04/21/2004 Agreement
DANNY L. KOLHAGE
CLERK OF THE CIRCUIT COURT
DATE:
June 8, 2004
TO:
Peter Horton, Manager
Monroe County Airports
ATTN:
Bevette Moore
Airport Business Administrator
Pamela G. Hancoc~
Deputy Clerk lY
FROM:
At the April 21, 2004, Board of County Commissioner's meeting the Board granted
approval and authorized execution of a General Contract between Monroe County and Quality
Communications Fire & Security, Inc. (QCFSI), a specifically named contractor, to provide and
install Object Recognition & CCTV upgrades at the Key West International Airport, and to waive
the competitive bid process outlined in the Monroe County Purchasing Policy.
Enclosed is a duplicate original of the above-mentioned for your handling. Should you
have any questions please do not hesitate to contact this office.
cc: County Administrator wlo document
County Attorney
Finance
File./'
GENERAL CONTRACT
PROVIDE AND INSTALL
OBJECT RECOGNITION & CCTV UPGRADES
Project: The Use of Smart Video Surveillance to Provide Enhanced Perimeter Security at Key
West International Airport
Agreement made on this Date: Arrl 1- 7-( , 2004 between Quality
Communications Fire & Security, Inc (QCFSI), of 3700 SW 30th Ave, Ft Lauderdale, Florida
33312 ("Seller"), and County of Monroe board of County Commissioners, DBA Key West
International Airport, 3491 S Roosevelt Blvd, Key West, Florida 33040 ("Buyer").
1. ITEMS PURCHASED. For value received and other consideration, the Seller agrees with
the Buyer to provide the Buyer the following products ("Goods") in accordance with the terms
and conditions of this Contract:
Description
Object Video added solution to existing
CCTV to provide enhanced security
Ouantitv
1
Unit Price Total Price
$194,000.00 $194,000.00
Total Price:
$194,000.00
2. PRODUCT STANDARDS. Goods shall comply with the Seller's quotation dated October
07, 2003 and incorporated into this Contract by this reference. This quotation is based upon the
TSA grant for The Use of Smart Video Surveillance to Provide Enhanced Perimeter Security at
Key West International Airport
3. TITLElRISK OF LOSS. Upon Beneficial Use
4. PAYMENT. Payment shall be made to Quality Communications Fire & Security, Inc
(QCFSI), 3700 SW 30th Ave, Ft Lauderdale, Florida 33312. Buyer agrees to pay to Seller the
sum of $194,000.00 as follows:
$110,000 upon delivery of Object Video Servers and Software
$32,500.00 upon installation of additional cameras and Object Video hardware & software
$51,500.00 upon completion of acceptance testing
Payment terms are net 30 days after receipt of invoice.
If the Buyer should fail to make any of the payments set out in the above schedule, the Seller at
its option may treat the Buyer's failure to pay as a material breach of this Contract, and may
terminate this Contract and/or seek legal remedies.
The buyer may take a 1 % discount if payment is received within 10 days of invoice
PaMt'~
General Contract to Provide and Install Object Video at Key West Airport
5. DELIVERY. Time is of the essence in the performance of this Contract. Delivery of Goods
shall be made according to the following schedule:
Ouantitv
1
Description
Object Video added solution to existing
CCTV to provide enhanced security
Delivery Date
July 1, 2004
Seller is responsible for proper packaging of Goods so the Goods will arrive at the destination
WithOutJRa e. Any damage sustained due to improper packaging will be charged to Seller.
~t.
.Jmi'~ 1 s is an estimated date based on 90 days delivery and installation time frame from the
execution date of the contract, projected as April 1 2004
6. WARRANTIES. Seller warrants to Buyer that the Goods will conform to the applicable
drawings and design standards, to meet the TSA Grant proposal submitted by QCFSI & Object
Video.
