Item C09
BOARD OF COUNTY COMMISSIONERS
AGENDA ITEM SUMMARY
MEETING DATE: 4/21/04
DIVISION: COUNTY ADMINISTRATOR
BULK ITEM: YES
DEPARTMENT: AIRPORTS
AGENDA ITEM WORDING: Approval of a contract with Quality Communications Fire & Security, as specifically named
contractor, to provide and install Object Recognition & CCTV upgrades at the Key West International Airport, and to waive
the competitive bid process outlined in the Monroe County Purchasing Policy.
ITEM BACKGROUND: This security project will be funded under a 100% cooperative research agreement with the
Transportation Security Administration. This is an unusual grant and an unusual project. We were approached by Quality
Communications (who is currently performing another large Security Project here on the Airport) to apply for a very limited
research security grant funded by the FAA and supervised by the TSA. We were one of seven airports in the Nation
selected to install experimental "Virtual Fences". Because Quality Communications was our partner on this project from
the beginning of the design and application phase for the Grant through project acceptance by the FAA and TSA, they
should be considered the'sole source for procurement and installation for this project only,
PREVIOUS RELEVANT BOCC ACTION: Approval of Cooperative Research Agreement with TSA, 2/18/04.
CONTRACT/AGREEMENT CHANGES: New contract
STAFF RECOMMENDATION: Approval
TOTAL COST: $194,000.00
BUDGETED: Yes
COST TO AIRPORT: None
COST TO PFC: None
COST TO COUNTY: None
SOURCE OF FUNDS: TSA agreement
REVENUE PRODUCING: No
AMOUNT PER /YEAR:
APPROVED BY: County Attorney X
OMB/Purchasing X Risk Management X
DIRECTOR OF AIRPORTS APPROVAL
~1t-
eter J. Horton
DOCUMENTATION: Included X
To Follow
Not Required
AGENDA ITEM #
Cq
DISPOSITION:
/bev
APB
MONROE COUNTY BOARD OF COUNTY COMMISSIONERS
CONTRACT SUMMARY
Contract #
Contract with: Quality Communications Fire & Security, Inc.,
(as specifically named contractor)
Effective Date: Execution
Expiration Date: - 90 days
Contract Purpose/Description: Provide and Install Object Recognition & CCTV Upgrades
Contract Manager: Bevette Moore
(name)
# 5195
(Ext.)
Airports - Stop # 5
(Department/Courier Stop)
for BOCC meeting on: 4/21/04
Agenda Deadline: 4/6/04
CONTRACT COSTS
Total Dollar Value of Contract: $194,000.00 Current Year Portion: $194,000.00
~udgeted? Yes Account Codes: Pending setup, 4/21/04 BOCC
Grant: Yes - 100%, Transportation Security Administration
County Match: None
Estimated Ongoing Costs: N/A
(not included in dollar value above)
ADDITIONAL COSTS
For: .
(eg. maintenance, utilities, janitorial, salaries, etc.)
CONTRACT REVIEW
Date In
Changes
Needed
Yes No
Reviewer
Date Out
Airports Director :tJ.b..JC2.4-
Risk Management 1.Ji[l 0 '1
O.M.B.lPurchasing ~
)CA
) (~
m G~halfs
a~
/) Sheila. Barker
re. d f\-6 ~l Q "-CAt J 0
Pedro Merc do
4/~Cf1-
DiY /~
~/~:3 / JJf
i0-.L/o4
/
GENERAL CONTRACT
PROVIDE AND INSTALL
OBJECT RECOGNITION & CCTV UPGRADES
Project: The Use of Smart Video Surveillance to Provide Enhanced Perimeter Security at Key
West International Airport
Agreement made on this Date: , 2004 between Quality
Communications Fire & Security, Inc (QCFSI), of 3700 SW 30th Ave, Ft Lauderdale, Florida
33312 ("Seller"), and County of Monroe board of County Commissioners, DBA Key West
International Airport, 3491 S Roosevelt Blvd, Key West, Florida 33040 ("Buyer").
1. ITEMS PURCHASED. For value received and other consideration, the Seller agrees with
the Buyer to provide the Buyer the following products ("Goods") in accordance with the terms
and conditions of this Contract:
Descrimion
Object Video added solution to existing
CCTV to provide enhanced security
Ouantitv
1
Unit Price Total Price
$194,000.00 $194,000.00
Total Price:
$194,000.00
2. PRODUCT STANDARDS. Goods shall comply with the Seller's quotation dated October
07, 2003 and incorporated into this Contract by this reference. This quotation is based upon the
TSA grant for The Use of Smart Video Surveillance to Provide Enhanced Perimeter Security at
Key West International Airport
3. TITLEIRISK OF LOSS. Upon Beneficial Use
4. PA YMENT. Payment shall be made to Quality Communications Fire & Security, Inc
(QCFSI), 3700 SW 30th Ave, Ft Lauderdale, Florida 33312. Buyer agrees to pay to Seller the
sum of $194,000.00 as follows:
$110,000 upon delivery of Object Video Servers and Software
$32,500.00 upon installation of additional cameras and Object Video hardware & software
$51,500.00 upon completion of acceptance testing
Payment terms are net 30 days after receipt of invoice.
If the Buyer should fail to make any of the payments set out in the above schedule, the Seller at
its option may treat the Buyer's failure to pay as a material breach of this Contract, and may
terminate this Contract and/or seek legal remedies.
The buyer may take a 1 % discount if payment is received within 10 days of invoice
3l~~
Page I
General Contract to Provide and Install Object Video at Key West Airp[}~
5. DELIVERY. Time is of the essence in the performance of this COflCract. Delivery of Goods
shall be made according to the following schedule:
Ouantitv
I
Descriotion
Object Video added solution to existing
CCTV to provide enhanced security
Deliverv Date
July 1,2004
Seller is responsible for proper packaging of Goods so the Goods will arrive at the destination
without damage. Any damage sustained due to improper packaging will be charged to Seller.
f},.~!sr:!an estimated date based on 90 days delivery and iostallation time frame from the
execution date of the contract, projected as April 1 2004 .
6. WARRANTIES. Seller warrants to Buyer that the Goods will conform to the applicable
drawings and design standards, to meet the TSA Grant proposal submitted by QCFSI & Object
Video. .
Other Limitation of Warranty is included in attached Terms and Conditions
7. INSPECTION. The Buyer, upon receiving possession of Goods, shall have a reasonable
opportunity to inspect the Goods to determine if the Goods conform to the conditions of this
Contract. If the Buyer, in good faith, determines that all or a portion of the Goods are non-
conforming, the Buyer may return the Goods to the Seller at Key West International Airport
(EYW)'s costs. The Buyer must provide written notice to the Seller of the reason for
rejecting the Goods. The Seller will have 30 days from the return of the Goods to cure any
and all defects, or be held in breach.
NOTE
Attached is a copy of terms and conditions and a copy of the site plan (Attachment A) for camera
and Object Video software coverage dated 2/25/04 that are hereby incorp9rated into this
contract.
~d~lo l\
General Contract to Provide and Install Object Video at Key West Airpcl1
Page 2
8. TERMS AND CONDITONS. Att.1Ched
The parties have executed this Contract at Key West, the day and year above written.
Buyer:
County of Monroe BDA Key West International Airport
By:
Monroe County
Date~
By:
BY
DATE
Date:
:='{~(IJ Lf
.
General Contract (0 Provide and Install Object Video at Key West Airport
Page 3
",j'
Quality Communications Fire & Sexurity, fnc,
Terms and Conditions
Introduction: For good and valuable consideration. the parties agree that the tenns and conditions contained herein are the sole tenns and conditions
of sale and/or for service and represent the sole and complete Agreement between the parties and supersede all prior oral and/or written
representations. understandings. proposals, agreements. and communications regarding the subject matter hereof. The parties agree that no additional
tenns will be binding upon Quality Communications even if they appear on Purchaser's fonnal purchase order, acceptance fonn. or any other of
Purchaser's documents unless signed by an authorized representative of Quality Communications.
PA YMENT TERMS: [fnot otherwise specified in the Contract Documents. the following applies:
A. General Payment Tenns are net thirty (30) days from date of invoice where satisfactory open account credit is established and maintained.
Quality Communications reserves the right to revoke or modify Purchaser's credit at its sole discretion. A mobilization payment up to fifty
percent (50%) will be invoiced upon acceptance of customer's order. Progress payments to one hundred percent (100%) of order value will be
invoiced monthly based upon equipment delivered or stored and work perfonned. At Quality Communications' sole option. Purchaser shall pay
cash in advance. or upon delivery, or as otherwise specified by Quality Communications. In the event that Purchaser defaults on its obligation to
pay each invoice when due. then. in addition to all other rights and remedies available to it. Quality Communications shall have the option to
withhold any further shipments of materials and/or the proyision of services. if any, until Purchaser's account is fully paid. Further, in the event
payment is not received according to Tenns. Quality Communications may. at its discretion. assess interest at the mlUimum rate allowed by law
or at the rate of 1.5% per month, whichever is less. Purchaser also agrees to pay all costs incurred by Quality Communications in pursuit of
payment which is past due including. but not limited to, collection agency commissions and attorneys fees.
B. Cancellation: Any cancellation must be made in writing. Recognizing that Quality Communications' damages arising from cancellation will be
difficult to estimate or detennine. the following charges shall be consttued as liquidated damages representing an approximation of the
administrative. engineering, and other costs Quality Communications will actually incur in reliance upon this Agreement. and not a penalty: If.
prior to shipment. Purchaser cancels this Agreement or any pOllion thereof. for any reason not attributable to Quality Communications.
