall, 1999. 2.A. Del Bimbo, E. Vicario, D. Zingoni, "A Spatial Logic for Symbolic Description of Image Contents", Journal of Visual Languages and Computing, vol. 5, pp. 267-286, 1994. 3.A. F. Bobick and 1. W. Davis. "An Appearance-Based Representation Of Action:' ICPR 13, August 1996 4.E. Boult, R. Micheals, X. Gao, P. Lewis, C. Power, W. Yin and A. Erkan, "Frame-Rate Omnidirectional Surveillance and Tracking of Camouflaged and Occluded Targets," Proc. Workshop on Visual Surveillance, Fort Collins. CO, June 1999. 5.M. Brand, N. Oliver, and A. Pentland. "Coupled Hidden Markov Models For Complex Action Recognition," CVPR, 1997. 6.M. Brand and V. Kettnaker, "Discovery and Segmentation of Activities in Video," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 8, August 2000. 7.C. Bregler. "Learning and Recognizing Human Dynamics in Video Sequences," CVPR, pp. 568-574,1997. 8.C. Breg1er. "Tracking People With Twists And Exponential Maps," CVPR, 1998. 9.R. Collins, A. Lipton, T. Kanade, H. Fujiyoshi, D. Duggins, Y. Tsin, D. Tolliver, N. Enomoto, O. Hasegawa, P. Burt, A. Wixson, "A System for Video Surveillance and Monitoring," CMU Technical Report CMU-Rl-TR-00-12, 2000. 10. D. Comaniciu, V. Ramesh, and P. Meer, "Real-Time Tracking of Non-Rigid Objects using Mean Shift." CVPR, pp. II-142-149, 2000. 11. Davis, 1. and Bobick, A. "The Representation And Recognition of Action Using Temporal Templates," CVPR, pp.928-934. 1997. 12. S. Davies, and A. Moore, "Mix-nets: Factored mixtures of Gaussians in Bayesian networks with mixed continuous and discrete variables", Sixteenth Conference on Uncertainty in Artificial Intelligence, 1996. 13. A. Dempster, N. Laird and D. Rubin, "Maximum Likelihood from Incomplete Data via the EM Algorithm," Journal of the Royal Statistical Society, 39 (Series B):1-38, 1977. 14. P. Duygulu, N. de Freitas, K. Barnard and D.A. Forsyth, "Object Recognition as Machine Translation," ECCV, 2002 15. A. Elgammal, D. Harwood and L. Davis, "Non-parametric Model fnr Background Subtraction," Proc. IEEE Frame Rate Workshop, 1999. 16. Makris, D.[Dimitrios], Ellis, T.[Tim], "Path detection in video surveillance", IVC(20), No. 12, October 2002, pp. 895-903. 17. N. Friedman and S. Russell, "Image Segmentation in Video Sequences: A Probabilistic Approach," Uncertainty in Artificial Intelligence, 1997. 18. Y. Gong and X. Liu, "Generating Optimal Video Summaries," Int'l Conf. Multimedia and Expo, 2000. 19. E. Grimson, C. Sauffer, R. Romano and L. Lee, "Using Adaptive tracking to Classify and Monitor Activities in a Site," Proc. Computer Vision and Pattern Recognition Conf., pp. 22-29, 1998. 20. N.C. Haering and N. Da Vitoria Lobo, "Visual Event Detection", Kluwer Academic Press, 1997 21. K.M. Hall, "An r-dimensional Quadratic Placement Algorithm," Management Science, 17:212-229,1970. 22. 