Other Limitation of Warranty is included in attached Terms and Conditions
7. INSPECTION. The Buyer, upon receiving possession of Goods, shall have a reasonable
opportunity to inspect the Goods to determine if the Goods conform to the conditions of this
Contract. If the Buyer, in good faith, determines that all or a portion of the Goods are non-
conforming, the Buyer may return the Goods to the Seller at Key West International Airport
(EYW)'s costs. The Buyer must provide written notice to the Seller of the reason for
rejecting the Goods. The Seller will have 30 days from the return of the Goods to cure any
and all defects, or be held in breach.
NOTE
Attached is a copy of terms and conditions and a copy of the site plan (Attachment A) for camera
and Object Video software coverage dated 2/25/04 that are hereby incorporated into this
contract.
General Contract to Provide and Install Object Video at Key West Airport
W~O~
Page 2
8. TERMS AND CONDITONS. Attached
The parties have executed this Contract at Key West, the day and year above written.
Buyer:
County of Monroe BDA Key West International Airport
By:
.~
Monroe County
David P. Rice, Mayor Pro Tern
~ z-'. 2..D01
Date:
Seller:
Quality Co
BY
. OflTE
By:
Date:
3/'2- (0 y
f'o..;) -1"\
c:::I
:% 0 c:::I
(:) ~ r
z ~ c.... rr1
:::On~ C C
Or'.' Z -r'I
"':;'1:. ..... I
n' f' Q) 0
on ::0
c: - ;:$.
z?'o s. :::0
-1 n I ::It ",
~,...;::I: c;
. . )> g
.." C> a
r- ,.." 0 ::::0
".. .. '='
General Contract to Provide and Install Object Video at Key West Airport
Page 3
Quality Communications Fire & Security, Inc.
Terms and Conditions
Introduction: For good and valuable consideration. the parties agree that the terms and conditions contained herein are the sole terms and conditions
of sale and/or for service and represent the sole and complete Agreement between the parties and supersede all prior oral and/or written
representations, understandings, proposals, agreements. and communications regarding the subject matter hereof. The parties agree that no additional
terms will be binding upon Quality Communications even if they appear on Purchaser's formal purchase order, acceptance form, or any other of
Purchaser's documents unless signed by an authorized representative of Quality Communications.
PAYMENT TERMS: If not otherwise specified in the Contract Documents, the following applies:
A. General Pavrnent Terms are net thirty (30) days from date of invoice where satisfactory open account credit is established and maintained.
Quality Communications reserves the right to revoke or modify Purchaser's credit at its sole discretion. A mobilization payment up to fifty
percent (50%) will be invoiced upon acceptance of customer's order. Progress payments to one hundred percent (100%) of order value will be
invoiced monthly based upon equipment delivered or stored and work performed. At Quality Communications' sole option, Purchaser shall pay
cash in advance, or upon delivery, or as otherwise specified by Quality Communications. In the event that Purchaser defaults on its obligation to
pay each invoice when due, then, in addition to all other rights and remedies available to it, Quality Communications shall have the option to
withhold any further shipments of materials and/or the provision of services, if any, until Purchaser's account is fully paid. Further, in the event
payment is not received according to Terms, Quality Communications may, at its discretion, assess interest at the maximum rate allowed by law
or at the rate of 1.5% per month, whichever is less. Purchaser also agrees to pay all costs incurred by Quality Communications in pursuit of
payment which is past due including, but not limited to. collection agency commissions and attorneys fees.
B. Cancellation: Any cancellation must be made in writing. Recognizing that Quality Communications' damages arising from cancellation will be
difficult to estimate or determine, the following charges shall be construed as liquidated damages representing an approximation of the
administrative, engineering, and other costs Quality Communications will actually incur in reliance upon this Agreement, and not a penalty: If,
prior to shipment, Purchaser cancels this Agreement or any portion thereof, for any reason not attributable to Quality Communications,
Purchaser agrees to pay Quality Communications an amount equal to 20% of the price of the products canceled if the cancellation occurs more
than 21 days after Quality Communications receives Purchaser's order or Purchaser accepts this Agreement. If Purchaser cancels after shipment,
Purchaser agrees to pay the above 20% of the price of the products canceled, return the products already shipped, and to pay Quality
Communications an additional amount equal to 20% of the value of the returned products to cover the estimated costs of transportation and
restocking.