Purchaser agrees to pay :)uality Communications an amount equal to 20% of the price of the products canceled if the cancellation occurs more
than 21 days after Quality Communications receives Purchaser's order or Purchaser accepts this Agreement. If Purchaser cancels after shipment.
Purchaser agrees to pay the above 20% of the price of the products canceled. return the products already shipped. and to pay Quality
Communications an additional amount equal to 20% of the value of the returned products to cover the estimated costs of transportation and
restocking.
C. Custom Software PaYment Tenns are as provided in section A. above with the following exceptions. A non-refundable twenty percent (20%)
down payment will be invoiced upon acceptance of Purchaser's order. A non-refundable progress payment of fOlly percent (40%) of order value
will be invoiced upon Purchaser's approval of a Custom Software Development Specification, The final fOlly percent (40%) payment will be
invoiced upon delivery by Quality Communications of Custom Software. .
D Security System I Access Control System PaYment Tenns are as provided in Section A. above with the following exceptions. A non-refundable
20% down payment is required with Purchaser's order. Progress Payments will be invoiced based upon shipments to Purchaser.
Quality Communications Services: Purchaser further agrees that Quality Communications offers various levels of services and that the Purchaser.
after reviewing the same, has contracted with Quality Communications to perfonn only the services described in writing in this Agreement. Quality
Communications denies liability for materials. supplies or work provided by other persons. Unless specifically contracted for. Quality
Communications denies any supervisory role and this Agreement shall not commit Quality Communications to any supervisory role. including. but
not limited to. the placement or routing of any wires or other Product.
Security Interest: The Purchaser grants to Quality Communications. and Quality Communications retains. a security interest ;n all Product. Software.
and proceeds thereof shipped pursuant to this Agreement until the Purchaser shall have made full payment for the Product. Such interest is intended
to be effective as a purchase money security interest. Purchaser agrees that Quality Communications may file this Agreement as a financing
statement. In the event of failure to make payment on the due date in accordance with tenns designated. the entire balance shall become due and
payable at once. In case of default of payment. and to the extent pennitted by law, Quality Communications shall have the right to take possession of
the Product or Software immediately. wherever it may be found, and remove it with or without process of law and may retain all money paid
hereunder as LIQUIDATED DAMAGES and rental for said product or Software. For the purposes of assisting Quality Communications in perfecting
its security interests. in any Quality Communications Product or Software delivered to the Purchaser, Purchaser agrees to inform Quality
Communications immediately if any other entity has or may have any security interest. perfected or otherwise. in the Quality Communications Product
or Software described on the face of this Agreement and shipped to Purchaser. The Purchaser agrees to pay Quality Communications' costs of
collection, including without limitation reasonable attorneys fees and legal expenses. and that the same are secured by the security interest granted
herein. The Purchaser shall not sell. prior to payment. (except in the ordinary course of business). mortgage. pledge. or lease said Product or Software
without prior written pennission of Quality Communications.
Limitation or Warranty: Purchaser understands that Quality Communications is not an Insurer, Subject to the limitations below, Quality
Communications warrants that the Product (as distinguished from Software) be free from defects in material and workmanship under nonnal use for a
period of one year from the date of fil".it beneficial use of ail or any part of the Product gr 18 months after Product shipment whichever is earlier,
provided. however. that Quality Communications' sole liability. and purchaser's sole remedy. under said warranty. shall be limited to the repair or
replacement of any Product. or parts thereof. which Quality Communications detennines to be defective at Quality Communications' sole option and
subject to the availability of service personnel and parts. as detennined by Quality Communications. Quality Communications warrants expendable
items including. but not limited to. video and print heads. television camera tubes. video monitor display tubes. and batteries and certain other
products in accordance with the applicable manufacturer's warranty. Quality Communications does not warrant devices designed to fail in protecting
a system such as. but not limited to, fuses and circuit breakers. Quality Communications warrants that any Quality Communications Software
described in this Agreement. as well as '..Jat Software contained in or sold as part of any Product described in this Agreement, will substantially
confonn to its published specifications in effect at the time of delivery and for ninety (90) days after delivery. However. Purchaser agrees and
General Contract to Provide and Install Object Video at Key West Aitpoll
T enns and Conditions - Page I
Quality Communications Fire & Security. Inc.
acknowledges thaI the Software may have inherem defects because of its complexity, Quality Communications' sole obligation with respect to
software. and purchaser's sole remedy, shall be to make available published modifications. designed to correct inherent defects. which become
availabic during the warranty period.
THIS WARRANTY DOES NOT APPLY TO ANY PRODUCTS OR SOFTWARE WHICH HAVE BEEN SUBJECTED TO ABUSE,
MISHAl'o'DLING. OR IMPROPER USE AS DETER..\fiNED BY QUALITY COMMUNICATIONS AND IS IN LIEU OF ALL OTHER
WARRANTIES. EXPRESS OR IMPLIED. INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE.
Warranty service will be performed at no charge belween the hour; of 8:00 am to 5:00 PM local time. Monday through Friday exclusive of Quality
Communications' holidays. Warranty service requested to be performed at other than during Quality Communications' normal work hour; shall be
chargeable at Quality Communications' standard ovenime rates, All repair; or adjustments that are or may become necessary under the warranty
provisions of this agreement shall be performed only by an authorized representative of Quality Communications. Any repair;. adjustments. ~r
interconnections performed by the purchaser or anyone other than an authorized Quality Communications representative shall void all warranties.
LIMITATION OF LIABILITY: QUALITY COMMUNlCATIONS SHALL NOT BE LIABLE FOR ANY INDIREcr, INCIDENTAL
ECONOMIC. OR CONSEQUENTIAL LOSS OR DAMAGE TO THE PURCHASER OR USER OF THIS PRODUcr ANDIOR SOFTWARE
AR[SING OUT OF. AMONG OTHER THINGS. THE OPERATION OR FAILURE OF THE PRODUcr ANDIOR SOFTWARE TO OPERATE,
THIS AGREEMENT, THE INSTALLATION. USE. DESIGN OR FUNcnON OF ANY QUALITY COMMUNICATIONS PRODUcr AND/OR
SOFTWARE.
LIMITA TION OF REMEDY: [t is under;tood and agreed that since it its impractical and extremely difficult to fix actual damages. if any. or
ascenain what. if any. ponion of any loss or injury would be proximately caused by the failure of Quality Communications' Product and/or Software
to operate. or to operate properly, or Quality Communications to perform any of its obligations or services described herein. UNDER NO
CIRCUMSTANCES Will.. ')UALITY COMMUNICATIONS'S UABILITY FOR ANY DAMAGES. INCLUDING BUT NOT LIMITED TO
THOSE. ARISING IN ANY WAY OUT OF THE INSTAllATION. USE. DES[GN OR FUNcnON OR FAILURE TO FUNCTION OF ANY
PRODUcr AND SOFTWARE SOLD BY QUALITY COMMUNICATIONS BE IN EXCESS OF THE PURCHASE PRICE PAID FOR THE
PRODUcr. SOFTWARE AND/OR SERVICES. TH[S SUM SHAll BE THE PURCHASER'S SOLE, COMPLETE AND EXCLUSIVE REMEDY
AND SHALL BE PAID AND RECEIVED AS UQUIDATED DAMAGES OR A LIMITATION OF LIABILITY AMOUNT AGREED ON BY THE
PARTIES AND NOT AS A PENALTY. IN NO CIRCUMSTANCES Wll.L QUALITY COMMUNICATIONS BE HELD LIABLE FOR ANY
CLAIMS , LOSSES, DAMAGES OF INJURIES AR[SING FROM OR CAUSED BY. THE PURCHASER'S OR ANY OTHER PARTY'S
MATER[AL. EQUIPMENT, AcnONS, OR OMISSIONS, [f Purchaser wishes Quality Communications to increase the amount of the above
limitation of liability or liquidated damages amount stated in this Agreement. Purchaser may inquire about obtaining an increase to this amount in
exchange for an increased purchase or contract price. Under no circumstances will an incrcase in the purchase or contract price be construed to mean
that Quality Communications is an insurer or that the obligations of obtaining and maintaining insurance are not with the Purchaser,
INSURANCE OBLIGATIONS: It is under;tood and agreed by the Purchaser that Quality Communications is not an insurer and that it is the
Purchaser's obligation to obtain and maintain any insurance covering any losses to propeny or per;onal injury or any other damage which may occur
at the premises where the Quality Communications Product. Software or Services. which form the basis of this Agreement. are delivered. assembled.
installed. used. or performed. The Purchaser agrees to list Quality Communications as an additional insured on all such policies and to provide
Quality Communications a copy of the Cenificate of Insurance upon request. Purchaser funher agrees that the Cenificate of Insurance shall contain a
provision that coverage afforded under the policies will not be canceled or materially altered until at least thiny (30) days after wrillen notice is given
to Quality Communications.
WAIVER OF SUBROGATION: Purchaser does hereby for itself and all other panies claiming under it release and discharge Quality
Communications from and against all hazards covered by Purchaser's insurance. it being expressly agreed and under;tood that no insurance company,
insurer, or any other third party will have any right of subrogation against Quality Communications.
LIMITATION OF ACTIONS: The Purchaser hereby agrees that no claim. suit or action of any kind shall be brought against Quality
Communications. its agents, employees. and/or officer; more than one year after the claim arises. whether known or unknown when the claim arises,
provided however, that if there is a claim, suit. or cause of action arising under the Warranty. it must be brought. if at all. within six months of
expiration of the Warranty period stated above. This clause is in no way to be interpreted as an extension of the Express Warranty stated in paragraph
4 above.