1. Haritaoglu, D. Harwood and L. Davis, "W4: Real-Time Surveillance of People and Their Activities," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 8, August 2000. 13 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 23. W.H. Highleyman. "Linear Decision Functions, with Applications to Pattern Recognition," Proc.IFlE,voI50,pp. 1501-1514, 1962. 24. S. Hongeng and R. Nevatia. "Multi-Agent Event Recognition," ICCV, 2001. 25. M. Isard and A Blake. "COND.ENSATION - conditional density propagation for visual tracking," IJCV, vol. 29, 1, pp. 5-28, 1998. 26. H. Ismai, D. Harwood and L. Davis, "W4: Who? When? Where? What? A Real Time System for Detecting and Tracking People," 3rd Int'I Conf Automatic Face and Gesture Recognition, 1998. 27. Y. Ivanov and A Bobick, "Recognition of visual activities and interactions by stochastic parsing", IEEE Transactions of Pattern Analysis and Machine Intelligence, Vol 22(8), August 2000, pp.852-872. 28. N. Johnson and D.C. Hogg, Learning the Distribution of Object Trajectories for Event Recognition", Image and Vision Computing, 1995. 29. M. Kaufmann and D. Wagner, "Drawing Graphs: Methods and Models," LNCS 2025, Springer Verlag, 2001. 30. V. Kettnaker and R. Zabih, "Bayesian Multi-Camera Surveillance:' CVPR, pp. II-253-259, 1999. 31. B. Li, R. Chellappa, Q. Zheng, and S.Z. Der, "Model-based Temporal Object Verification Using Video." Image Processing 10(6): 897-908,2001. 32. G. Medioni, R. Nevatia and 1. Cohen. "Event Detection and Analysis from Video Streams," DARP A98, pp. 63-72, 1998. 33. DJ. Moore and LA Essa. "Recognizing Multitasked Activities using Stochastic Context-Free Grammar." Proc. ofWkshp. on Models versus Exemplars in Computer Vision, CVPR, 2001. 34. D.J. Moore, LA Essa, and M.H. Hayes III. "Exploiting Human Actions And Object Context For Recognition Tasks." ICCV, vol. 1, pages 80-86, 1999. 35. M.R. Naphade and T.S. Huang, "A Probabilistic Framework for Semantic Indexing and Retrieval in Video." IEEE Int'l ConfMultimedia and Expo. 2000. 36. S.K. Nayar, R. Swaminathan, and J.M Gluckman, "Combined Wide Angle and Narrow Angle Imaging System and Method for Surveillance and Monitoring." US Patent # 6,215,519, 2001. 37. N. Oliver, B. Rosario, and A Pentland. "Graphical models for recognizing human interactions," Proc. NIPS, November 1998. 38. Hanna Pasula, Stuart Russell, Michael Ostland, and Ya'acov Ritov, "Tracking many objects with many sensors." In Proc. IJCAI-99, Stockholm, 1999. ; 39. PJ. Phillips, P. Grother, S. Sarkar, I. Robledo, and K. Bowyer, "Baseline Results for the Challenge Problem of Human ill Using Gait Analysis:' 5th IEEE Int'l Conf. on Automatic Face and Gesture Recognition, 2002. 40. D.E. Rumelhart, G.E. Hinton, and RJ. Williams. "Learning Internal Representations by Back-Propagating Errors, " Nature, vol. 323, number 99, pp. 533-536, 1986. 41. J.Shi and J.Malik. "Normalized Cuts and Image Segmentation," CVPR, pages 731--7, June 1997. 