DRA WINGS: All drawings and wire diagrams provided by Quality Communications in connection with this Agreement are protected under United
States Copyright Laws and intended solely for the use of the installing contractor as a guide for the fabrication and installation of the system. These
drawings and wire diagrams are prepared in accordance with the project plans and specifications available to Quality Communications at the time of
the bid and are NOT intended to be System design or approval documents. Quality Communications is not a design professional. Under no
circumstances is any clause in this agreement or any actions taken by Quality Communications to be construed in such a way as to impose upon
Quality Communications the duties or liabilities of a design professional. '
CHANGE ORDERS: This Agreement can be modified. amended or altered only by an Agreement in writing. signed by both panies or their duly
authorized representatives.
General Contract to Provide and Install Object Video at Key West Airpon
Terms and Conditions. page2
3~
Quality Communications Fire & Security. Inc.
SOFTWARE LICENSE AND USE: Software Products provided by Quality Communications are licensed. not sold. to the Customer. Customer has
only a non-exclusive. non-transferable license to use the Software ("License"). Quality Communications ret?;ns all right, title and interest to the
Software. In some cases. Quality Communications may have a right to relicense the Software, "Software" shall mean any pan of Software provided
by Quality Communications in machine readable fOml indicated on this Agreement or contained in any Quality Communications Product indicated on
this Agreement or ordered subsequently, any modified versions and all related documentation. Customer shall use the Software only on the Product
and at the Product Site listed herein. Any Software received by Customer at any time is subject to this Agreement. The License teml begins upon
delivery of the Software and continues until the last use of the Software with the Product, unless temlinated. Quality Communications may temlinate
this License if Customer: (I) fails to perfOml any obligation under the Agreement; (2) ceases to do business as a going concern; or (3) has its assets
aSSIgned or attached by law, Within five (5) days after the License temlinates, Customer shall. at its expense. return the Software to Quality
Communications and destroy all copies of the Software. including memory or storage copies,
PROTECTION AND NON.DISCLOSURE: Customer shall maintain the Software in strict confidence and shall disclose it only to its employees
requiring access. Customer shall implement adequate procedures controlling access to and use of the Software consistent with the protection of
Quality Communications' rights. Customer may duplicate Software only for internal use on the Product according to Quality Communications
instructions. The Quality Communications legend restricting Software use must appear on any copies of the Software. Customer shall not reverse
compile the Software,
TITLE: The Software and any relevant Product as described in this Agreement shall remain the personal propeny of Quality Communications, even
if attached to realty or other propeny, Customer shall not sell. assign, encumber or remove the Product or Software without the prior written consent
of Quality Communications. Customer shall perfOml all necessary acts to preserve and protect the right. title and interest of Quality Communications
in the Product and Software including but not limited to signing any financing statements or other documents requested by Quality Communications
or its agents. Quality Communications may inspect the Product and Software during nOmlal business hours and may affix labels or notices of
ownership on the Product and Software.
FORCE MAJEURE: Quality Communications shall not be liable for any loss or damage of any kind resulting from delay. inability to deliver, or
install. or to perfoml any other work under this Agreement on account of fire, flood. labor problems, access to premises, accidents. acts of civil or
military authorities, acts of God. or from any other causes beyond Quality Communications' control.
TAXES, LICENSES AND PERMITS: The Purchaser is responsible for obtaining all licenses, and pemlits and for paying all applicable taxes and
fees unless otherwise agreed to in writing.
INST ALLA nON: The installation of the Goods is included as specifically provided for in this Agreement.
DRUG FREE WORKPLACE POLICY: Quality Communications has a written drug free workplace policy available for review by written request.
EXPORT COMPLIANCE: All sales hereunder shall at all times be subject to the expon control laws and regulations of the Government of the
United States. Purchaser agrees that it shall not make any disposition, by way of trans-shipment. re-expon. diversion. or otherwise. except as said
laws and regulations may expressly provide. Purchaser expressly agrees, to the fullest extent pemlitted by law, to indemnify Quality Communications
for any and all damage arising from the violation of any expon law or regulation with respect to any goods delivered to Purchaser or at Purchaser's
direction. Said damages include. but are not limited to, legal fees. coun costs. expen fees, and any and all other resulting costs and expenses.
EVENTS OF DEFAULT: Purchaser shall be in default of this Agreement upon the occurrence of, but not limited to. any of the following:
A. The Purchaser's failure to make due and punctual payment of any payment due pursuant to this Agreement;
B. The Purchaser's failure to perfoml any obligation under this Agreement;
C. An order. judgment or decree entered. with the approval or consent of Quality Communications. by any coun of competent jurisdiction.
approving a petition seeking reorganization of the Purchaser or appointing a receiver. trustee. or liquidator (or other officer having power.
under applicable law, similar to those of a receiver. trustee. or liquidator) of the Purchaser or of all or a major ponion of its assets. and such
order. judgment. or decree shall continue unstayed and in effect for any period of si:o;ty (60) consecutive days;
D. The Purchaser fails to provide Quality Communications with adequate assurances of due perfomlance under the Agreement. after receiving a
written request for same from Quality Communications;
E. The Purchaser's fi nancial posi tion materially deteriorates; or
F, The Purchaser shall cease to do business as a going concern.
GENERAL: Any provision of this Agreement which is prohibited by the law of any state shall. as to such state. be ineffective to the extent of such
provision without invalidating the remaining provisions of the Agreement. This Agreement. shall be construed under the laws of the Stale of Florida.
General Contract to Provide and Install Object Video at Key West Airpon
Teml5 and Conditions - Page3
....... _I
1..:)8BYING AND CONJ'UCf OF INTI:REsr CLA~
~. ORN STATEMENT tlNDJ:B. OIlDlNANCE NO. 010-1990
MONROI COWrY. FLORIDA
E'f.HlCS CLAUSE
~I.v.. 'l1~ - ~ C-P-rI: ~ 1hal hoIil hu DOt ~~....w.I
or otherwise had ~~ ')1\ bislita behalf my former County officer or employee in viola.ition of
. , . I
, I
Section 2 ofOrdim,::,,~ No. to-I990 or any County officer Qt" employee in violation c>f
. . I
, i
Section 3 ofOrdim.l:.t:c No. 10-1990. For breech or vio1atioo oftbis provision the ccAunty
, .,. . I
111&)', in ,its disc~':~1 tc:mliDate this contract without liability IDd may also, in ita d~on.
. i
. deduct from the em: ';tact ar "".....base price, or otbcr:wise recOver. 1ho fullamoum of aW fee,
.. Y-- , I
. . . I
commission, percell UE#, .tift, or consideration peidto the :fonner County officer or ~loyec.
I
.. -fil~&t- -rP
. . Qate: sJ2..ct {o If ;
I
STATE OF ~\Dr-jd~
COUNrYOF _~( LJGr?:f
I
. .1
PERsONAU Y M. 'jWtED BEFOlm ME. the uMcrsiaDCci aulborlty. ..
-JOhn ~ who, ~er firSt hem, swam by ~ aB:'lXOd ~
. , I
sipatun: (Dame of:i::.~UviduaJ sisning) in the space provided above on this ,C::; ~y of
~ _~~.2od i
My commission,c:;(p, ~:s:
OMB - MCP FOR;'~ ;14
"""~:'-"" . Cari Breaban .
/!~"'f. ~ CDl1l!l'j'~iOil #D 0174692
;~. .~:~: ExplJ'CS. Oct 05. 2004
"'~~O;;;.~-' ~nd;;.d Thru
"""1" 'AIlIlIIIC Bonding Co.,/nc.
R9C9ived Tj~e'Ma:.24. 2:13PM
I ,~ . . _ ... .... _ _ ... . 1_." ... _ _
,f.~JI.LIC EtiTlTY C~IME .Sf A TE"1E!fi
"A persOn or affiliate who has been placed on the convicted vendOr list
following a C011\,jction for public entity crime may not submit a bi~ on a
contract to ~.,'ide any goods or services to a'. public entity. may n~t submit
a bid on a cant flct with a public entity for the construction or repalr of a
public buiJdiIlg (Ir public work, may not submit bidS on leases ofr~
. I
property to pliFic entity, may not be awarded or perform work asia
contractor,. sup)Her. subcontractor, or consultant under a contract ~th any
public entity~ a;;d may not transact business with any public entity ~n excess
of the thre$ok amount provided in Section 287.017, for CAT:EGqRY
TWO for a ~;r.i:id of 36 months from the date ofbeing pla~ on ~e
convicted vencJ..,w list. t, . .
By:
_tJP ~
,Received Tille'Mar.24. 2:13PM
I
I
. I
!"'IIIr'If'nnI. GS
VOICE I DATA I FIBER SYSTEMS
DESIBN . INSTALLATION . FINANCINB
February 9,2004
Jerome Fain - Airport Security Director
Key West International Airport
3491 S. Roosevelt Blvd.
Key West, Florida 33040
Ref: TSA Grant for Pilot Projects
Dear Mr. Fain:
Thought I would take a moment to summarize our conversations to this point. It was good to hear that the
airport is on the county agenda to accept the grant money this month. Of the seven (7) airports to be
approved for these grants, Key West is the only one who has not yet accepted the grant and started the
project. Obviously, we want to do what we can to help. We are also concerned at the recent suggestion
that Key West might "bid" out this project.
Quality Communications Fire and Security, Inc. worked closely with Object Video and Key West
International Airport to write this grant and push it through the TSA. If you reference the grant proposal,
Oualitv Communications Fire and Security is s~ecificallv named as the contractor for this iob. The funds
were awarded for this project to be installed by this team.
There are many additional reasons, QCFSI and Object Video (OV) must execute this work.
QCFSI is currently installing the new base camera system. This base system i~ tied into the TSA
grant system on many levels (hardware and software). QCFSI must be the integrator to tie into
this system to maintain the integrity of the base system and to provide any type of warranty.
QCFSI and OV designed this entire system specifically to integrate into the existing system and
meet specific TSA guidelines for security and testing. We are using six (6) of the cameras in the
QCFSI base project for part of the TSA project.
QCFSI, as you can see from the attached letter, is the only Florida certified Object Video
installer/service in Florida. We are the only ones who can do this.
QCFSI and Object Video are specifically mentioned in the grant under "Project Team", and it the
project was funded by the TSA with this understanding.
3700 SW 30TH AVE- FT LAUDERDALE, FL. 33312 - PHONE (954) 584.4111 - FAX: (954) 584.7940
'.('LALlTY IS 1'-: F',i:!('..' :;!'-:.:: \X'f u",-
-2-
February 9,2004
If you were to bid this job, you would have to hire an engineering consultant to "design" a system
as well as someone to write specifications and bid documents. Not only are these expenses not
covered by your grant ($20,000-$30,000), it would take 6-9 months for this process to occur. You
must accept and use this grant by ~e end of the year. This includes the testing phase of the project.
Basically, installation needs to be finished by May. In addition, you would violate all
confidentiality rules in place by the TSA. This is a need-to-know project and should not be
advertised publicly. This is why the grant asked for the project team up front. QCFSI and Object
Video were granted clearance to do this project when Key West was chosen for the grant. Our
companies were thoroughly researched by the TSA.
Jerome, QCFSI feels very strongly that it is in the best interests of Key West International Airport to award
this job to our team. As you know, QCFSI did all of the up-front design, engineering, and document
preparation and submittal. All of this ($12,000 in billable work) was done at no cost to Key West Airport
as we were to recoup our costs as part of this grant. If the grant is accepted by Key West, it is accepted for
a specific design, product and team. That was its purpose. Finally, by selecting QCFSI and OV as the
grant stated, Key West International airport would minimize its responsibility, as the airport would be using
QCFSI's design and team, as aooroved by the TSA, to execute this project.
I am available to talk to your county attorney at any time about this project. It is our hope that, at your
county meeting in mid-February, the county would not only accept the grant money from the TSA, but also
award the project, in its entirety, to Quality Communications Fire and Security, Inc. as the prime
contractor. We would., of course, then subcontract the software portion of the job to Object Video and
proceed with installation.
Should you have any questions, or require any further information, please do not hesitate to contact me,
Sincerely,
/}
/ /-;)
/}~'v~:r C<
.J
II ~
.(JvJlfi<-oyf--
Bart C. Savage
Account Executive
QUALITY COMMUNICATIONS FIRE AND SECURITY; Inc.
~ ObjectVideoN
11600 Sunrise Ve)ley Drive, Suite 290
Reston, Virginia 20191
Phone (703)654-9300
Fax (703)654-9399
www.obiectvideo.com
February 2, 2004
Jerome Fain
Airport Security Director
Key West International Airport
Key West, Florida
Dear Director Fain,
In reference to the TSA-FAA Grant Application for using ObjectVideo intelligent video surveillance
to enhance the perimeter security of Key West Airport, ObjectVideo indicated a desire to work
with Quality Communications, Inc., (QCI). QCI is a preferred partner of ObjectVideo, as it is the
only integrator in Florida who is trained and certified to support and install ObjectVideo
technology. As such, QCI will be responsible for providing Key West Airport with first tier
troubleshooting and maintenance support, as well as helping to install the system. ObjectVideo
will, of course, provide factory support from our offices in Reston, Virginia, but aCI is the only
company certified to provide customer support for us in Florida.
Sincerely,
Melchior Baltazar
Director, Critical Infrastructure Protection
.~
July 16, 2003
To: Nicole Feriozzi
WJ Hughes Technical Center
A viation Research Center Office, ACX-50
Atlantic City International Airport, NJ 08405
Proposal For TSA Grant to Airport Authorities for Pilot Projects
For Key West International Airport
Key West International Airport is pleased to submit the enclosed proposal in response to
the TSA Announcement of Funding for Grants (Cooperative Agreements) to Airport
Authorities for Pilot Projects, dated June 12,2003.
Should you have any questions regarding this proposal or the associated documents,
please don't hesitate to contact us.
~~
COVER SHEET FOR PROPOSALS
TO THE
FEDERAL AVIATION ADMINISTRATION
Form Approved:
a.M.B, No 2120-0559
u.s. DeporTment 01 'tcnsportorlon
Federal Aviation Admlnlstratlon
FOR CONSIDERATION BY FAA ORGANIZATION UNIT
Indicate the most specific unit known i.e, program, division, etc,
Dept. of Homeland Security / Transportation Security
Administration
EMPLOYER IDENTIFICATION NUMBER (EIN) or
TAXPAYER IDENTIFICATION NUMBER (TIN)
59-6000749
I NAME OF ORGANIZATION TO WHICH AWARD SHOULD BE MADE:
Kev West International Air ort
ADDRESS OF ORGANIZATION (INCLUDE ZIP CODE)
SOLICITATION NUMBER
Announcement for Funding of Grants (Cooperative
Agreements) to Airport Authorities for Pilot Projects, June
12,2003
SHOW PREVIOUS GRANT NUM8ER IF THIS IS A
SUPPLEMENT TO AN EXISTING GRANT
3491 South Roosevelt Blvd., Ke West, FL 33040
CONGRESSIONAL DISTRICT
20th
SUBMITTING ORGANIZATlm:
o ACADEMIC
INSTITUTION
IS THIS PROPOSAL BEING SUBMITTED TO ANOTHER
FEDERAL AGENCY? YES_ NO-X- IF YES. LIST
ACRONYM(S)
INSTITUTION NAME (IF KNOWN)
Not applicable
COUNTY
Monroe
o NON-PROFIT ORG xD FOR.PROFIT
ORG
o OTHER
BRANCH/CAMPUS/OTHER COMPONENT (Where work is performed, if different from above)
TITLE OF PROPOSED PROJECT The Use of Smart Video Surveillance to Provide Enhanced Perimeter Security at Key
West International Airport.
REQUESTED AMOUNT:
$195,400.00
PI/PO DEPARTMENT
Not applicable
PROPOSED DURATION
12 months
REQUESTED STARTING DATE
9/1/2003
PI/PO FAX NUMBER
PI/PO PHONE NUMBER
NAMES (TYPED)
SOCIAL SECURITY NO,
PI/PO
Po:or l><iortClA
f
HIGHEST DEGREE &
YEAR
#', .{ ch o,//??!
SIGNATURE
I 51' signing and submitting this proposal, the autMrlzed official of the applicant Institution IS provloing cer1lficatlon regarding federal debt status, debarment ana suspenSion.
I arug-tree workplace. and lobbying activities
, (If answering .yes. to either, please provide explanation.) NO
I is lne organization delinquent in any Federal debt?
I IS tne organization or ItS pnncipals presently debarred, suspended, proposed for debarment. declared Ineligible. or voluntary excluded from covered
transactions by any Federal department or agency?
I AUTHORIZED INSTITUTIONAL REPRESENTATIVE
! NAMEITITLE (TYPED) Direct0r Jerome Fain J
I ,... .,...' .
TELEPHONE NUMBER
305-296-8099
;:-;.:. r';)'m 955:..' (' ::'.;5. Superseoes Prev!oiJs EdItion
I DATE
7-/t' -t:J,S
74
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
Table of Contents
1. Pro j ec t Sum m ary ........ ...... ............ ...... ............... ........................................................................ .......... 2
~o j ect Descri p ti 0 n .......... ..... ........: ......... ...... ..... .......:....................... ........................... .................. ......3
~ Project Team..... ....... ...... ...... ....... ................ .......... ........ ............ ...,......,........................................3
2.2. Purpose......................................................................................................................... ................4
2.3. Objectives........ .............. ...... ........ ........................... .... ........................ .................................... ...,..4
2.4. Pilot Project Work Plan.......................................................,..,.....................................................6
2.4.1. Secure Virtual Perimeter - SIDA After Hours .....................,...........................,..................,...6
2.4.2, Enhance Perimeter Security - Aircraft Quarantine Area............,.. ,................. ,......................8
2.4.3, Enhance Perimeter Security - Fuel Depot .................,...........................,....,........................... 9
2.5. Relation of Proposed Work to Other Work in Progress and Long Term Goals ..,......................11
2.6. Project Reporting.......... .......... ............... ............................................................................ .........1 ]
3. P rinci pal Investiga tor Biographical Sketch .....................................................................................12
4. Bib Ii 0 gr a p h Y . ........... ............................. ....... ..................................................................................... ..13
5. A P pen rli ces............................. ....... ..... ................................................................................... ............. .16
5.1. Facilities and Equipment ...............................................................................................................16
5.2. Summary Proposal Budget Form....................................................................................................] 7
1
The Use of Smart "ideo Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
1. Project Summary
U.S. airports currently face an extremely challenging security environment, with threats ranging
from common, opportunistic criminal-activity, through activities by more sophisticated organized
criminal elements to terrorist activity. As advances are made in fields, like computer vision, with
the potential to improve physical security systems, it is important to make the benefits of those
advances, in the form of enhanced security systems or capabilities, available as soon as possible.
In order to ensure that promising R&D efforts do translate into gains for airport security, Key
West International Airport, in concert with ObjectVideo™, is proposing an innovative pilot
project to exploit the advanced features of ObjectVideo'sTM Video Early Warning (hereinafter
VEW) product to provide a virtual, secure perimeter for the airport's SIDA area, and to
strengthen perimeter security for the aircraft quarantine area and the fuel depot.