42. C. Stauffer and E. Grimson, "Learning Patterns of Activity Using Real-Time Tracking," PAMI, 22(8):747-757, 2000. 43. M. Trajkovic. "Intruder Tracking with a Pan-Tilt-Zoom Camera." ACCV, 2002. 44. N. Vaswani, AR. Chowdhury, and R. Chellappa, "Activity Recognition Using the Dynamics of the Configuration ofInteracting Objects." CVPR, 2003. 45. L.E. Wixson, R. Mandelbaum, M.W. Hanson, J. Eledath, D. Mishra, "Method and Apparatus for Fixating a Camera on a Target Using Image Alignment." US Patent 6,396,961,2002. 46. C. Wren, A Azarbayejani, T. Darrell, and A Pentland. "Pfinder: Real-Rime Tracking Of The Human Body," Photonics East, SPIE, vol. 2615, 1995. 14 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 47. K. Woods, D. Cook, L. Hall, L. Stark, "Learning Membership Functions in a Function-Based Object Recognition System", Journal of Artificiallntelligence Research 3, ppI87-222, 1995. 48. Z. Zhang, "A Flexible New Technique for Camera Calibration," PAMl 22(11): pp. 1330- 1344, August 2000. 49. Q. Zhou and J.K. Aggarwal, "Tracking and Classifying Moving Objects from Video," Proc. 2nd IEEE lnt. Workshop on PETS, Kauai, HI, December 2001. 15 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 5. Appendices 5.1. Facilities and Equipment ObjectVideo's headquarters office in Reston, Virginia has facilities with a wide range of video processing and storage equipment as well as state-of-the-art software development facilities for developing, testing, integrating, and hardening computer vision algorithms. Development will be done primarily in C++ and C# within a Microsoft environment. Analysis and support tools include a wide range of in-house and commercial packages for analyzing video content and rapidly testing algorithm components. We have a wide variety of test data, including 3600 RGB and IR camera video and the equipment to digitize, store, and convert video from almost any commonly used format, such as digital-beta, VHS, MPEG-2, MPEG-4, A VI and many others. Our secure video network and storage system provides several terabytes of on-line digital video storage. We have digital video capable projection systems and meeting rooms for demonstrating our results as well as having the video servers and Internet access required to host streaming video over the Internet as well as private virtual networks. 16 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 5.2. Summary Proposal Budget Form -- r" --l--~-J STING SLIDE \1 ------>7. EXISTING GATE #1 E OPERATOR -------__. . LOOP DETECTION L. _ // SYSTEM --~~~/-----_.._._----_._.----7/'-------_._--_.- \ I , I I I / I ~ [, ~-------~ L_ C-g I_L--t I ----.-. I I J i h-----.--_h___~J '-, r-8~~EXISTING BOLLARD I 9"--........ EXiSTING GATE # 1 PEDESTAL I I' I ", EXiSTING BOLLARD I / I! I / /1 I / II ! ! I! I ; II I I / I I I / I / I I I d z ~ ~~ ~ ~ ~~ ~C/:2 E--.