An aggressive plan is being proposed for the deployment and testing of smart video surveillance
capabilities (including automatic target detection, classification and tracking, detection of threats
like left bags and loitering in security areas, etc) at Key West International Airport with the goal
of enabling 6e fast and efficient proliferation of the most successful of these capabilities to other
airports in the US.
2
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
2. Project Description
U.S. airports currently face an extremely challenging security environment, with threats ranging
from common, opportunistic criminal activity (e.g. thefts by untrustworthy baggage handlers),
through activities by more sophisticated organized criminal elements (e.g. organized drug
smuggling efforts) to terrorist activity (e.g. terrorist operatives attempting to bring down airliners
with shoulder-held rocket launchers). As advances are made in fields, like computer vision, with
the potential to improve physical security systems, it is important to make the benefits of those
advances, in the fornl of enhanced security systems or capabilities, available as soon as possible.
In this response to the Department of Homeland Security (hereinafter DHS) / Transportation
Security Administration (hereinafter TSA) announcement of funding for grants to airport
authorities for pilot projects, the Key West International Airport (hereinafter KWT) is proposing
an extensive pilot project to bring smart video surveillance capabilities and advanced computer
vision techniques to bear in providing an innovative virtual secure perimeter for KWI's SIDA
area, and strengthening perimeter security for other vital areas at the airport.
Project Team
For this effort, KWI has assembled an outstanding team that includes ObjectVideo™ and Quality
Communications Fire & Security of Florida, Inc. (hereinafter QCI). ObjectVideo™, the leading
developer of intelligent video surveillance software for physical security applications, was
founded in 1998 by a team of former research scientists from the Defense Advanced Research
Projects Agency (hereinafter DARPA) whose expertise in an elite area of artificial intelligence
known as computer vision provided the nucleus around which the company was formed. In
keeping with this foundation, ObjectVideo'sTM corporate mission is to provide a reliable conduit
for the efficient movement of computer vision research from the laboratory into commercially
successful software products and solutions addressing both the current and future video
surveillance needs of customers and potential customers. This corporate mission encompasses
three principal objectives:
· Research aimed at advancing the state-of-the-art in the field of computer vision
· Business practices aimed at accomplishing the successful, timely, and efficient transfer of
advances in computer vision from laboratory to commercially viable softw"re and service
offerings.
· The maintenance of a high level of integrity in all dealings, and at all levels of the
company.
Headquartered in Reston, Virginia, ObjectVideo™ currently has close to 50 employees, with the
majority being involved in product development or the delivery of professional services.
ObjectVideo'sTM client list includes both commercial entities such as BP, and government
organizations such as the US Department of Energy, the US Customs Service, Andrews Air Force
Base, the Office of Naval Research, and the Pentagon Force Protection Agency. ObjectVideoTM
was founded on the concept of providing a reliable conduit for the timely, efficient movement of
computer vision research from the laboratory into commercially successful software products and
solutions and continues to live up to that goal by bringing advanced video surveillance and
analysis capabilities to market for its growing customer base.
QCI is an experienced integrator and installer specializing in all aspects of low-voltage and
telecommunications cabling systems, with demonstrated expertise in handling installations of
voice grade cabling, state-of-the-art fiber optics, security systems, and access control systems,
among others. Founded in 1990, the company currently has more than 60 technicians and
RCDDs on staff, and boasts a management team with over 100 years of combined technical and
\
\
'~
3
The use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key \Vest International Airport
engineering experience. QeI's cOI}>orate objectives are to maintain a competitive edge while
providing the highest quality of service possible to their growing customer base.
Figure 1: Key West International Airport - Overview
2.2. Purpose
The pUI}>ose of the pilot project proposed here is to exploit the advanced features of
ObjectVideo'sTM Video Early Warning (hereinafter VEW) product to investigate the use of
secure virtual perimeters and to provide significantly enhanced security for physically bounded
perimeters (e.g. perimeters bounded by a perimeter fence) at KWI. A detailed work plan has
been developed enabling an aggressive effort to accelerate the move of smart video surveillance
technologies currently in product development andlor testing from that environment into use in
"real world" situations and, by doing so, to significantly enhance security capabilities available to
aiI}>orts across the US.
KWI is confident that the team assembled for this effort can successfully implement the proposed
enhancements in a way that will not only demonstrate their value but will also establish a solid
basis for their proliferation to other aiI}>orts throughout the US. KWI is confident that this pilot
effort will serve as a solid initial step in enhancing air transportation safety on a national level.
2.3. Objectives
The overall goal of the proposed pilot project is the enhancement of physical security at Key
West International AiI}>ort by establishing a secure virtual perimeter to provide after-hours
protection for the aiI}>ort's SIDA area, and strengthening security along existing physical
perimeter fence lines bordering KWI's aircraft quarantine area and the aiI}>ort's fuel depot. These
goals are reflected in the objectives established for this effort. Many of these objectives can be
met by making use of features included in the current version ofObjectVideo's™ VEW software
application while others will require the early implementation of features currently scheduled for
future versions of the product. ObjectVideo'sTM schedule for implementalion and deployment of
4
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
enhancements to the VEW application will be adjusted in order to ensure that all of the objectives
listed here are met within the time scheduled for this pilot project.
The table below lists the objectives for this area, and provides a brief description for each
objective.
Objective Description
Set Virtual A line is positioned across the image of an area being observed (e.g. across
Tripwires a corridor, along a fenceline) when a person or vehicle moving through the
area crosses the point designated by the line, or virtual tripwire, an alert is
generated
Establish Areas of The image of an area under observation can be sectioned and sections
Interest / designated as areas of interest or areas of disinterest. Actions or events
Disinterest taking place inside an area of interest will generate alerts. Actions or
events occurring inside an area of disinterest will be ignored by the system
Detect Loitering The system will detect people and/or vehicles remaining inside an area of
interest for longer than a specified amount of time, and will generate an
alert.
Detect the The system will detect the removal of objects from areas of interest (e.g.
Removal or the removal of a painting from its usual place on a gallery or museum
Insertion of wall) or the insertion of an object into an area of interest (e.g. an
Objects in Areas unattended bag or backpack left in an area where luggage should not be
of Interest unattended) and will generate an alert.
Detect Gross The system will detect changes in the image that may indicate tampering
Changes with the camera. These might include the canlera's have been moved from
its original position (pointed away from the area under observation), the
camera being covered, the lens being obscured in some other way (e.g. by
someone spray-painting the lens), or bright light being shone into the
camera to blind it. The system will generate an alert when any of these
conditions is detected.
Detect and Track The system will detect people, vehicles, or other objects, or targets, of
Objects interest and will be able to track those targets as they move through the
area being observed.
Count Tracked The system will be able to count objects, or targets, being tracked.
Objects
Classify Tracked The system will recognize different classes, or types, of objects, such as
Objects people, and vehicles. The system also allows for user defined classes,
which can be used to designate objects such as specific types of vehicles
allowed within a SIDA area. Objects will be classified by attributes such
as size, motion, and color.
Perform Multi- The system will be capable of tracking a specific target (e.g. person or
Camera Target vehicle) as the target moves through the fields of view of multiple cameras
Tracking and and will maintain consistent information on the target's motion or
Handoff trajectory.
5
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
Perform The system will stabilize images by compensating for camera motion (e.g.
Automatic Image a stationary camera mount being shaken by a strong wind).
Stabilization
Provide a Map- The user interface display will be based on a map or satellite image of the
site (or relevant section of the site) and will display icons indicating
Based GUI camera placement and alert status. Alerts generated by the system will be
clearly indicated on the interface display.
2.4. Pilot Project Work Plan
The work plan presented in this section has been developed for implementation of the pilot
project proposed here for KWI. The project involves the implementation of a secure virtual
perimeter for the entire SIDA area at the airport and the significant enhancement of security along
existing perimeter fencelines bordering the aircraft quarantine area and the fuel depot. As an
initial step in this process, ObjectVideo™ VEW will be installed on a server residing in a
centralized location at KWI. The server and installed copy of YEW will be capable of supporting
all camera ~nstallations (both existing and new) required for this effort. Where necessary,
infrastructure will be enhanced and fiber optic cable will be laid to provide high speed
connections between cameras and server.
The pilot project here proposed involves two specific areas of endeavor:
I) The installation of cameras and the development of YEW rules necessary to establish a
secure, virtual perimeter around the SIDA area. This perimeter will only be activated
after normal airport hours, to protect that area when normal airport operations have shut
down for the evening.
2) The installation of cameras and the development of YEW rules necessary to set up smart
video surveillance of existing physical perimeter fencelines bordering the aircraft
quarantine area, and the airport's fuel depot. Unlike the secure virtual SIDA perimeter,
these measures will be active around the clock.
Each of these proposed enhancements will involve the physical deployment of equipment such as
cameras, camera mounts, illuminators, etc. as well as the implementation of rule sets, designed to
deal with the specific security challenges presented by aspect of the project, in the bbjectVideo™
VEW system.
Sections 2.4.1., 2.4.2., and 2.4.3. describe the sites or areas involved in this pilot project, the
security challenges associated with each of these sites, and the measures proposed to provide the
innovative virtual perimeter approach and the significant enhancements to perimeter security.
2.4.1. Secure Virtual Perimeter - SIDA After Hours
While operations in the SIDA area at KWI are physically secured by the presence of airport. and
specifically SIDA area assigned, personnel during normal airport operating hours, KWI is
unusual among international airports in that normal airport operations shut down at a certain time
in the evening and remain shut down until the following morning. It is establishing and
maintaining security in this SIDA area in the hours during which the airport is shut down that are
a serious concern. The installation of a permanent physical barrier such as a fence is not
compatible with normal airport operations in and around this area therefore there is no easy
physical way to ensure that the area is secure during those hours. KWI is, therefore, proposing an
6
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Securit)'
At Key West International Airport
innovative approach in which
the capabilities of
ObjectVideo'sTM VEW
application are used to
establish a virtual barrier
effectively securing the
airport's SIDA area.
i '''tt'
... ...
Figure 2: SIDA area at Key West International showing
proposed camera coverage. SIDA area is the rectangular area,
elongated triangular areas indicate fields of view providing almost
complete coverage of the area.
The SIDA area at KWI IS a
long, rectangular area
covering the area in front of
the terminal as adjacent
buildings. The physical
enhancements required for the implementation of a virtual perimeter barrier include the
installation of six IDN (Day / Night) cameras with overlapping fields of view providing almost
complete coverage of the SIDA area.
The virtual primeter itself is established by developing a set of rules in YEW that will enable the
system to deal with situations that represent potential threats in this area.
I) Designate an area of interest encompassing the SIDA and the some of the area
immediately adjacent to it. This establishes the boundaries of the area in which rules
(e.g. loitering detection) designated for this area will be applied.
Establish tripwires near and at the boundary of the Tripwire 1 _ Medium Level Alert
secured area. Tripwires will be established to
enable the generation of alerts when people or Tripwire 2 _ High Level Alert
vehicles are detected approaching the perimeter.
These tripwires will be drawn in at least three
places, one outside of the SIDA boundary, one at
the SIDA boundary, and one just inside the
boundary. An escalating series of alerts will be
generated, dependent upon the tripwire crossed, to
inform security personnel of the potential
seriousness of any incursion threat. Figure 3
provides an example of the placement of these
tripwires and the urgency level of the alerts
generated at each point.
Classify targets approaching or intruding into the SIDA area. The system will not only
detect people, vehicles, etc. approaching or crossing into the SIDA area, but will also be
able to classify the target and to deliver information on the type of target to security
personnel. Target classifications will include not only target types such as people,
vehicles, aircraft, etc. that represent potential threats and should generate alerts, but also
targets such as wildlife that do not represent a threat and which should not generate alerts.
Detect loitering in the area of interest adjacent to the SIDA area. People or vehicles
loitering in this area could represent a serious threat. Loiterers could be individuals
making observations or testing security provisions in preparation for an attack or
individuals actively intending to carry out such an attack. . A set of rules will, therefore.
be implemented enabling the detection of people, vehicles, etc. that remain in this area of
interest for over a specified amount of time. If loitering is detected alerts are generated to
inform security personnel.
2)
3)
4)
....,
Figure 3: Illustrates placement of
tripwires and levels ')f associated
alerts.
7
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
5) Detect the presence of bags, packages, or other suspicious objects in the area of interest.
Objects left in the area of interest could constitute a significant threat to the SIDA. Rules
will be implemented, therefore, to detect the insertion of any object into the area of
interest, and to generate an ~lert to inform security personnel of the presence of the
suspicious object.
6) Detect the removal of an object from the area of interest. Removal of objects from the
SIDA could indicate theft or attempted theft. The system will detect when/if objects are
removed from the area and will generate an alert for security personnel.
7) Detect any possible tampering or attempted tampering with surveillance cameras. People
wishing or intending to evade the surveillance system set up to protect the SIDA
perimeter may attempt to do so by tampering with the surveillance cameras set up in the
area. Rules will be implemented detecting tampering such as blinding the cameras in
some way (covering cameras, spray painting lenses, etc), turning cameras off target, or
interrupting either power to the cameras or video feed from the cameras. Detection of "
any tampering or tampering attempts will generate alerts for security personnel.
2.4.2. Enh.mce Perimeter Security - Aircraft Quarantine Area
One of the recurring problems experienced at KWI
is the landing of aircraft that have been hijacked or
stolen and flown from Cuba to Key West. When
hijacked or stolen aircraft land at Key West the.
aircraft themselves are seized by Federal law
enforcement officials and are quarantined in an area
of the airport to the right of the SIDA area, and
bordered by the airport perimeter fence. The area is
problematic for a number ofreasons.
1 )
While bordered by the airport perimeter
fence on one side, this area is completely
open on the other sides, with no physical
barrier to prevent incursion into the area.
"'...--.... ,
,.
/ , "':l
, ~
I \ :!.
Aircraft 3
~
Quarantine ;;)
.,
Area ~ eo:
QJ
~ . ~
\ I ::s .
,., .
, / It> : ~
, ,. . ~
.........-.... .; .
I 0
. ::
.
.
.
.
.
.
.
.
Figure 4: Aircraft qua;antine area,
proposed coverage and trir}\'ire
placement. Cross hatched area
indicates proposed camera coverage.
Solid red lines indicate tripwire
placement.
A signi~cant part of the aircraft quarantine
area bordered by the airport perimeter fence
is placed so that it is out of sight of guards in
a central station, and is not currently covered
by any surveillance cameras. This
. constitutes a significant "blind spot".
The perimeter fence section bordering the aircraft quarantine area faces a heavily wooded
area just outside of that fence. The trees along this section of fence encroach closely on,
and in some areas, overhang the fence. This area could easily constitute cover for people
attempting to get into the quarantine area by going over the fence.
The installation of cameras providing coverage of the SIDA area will also provide coverage of
the aircraft quarantine area. This coverage will allow for the set up of rules in ObjectVideoTM
VEW enabling KWI to virtually secure this area. These rules will include those listed below.
1) Designate an area of interest encompassing not only the aircraft quarantine area but much
of the area around it, up to and slightly past the airport perimeter fence. The area of
interest should extend beyond the quarantine are on the three sides that are not bordered
2)
3)
8
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
by the perimeter fence. The area of interest should cover all of the area that lies in the
"blind spot".
2) Establish tripwires surrounding the area, and slightly beyond the fence. Tripwires will be
established to enable the generation of alerts when people or vehicles are detected
approaching or entering the area. Tripwires will be placed just inside the perimeter fence,
and on the three unprotected sides of the area. A trip wire may also be placed on the far
side of the perimeter fence.
3) Classify targets approaching or intruding into the aircraft quarantine area. The system
will not only detect people, vehicles, etc. approaching or crossing into this area, but will
also be able to classify the target and to deliver information on the type of target to
security personnel. Target classifications will include not only target types such as
people, vehicles, aircraft, etc. that represent potential threats and should generate alerts,
but might also include targets such as wildlife that do not represent a threat and which
should not generate alerts.
4) Detect loitering in the area of interest adjacent to the aircraft quarantine area. People or
vehicles loitering in this area could be planning or attempting an incursion into this area.
A set of rules will, therefore, be implemented enabling the detection of people, vehicles,
etc. that remain in this area of interest for over a specified amount of time. If loitering is
detected alerts are generated to inform security personnel.
5) Detect the presence of bags, packages, or other suspicious objects in the area of interest.
Rules will be implemented, therefore, to detect the insertion of any object into the area of
interest, and to generate an alert to inform security personnel of the presence of the
suspicious object.
6) Detect the removal of an object from the area of interest. The system will detect when/if
objects are removed from the area and will generate an alert for security personnel.
7) Detect any possible tampering or attempted tampering with surveillance cameras. People
wishing or intending to evade the surveillance system set up to protect the aircraft
quarantine area may attempt to do so by tampering with the surveillance cameras set up
in the area. Rules will be implemented detecting tampering such as blinding the cameras
in some way (covering cameras, spray painting lenses, etc), turning cameras off target, or
interrupting either power to the cameras or video feed from the camera~; Detection of
any tampering or tampering attempts will generate alerts for security personnel.
2.4.3. Enhance Perimeter Security - Fuel Depot
The KWI fuel depot lies beyond the terminal buildings and represents an area that
requires protection for obvious reasons. Any attempt at sabotage at this site could cause
serious damage to the airport facilities and could endanger airport staff or passengers.
While the Fuel Depot is protected by a perimeter fence, surveillance of the area should be
enhanced to prevent intruders entering the area by climbing the fence and to prevent
incidents such as those where objects (e.g. explosive devices) are either thrown over the
fence or left just outside the fence.
In order to better secure the fuel depot area two cameras will be installed to cover the
area, and will be connected to the ObjectVideo™ VEW system. A set of rules will be
implemented in the VEW system to provide the coverage required for this area. The rules that
will be implemented for this area will include those listed here.
9
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
1) Designate an area of interest encompassing not only the fuel depot itself but also
including a significant area around the depot's perimeter fence. This will define the area
in which specified actions will trigger alerts for security personnel.
2) Establish tripwires surrounding in the area slightly beyond the fence. Tripwires will be
established to enable the generation of alerts when people or vehicles are detected in the
areas immediately adjacent to the fence.
3) Classify targets approaching or intruding into the fuel depot area. The system will not
only detect people, vehicles, etc.
approaching or crossing into this
area, but will also be able to classify
the target and to deliver information
on the type of target to security
personnel. Target classifications
will include not only target types
such as people, vehicles, etc. that
represent potential threats and
sho~ld generate alerts.
Classifications will also be
developed for targets such as
wildlife that do not represent a
threat and which will be classified in
such a way as to allow the
development of rules specifying that Figure 5: lllustration showing camera coverage of
those target do not generate alerts. Fuel Depot and surrounding area outside depot
4) Detect loitering in the area of perimeter fence. (Cross hatched areas represent
interest around the fuel depot. camera fields of view. Solid black lines represent
People or vehicles loitering in this tripwires.)
area could be planning or attempting
some destructive action. A set of rules will, therefore, be implemented enabling the
detection of people, vehicles, etc. that remain in this area of interest for over a specified
amount of time. If loitering is detected alerts are generated to inform security personnel.
5) Detect the presence of bags, packages, or other suspicious objects in the area of interest.