~ ~~ ~~ ~~~ ~2~ ~~ ~t::: C/:223 ~~ ~~ ~---l~ ~--~~ ~~~ ~~~ ~~~ ~~~ ~~~ ~ ~ ~E~ ~2~~ ~~~ ., ~~ ~ ~~~ ei ~ ~~~ ~ DRAWN BY: AKM ,.,::,..""", ~ E-. ~ ~ ~ ~ E-. ~ j ~ ~ :::::::; c:......::, ~ ~ ~ k: ~ ~ e-..; d ~ :::::::; ~ ~ c:......::, ~ E-. .......... ~ 8 <::::2:1- E-. ... ~ ~ ~ ~ ~ ~ ~ DATE: 2/25/04 DESIGNED BY: as DATE: 2/25/04 ~~~: DATE: 3/4/I}Lf PROJECT NUMBER: 305-20783 SHEET TITlE MONROE COUNTY APPROVAL: OCFSI APPROVAL: OBJECT RECOGNITION SHEET No. 1 OF 1 r'- . . L__ EXiSTING H.ANGER ----7 / REFER TO DWG, [-2 FOR CONTINUp,TION '.t' I ___ r -.---------. J:J:Q _______J ~ I ---------~----- ---------------- . / ll~ r 1 I '~ " I I ~\ "" I \ I ~\ ~--1 EXISTiNG BOLLARD .___-{~ ~J--- / EXISTING GATE #4 PEDESTAl. ____ -4.---- ___ / / E.X'('TI"r: . __ II ---- ------. I 1':'1 """ BOLLARD /#' _. __ t ----- //.1 ------.-----,-- ---B---~/.----. ...- --- I ---------..-.,../ ----.- ----- -- ---..--.--? REFER TO DWG, E... 2 FOR CONTINUATION EX r.' ''';,1-';1 d" C-4 \JITION ~_~___ A N SEe U R In;---S~(S.TE~~-PROJ E CT --c ITr:=----...-." (' "p. E." ' ".) 1 L " ~, I . 1 10'.........." ~)_',L_. , = '-r --..U .~ \" bI ,) ~..." r '.'-- .-- . .... ~ Jf'\ ~ <:::::> Val ~ ~ ~ "---4 C'..l ~~~ o C...J ;:; ~~ ..~V)~ ~ ~ ~~QZ u ~ <:::::> Q~~ "~~::i ~ ~ ~ ~ ~ ~ ~ ~ ~ o U ~ ~ .. ~ r---..J ~ ~ at ~<v v (;<v ~<v~ ~ e z o F a.. a:: () en w o z o u; 5 w a:: ~ <( o <:::::> ~ Q':) l'- I ~ c::o ~ I ~ ~ Q':) ~ ~ ~ <:::::> ~ ~ e,,5 <:::::> <:::::> l'- ~ .......,.L....,,- __._~,,_." _ .__" .~___. u.___ . ~ > I- () () (5 '- ~ c o () Vl Vl Q) U U <( - - - ~ I ~ c::o ~ I ~ ~ Q':) ~ k: ~ It') co o .... o o o () w w en z w () ::J - , .... I- I I I I I I t f I ! Y3i:J'1 SIH1 N ci CJ38~,;[lN] ~O.j l ~ -3 ';:' 0 01 ~3,J3d ~ # ::J.LIt;) ONY ')NIUlIrI8 X303J V3i:JY SIHl NVld 038~N1N3 dOJ o L -.3 ON\?' 6--.3 '')M.CJ 01 d3.:!3d 8NiGlln8 SV'lOlSnJ 's'n I V3dV 51H1 N! 03:JClVlN3 dOj L' 9-- J '(;-.] ';).1/\0 ( 8NICJlln8 lVN' I I . ;;t--- - JJmllllE -. (Z,\ /1\ Y? I r\ ?ft- \ ~) \'/ 10 I \ I \ I I . <i) i \-f;t-- (f -- ---I-...._.J I I (6 (!) I I L__________._~ l4 )R ,1 - - r r .~" 19083~ 183rSO -^188 ClOIVCl3dO v# 31.V~) 'Z~-8 '~ ~ -8 '0 ~ -8 SVt!3~V8 M3N t!O.:l ~ 9-8 'L-8 '9-8 'g-8 'Z-8 SVt!3~V8 8NI1SIX3 t!O.:l 0301^Ot!d 3t!VMl.:lOS 0301^ 183r80-M3N '18VtllN08 II 3SVHd ,.U1t!n83S t!30Nn 0301^Ot!d SVt!3r;V8 8NI1SIX3 llV Z~-8 M3N g - V3t!V Z-8 8NI1SIX3 V - V3t!V ~~-8 M3N r - V3t!V 0~-8 M3N Z - V3t!V 9-8' L-8'9-8'g-8 8NI1SIX3 ~ - V3t!V --..---(F._.--~ I \ i \ f-r-L-l I ' \ \ i I ,/1 \ // \. . / J ///' 1~~___. --- , , ! I I I I I / ! ; I VHLS,~S f'I0I1J313(] dOO-1 tI# 3JV~ - I~ PROPOSED C-11 NEW CAMERA ,,..----- '" -.- - -- - - , \ C-3 I. ;-:::;\ ~ I \7-1 c-~tc)O ,,-9\ I \ J')> \ I \ C 2 \, / \ \ \ r TYP \ TERMINAL #4 i TYP, MAINTENANCE BUILDING I TERMINAL BUILDING REFER TO OWG, [-5. [-6 AND E-7 FOR ENLARGED HIS AF<E,), TERlv: REFER T( I AND [-I PLA ATeT REFER TO OWG- [-3 FOR ENLARGED PLAN THIS AREA "'...~--- ~~>- zO OCD '- ,.,fT1 fT1() Z-l ()< z6 G")fT1 o GENERAL AVIATION PARKING ! I C 1 I r--:\ &-- / GAT~ / / / /' / / /