Rules will be implemented, therefore, to detect the insertion of any object into the area of
interest. This will include bags that are left in the area or bags, packages, etc. thrown
over the perimeter fence into the fuel depot. Detection of any object left or thrown into
the area will generate an alert to inform security personnel of its presence.
6) Detect any possible tampering or attempted tampering with surveillance cameras. People
wishing or intending to evade the surveillance system set up to protect the aircraft
quarantine area may attempt to do so by tampering with the surveillance cameras set up
in the area. Rules will be implemented detecting tampering such as blinding the cameras
in some way (covering cameras, spray painting lenses, etc), turning cameras off target, or
intenupting either power to the cameras or video feed from the cameras. Detection of
any tampering or tampering attempts will generate alerts for security personnel.
10
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
2.5. Relation of Proposed Work to Other Work in Progress and Long Term Goals
ObjectVideo™ was founded in 1998 by a team of noted computer vision research scientists from
DARPA and has had, since its foundation, a corporate mission encompassing the two following
objectives:
. To undertake research aimed at advancing the state-of-the-art in the field of computer
VISIon
. To pursue business practices aimed at accomplishing the successful, timely and efficient
transfer of advances achieved in the course of that research from the laboratory to the
video surveillance and video security systems marketplace.
In the release of the ObjectVideo™ VEW product, and its subsequent success in the marketplace,
the company has demonstrated its ability to successfully meet both those objectives.
ObjectVideo™ continues to pursue a policy of aggressively moving technologies from R&D into
features and upgrades to the existing product, and new software offerings. Participation in
programs such as the pilot project proposed here for KWI are essential both as a motivator and a
testbed for technology in the process of commercialization. Technology developed or fine-tuned
under this award is designed to be integrated into either current or future versions of
ObjectVideo™ products and services.
KWI sees a vital connection between work proposed for this pilot project and advanced video
surveillance capabilities resulting from this pilot that will then be available for proliferation to
airports throughout the US, thus enabling a general enhancement in airport security throughout
the country.
2.6. Project Reporting
An established set of project management procedures which include the generation of a
standard set of reports for all projects will be followed for this pilot project. The reports
to be produced under this effort will include the following:
· Monthly Project Status Report - providing information on progress made during
the reporting month, including progress against project milestones and discussion
of any issues, problems, etc encountered during the month
· Monthly Project Financial Report - providing information on money expended on
the project during the previous month, and on funds remaining.
· Final Project Summary Report - A Final Project Summary Report will be
delivered following the conclusion of the project. This report will provide
information on work done, accomplishments and results of the project.
In addition, if circumstances require, ad hoc reports may be generated regarding the
specific circumstances or situations. All reports will be provided by the KWI Principal
Investigator or KWI Project Manager to the TSA Program Manager, or to an appropriate
point of contact designated by the TSA Program Manager.
11
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Securit),
At Key West International Airport
3. Principal Investigator
The Principal Investigator for this effort will be Peter Horton.
~
12
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
4. Bibliography
l.G. Di Battista, P. Eades, R. Tamassia and I.G. Tollis, "Graph Drawing: Algorithms for the
Visualization of Graphs," Prentice-Hall, 1999.
2.A. Del Bimbo, E. Vicario, D. Zingoni, "A Spatial Logic for Symbolic Description of Image
Contents", Journal of Visual Languages and Computing, vol. 5, pp. 267-286, 1994.
3.A. F. Bobick and 1. W. Davis. "An Appearance-Based Representation Of Action:' ICPR 13,
August 1996
4.E. Boult, R. Micheals, X. Gao, P. Lewis, C. Power, W. Yin and A. Erkan, "Frame-Rate
Omnidirectional Surveillance and Tracking of Camouflaged and Occluded Targets," Proc.
Workshop on Visual Surveillance, Fort Collins. CO, June 1999.
5.M. Brand, N. Oliver, and A. Pentland. "Coupled Hidden Markov Models For Complex Action
Recognition," CVPR, 1997.
6.M. Brand and V. Kettnaker, "Discovery and Segmentation of Activities in Video," IEEE Trans.
Pattern Analysis and Machine Intelligence, vol. 22, no. 8, August 2000.
7.C. Bregler. "Learning and Recognizing Human Dynamics in Video Sequences," CVPR, pp.
568-574,1997.
8.C. Breg1er. "Tracking People With Twists And Exponential Maps," CVPR, 1998.
9.R. Collins, A. Lipton, T. Kanade, H. Fujiyoshi, D. Duggins, Y. Tsin, D. Tolliver, N. Enomoto,
O. Hasegawa, P. Burt, A. Wixson, "A System for Video Surveillance and Monitoring," CMU
Technical Report CMU-Rl-TR-00-12, 2000.
10. D. Comaniciu, V. Ramesh, and P. Meer, "Real-Time Tracking of Non-Rigid Objects using
Mean Shift." CVPR, pp. II-142-149, 2000.
11. Davis, 1. and Bobick, A. "The Representation And Recognition of Action Using Temporal
Templates," CVPR, pp.928-934. 1997.
12. S. Davies, and A. Moore, "Mix-nets: Factored mixtures of Gaussians in Bayesian networks
with mixed continuous and discrete variables", Sixteenth Conference on Uncertainty in
Artificial Intelligence, 1996.
13. A. Dempster, N. Laird and D. Rubin, "Maximum Likelihood from Incomplete Data via the
EM Algorithm," Journal of the Royal Statistical Society, 39 (Series B):1-38, 1977.
14. P. Duygulu, N. de Freitas, K. Barnard and D.A. Forsyth, "Object Recognition as Machine
Translation," ECCV, 2002
15. A. Elgammal, D. Harwood and L. Davis, "Non-parametric Model fnr Background
Subtraction," Proc. IEEE Frame Rate Workshop, 1999.
16. Makris, D.[Dimitrios], Ellis, T.[Tim], "Path detection in video surveillance", IVC(20), No.
12, October 2002, pp. 895-903.
17. N. Friedman and S. Russell, "Image Segmentation in Video Sequences: A Probabilistic
Approach," Uncertainty in Artificial Intelligence, 1997.
18. Y. Gong and X. Liu, "Generating Optimal Video Summaries," Int'l Conf. Multimedia and
Expo, 2000.
19. E. Grimson, C. Sauffer, R. Romano and L. Lee, "Using Adaptive tracking to Classify and
Monitor Activities in a Site," Proc. Computer Vision and Pattern Recognition Conf., pp. 22-29,
1998.
20. N.C. Haering and N. Da Vitoria Lobo, "Visual Event Detection", Kluwer Academic Press,
1997
21. K.M. Hall, "An r-dimensional Quadratic Placement Algorithm," Management Science,
17:212-229,1970.
22. 1. Haritaoglu, D. Harwood and L. Davis, "W4: Real-Time Surveillance of People and Their
Activities," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 8, August
2000.
13
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
23. W.H. Highleyman. "Linear Decision Functions, with Applications to Pattern Recognition,"
Proc.IFlE,voI50,pp. 1501-1514, 1962.
24. S. Hongeng and R. Nevatia. "Multi-Agent Event Recognition," ICCV, 2001.
25. M. Isard and A Blake. "COND.ENSATION - conditional density propagation for visual
tracking," IJCV, vol. 29, 1, pp. 5-28, 1998.
26. H. Ismai, D. Harwood and L. Davis, "W4: Who? When? Where? What? A Real Time System
for Detecting and Tracking People," 3rd Int'I Conf Automatic Face and Gesture Recognition,
1998.
27. Y. Ivanov and A Bobick, "Recognition of visual activities and interactions by stochastic
parsing", IEEE Transactions of Pattern Analysis and Machine Intelligence, Vol 22(8), August
2000, pp.852-872.
28. N. Johnson and D.C. Hogg, Learning the Distribution of Object Trajectories for Event
Recognition", Image and Vision Computing, 1995.
29. M. Kaufmann and D. Wagner, "Drawing Graphs: Methods and Models," LNCS 2025,
Springer Verlag, 2001.
30. V. Kettnaker and R. Zabih, "Bayesian Multi-Camera Surveillance:' CVPR, pp. II-253-259,
1999.
31. B. Li, R. Chellappa, Q. Zheng, and S.Z. Der, "Model-based Temporal Object Verification
Using Video." Image Processing 10(6): 897-908,2001.
32. G. Medioni, R. Nevatia and 1. Cohen. "Event Detection and Analysis from Video Streams,"
DARP A98, pp. 63-72, 1998.
33. DJ. Moore and LA Essa. "Recognizing Multitasked Activities using Stochastic Context-Free
Grammar." Proc. ofWkshp. on Models versus Exemplars in Computer Vision, CVPR, 2001.
34. D.J. Moore, LA Essa, and M.H. Hayes III. "Exploiting Human Actions And Object Context
For Recognition Tasks." ICCV, vol. 1, pages 80-86, 1999.
35. M.R. Naphade and T.S. Huang, "A Probabilistic Framework for Semantic Indexing and
Retrieval in Video." IEEE Int'l ConfMultimedia and Expo. 2000.
36. S.K. Nayar, R. Swaminathan, and J.M Gluckman, "Combined Wide Angle and Narrow Angle
Imaging System and Method for Surveillance and Monitoring." US Patent # 6,215,519, 2001.
37. N. Oliver, B. Rosario, and A Pentland. "Graphical models for recognizing human
interactions," Proc. NIPS, November 1998.
38. Hanna Pasula, Stuart Russell, Michael Ostland, and Ya'acov Ritov, "Tracking many objects
with many sensors." In Proc. IJCAI-99, Stockholm, 1999. ;
39. PJ. Phillips, P. Grother, S. Sarkar, I. Robledo, and K. Bowyer, "Baseline Results for the
Challenge Problem of Human ill Using Gait Analysis:' 5th IEEE Int'l Conf. on Automatic Face
and Gesture Recognition, 2002.
40. D.E. Rumelhart, G.E. Hinton, and RJ. Williams. "Learning Internal Representations by
Back-Propagating Errors, " Nature, vol. 323, number 99, pp. 533-536, 1986.
41. J.Shi and J.Malik. "Normalized Cuts and Image Segmentation," CVPR, pages 731--7, June
1997.
42. C. Stauffer and E. Grimson, "Learning Patterns of Activity Using Real-Time Tracking,"
PAMI, 22(8):747-757, 2000.
43. M. Trajkovic. "Intruder Tracking with a Pan-Tilt-Zoom Camera." ACCV, 2002.
44. N. Vaswani, AR. Chowdhury, and R. Chellappa, "Activity Recognition Using the Dynamics
of the Configuration ofInteracting Objects." CVPR, 2003.
45. L.E. Wixson, R. Mandelbaum, M.W. Hanson, J. Eledath, D. Mishra, "Method and Apparatus
for Fixating a Camera on a Target Using Image Alignment." US Patent 6,396,961,2002.
46. C. Wren, A Azarbayejani, T. Darrell, and A Pentland. "Pfinder: Real-Rime Tracking Of The
Human Body," Photonics East, SPIE, vol. 2615, 1995.
14
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
47. K. Woods, D. Cook, L. Hall, L. Stark, "Learning Membership Functions in a Function-Based
Object Recognition System", Journal of Artificiallntelligence Research 3, ppI87-222, 1995.
48. Z. Zhang, "A Flexible New Technique for Camera Calibration," PAMl 22(11): pp. 1330-
1344, August 2000.
49. Q. Zhou and J.K. Aggarwal, "Tracking and Classifying Moving Objects from Video," Proc.
2nd IEEE lnt. Workshop on PETS, Kauai, HI, December 2001.
15
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
5. Appendices
5.1. Facilities and Equipment
ObjectVideo's headquarters office in Reston, Virginia has facilities with a wide range of video
processing and storage equipment as well as state-of-the-art software development facilities for
developing, testing, integrating, and hardening computer vision algorithms. Development will be
done primarily in C++ and C# within a Microsoft environment. Analysis and support tools
include a wide range of in-house and commercial packages for analyzing video content and
rapidly testing algorithm components. We have a wide variety of test data, including 3600 RGB
and IR camera video and the equipment to digitize, store, and convert video from almost any
commonly used format, such as digital-beta, VHS, MPEG-2, MPEG-4, A VI and many others.
Our secure video network and storage system provides several terabytes of on-line digital video
storage. We have digital video capable projection systems and meeting rooms for demonstrating
our results as well as having the video servers and Internet access required to host streaming
video over the Internet as well as private virtual networks.
16
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
5.2. Summary Proposal Budget Form
--
r"
--l--~-J
STING SLIDE \1 ------>7. EXISTING GATE #1
E OPERATOR -------__. . LOOP DETECTION
L. _ // SYSTEM
--~~~/-----_.._._----_._.----7/'-------_._--_.-
\ I
, I
I I / I
~ [, ~-------~ L_
C-g I_L--t I ----.-.
I I J
i h-----.--_h___~J
'-,
r-8~~EXISTING BOLLARD
I 9"--........ EXiSTING GATE # 1 PEDESTAL
I I' I ", EXiSTING BOLLARD
I /
I! I /
/1 I /
II ! !
I! I ;
II I I
/ I I I
/ I
/ I
I
I
d
z
~
~~
~
~
~~
~C/:2
E--.~
~~
~~
~~~
~2~
~~
~t:::
C/:223
~~
~~
~---l~
~--~~
~~~
~~~
~~~
~~~
~~~
~ ~
~E~
~2~~
~~~
., ~~
~ ~~~ ei
~ ~~~ ~
DRAWN BY:
AKM
,.,::,..""",
~
E-.
~
~
~
~
E-.
~
j
~
~
:::::::;
c:......::,
~
~
~
k:
~
~
e-..;
d
~
:::::::;
~
~
c:......::,
~
E-.
..........
~
8
<::::2:1-
E-. ...
~
~
~
~
~
~
~
DATE:
2/25/04
DESIGNED BY:
as
DATE:
2/25/04
~~~:
DATE:
3/4/I}Lf
PROJECT NUMBER:
305-20783
SHEET TITlE
MONROE COUNTY
APPROVAL:
OCFSI APPROVAL:
OBJECT RECOGNITION
SHEET No.
1 OF 1
r'-
.
.
L__
EXiSTING H.ANGER ----7
/
REFER TO DWG, [-2
FOR CONTINUp,TION
'.t'
I
___ r -.---------. J:J:Q _______J
~ I ---------~----- ---------------- .
/ ll~ r 1
I '~ " I
I ~\ ""
I \
I ~\ ~--1 EXISTiNG BOLLARD
.___-{~ ~J--- / EXISTING GATE #4 PEDESTAl.
____ -4.---- ___ / / E.X'('TI"r:
. __ II ---- ------. I 1':'1 """ BOLLARD
/#' _. __ t -----
//.1 ------.-----,-- ---B---~/.----.
...- ---
I ---------..-.,../ ----.-
-----
--
---..--.--? REFER TO DWG, E... 2
FOR CONTINUATION
EX
r.'
''';,1-';1
d"
C-4
\JITION
~_~___ A N
SEe U R In;---S~(S.TE~~-PROJ E CT --c ITr:=----...-."
(' "p. E." ' ".) 1 L
" ~, I . 1 10'.........."
~)_',L_. , = '-r --..U
.~
\" bI ,)
~..." r
'.'-- .--
.
....
~ Jf'\ ~ <:::::>
Val ~ ~
~ "---4 C'..l
~~~
o C...J ;:;
~~
..~V)~
~ ~
~~QZ
u ~ <:::::>
Q~~
"~~::i
~ ~
~ ~
~ ~
~ ~
~
o
U
~
~
.. ~
r---..J
~
~
at
~<v
v
(;<v
~<v~
~
e
z
o
F
a..
a::
()
en
w
o
z
o
u;
5
w
a::
~
<(
o
<:::::>
~
Q':)
l'-
I
~
c::o
~
I
~
~
Q':)
~
~
~
<:::::>
~
~
e,,5
<:::::>
<:::::>
l'-
~
.......,.L....,,- __._~,,_." _ .__" .~___. u.___ .
~
>
I-
()
()
(5
'-
~
c
o
()
Vl
Vl
Q)
U
U
<(
-
-
-
~
I
~
c::o
~
I
~
~
Q':)
~
k:
~
It')
co
o
....
o
o
o
()
w
w
en
z
w
()
::J
-
,
....
I-
I
I
I
I
I
I
t
f
I
!
Y3i:J'1 SIH1 N ci CJ38~,;[lN]
~O.j l ~ -3 ';:' 0 01 ~3,J3d
~ # ::J.LIt;) ONY ')NIUlIrI8 X303J
V3i:JY SIHl NVld 038~N1N3 dOJ
o L -.3 ON\?' 6--.3 '')M.CJ 01 d3.:!3d
8NiGlln8 SV'lOlSnJ 's'n
I
V3dV 51H1 N!
03:JClVlN3 dOj L'
9-- J '(;-.] ';).1/\0 (
8NICJlln8 lVN'
I
I
.
;;t--- - JJmllllE -.
(Z,\ /1\
Y? I r\
?ft- \ ~) \'/
10
I \
I \
I
I
.
<i)
i
\-f;t-- (f --
---I-...._.J I
I (6
(!)
I I
L__________._~
l4
)R
,1
-
-
r
r
.~"
19083~ 183rSO -^188
ClOIVCl3dO
v# 31.V~)
'Z~-8
'~ ~ -8 '0 ~ -8 SVt!3~V8 M3N t!O.:l
~ 9-8 'L-8 '9-8 'g-8 'Z-8
SVt!3~V8 8NI1SIX3 t!O.:l 0301^Ot!d
3t!VMl.:lOS 0301^ 183r80-M3N
'18VtllN08 II 3SVHd ,.U1t!n83S t!30Nn
0301^Ot!d SVt!3r;V8 8NI1SIX3 llV
Z~-8 M3N g - V3t!V
Z-8 8NI1SIX3 V - V3t!V
~~-8 M3N r - V3t!V
0~-8 M3N Z - V3t!V
9-8' L-8'9-8'g-8 8NI1SIX3 ~ - V3t!V
--..---(F._.--~
I \
i \
f-r-L-l
I '
\ \
i I
,/1 \
// \. .
/ J
///' 1~~___. ---
,
,
!
I
I
I
I
I
/
!
;
I
VHLS,~S f'I0I1J313(]
dOO-1 tI# 3JV~
-
I~
PROPOSED C-11
NEW CAMERA
,,..----- '" -.- - -- - -
, \
C-3 I. ;-:::;\
~ I \7-1
c-~tc)O
,,-9\ I \
J')> \
I \
C 2 \,
/
\
\
\ r TYP
\
TERMINAL
#4
i
TYP,
MAINTENANCE
BUILDING
I
TERMINAL BUILDING
REFER TO OWG, [-5. [-6
AND E-7 FOR ENLARGED
HIS AF<E,),
TERlv:
REFER T( I
AND [-I
PLA
ATeT
REFER TO OWG- [-3 FOR
ENLARGED PLAN THIS AREA
"'...~---
~~>-
zO
OCD
'-
,.,fT1
fT1()
Z-l
()<
z6
G")fT1
o
GENERAL AVIATION PARKING
!
I
C
1
I
r--:\
&--
/ GAT~
/
/
/
/'
/
/
/