C. Custom Software Pavrnent Terms are as provided in section A. above with the following exceptions. A non-refundable twenty percent (20%)
down payment will be invoiced upon acceptance of Purchaser's order. A non-refundable progress payment of forty percent (40%) of order value
will be invoiced upon Purchaser's approval of a Custom Software Development Specification. The final forty percent (40%) payment will be
invoiced upon delivery by Quality Communications of Custom Software.
o Security System I Access Control Svstem Pavrnent Terms are as provided in Section A. above with the following exceptions. A non-refundable
20% down payment is required with Purchaser's order. Progress Payments will be invoiced based upon shipments to Purchaser.
Quality Communications Services: Purchaser further agrees that Quality Communications offers various levels of services and that the Purchaser,
after reviewing the same, has contracted with Quality Communications to perform only the services described in writing in this Agreement. Quality
Communications denies liability for materials, supplies or work provided by other persons. Unless specifically contracted for, Quality
Communications denies any supervisory role and this Agreement shall not commit Quality Communications to any supervisory role, including, but
not limited to, the placement or routing of any wires or other Product.
Security Interest: The Purchaser grants to Quality Communications, and Quality Communications retains, a security interest in all Product, Software,
and proceeds thereof shipped pursuant to this Agreement until the Purchaser shall have made full payment for the Product. Such interest is intended
to be effective as a purchase money security interest. Purchaser agrees that Quality Communications may file this Agreement as a financing
statement. In the event of failure to make payment on the due date in accordance with terms designated, the entire balance shall become due and
payable at once. In case of default of payment, and to the extent permitted by law, Quality Communications shall have the right to take possession of
the Product or Software immediately, wherever it may be found, and remove it with or without process of law and may retain all money paid
hereunder as LIQUIDATED DAMAGES and rental for said product or Software. For the purposes of assisting Quality Communications in perfecting
its security interests, in any Quality Communications Product or Software delivered to the Purchaser, Purchaser agrees to inform Quality
Communications immediately if any other entity has or may have any security interest. perfected or otherwise, in the Quality Communications Product
or Software described on the face of this Agreement and shipped to Purchaser. The Purchaser agrees to pay Quality Communications' costs of
collection, including without limitation reasonable attorneys fees and legal expenses, and that the same are secured by the security interest granted
herein. The Purchaser shall not sell, prior to payment, (except in the ordinary course of business), mortgage, pledge, or lease said Product or Software
without prior written permission of Quality Communications.
Limitation of Warranty: Purchaser understands that Quality Communications is not an Insurer. Subject to the limitations below, Quality
Communications warrants that the Product (as distinguished from Software) be free from defects in material and workmanship under normal use for a
period of one year from the date of first beneficial use of all or any part of the Product or 18 months after Product shipment whichever is earlier,
provided, however, that Quality Communications' sole liability, and purchaser's sole remedy, under said warranty, shall be limited to the repair or
replacement of any Product, or parts thereof, which Quality Communications determines to be defective at Quality Communications' sole option and
subject to the availability of service personnel and parts, as determined by Quality Communications. Quality Communications warrants expendable
items including, but not limited to, video and print heads, television camera tubes, video monitor display tubes, and batteries and certain other
products in accordance with the applicable manufacturer's warranty. Quality Communications does not warrant devices designed to fail in protecting
a system such as, but not limited to, fuses and circuit breakers. Quality Communications warrants that any Quality Communications Software
described in this Agreement, as well as that Software contained in or sold as part of any Product described in this Agreement, will substantially
conform to its published specifications in effect at the time of delivery and for ninety (90) days after delivery. However, Purchaser agrees and
General Contract to Provide and Install Object Video at Key West Airport
Terms and Conditions - Page 1
3~ \)1{
~
Quality Communications Fire & Security,lnc.
acknowledges that the Software may have inherent defects because of its complexity. Quality Communications' sole obligation with respect to
software, and purchaser's sole remedy, shall be to make available published modifications, designed to correct inherent defects, which become
available during the warranty period.
THIS WARRANTY DOES NOT APPLY TO ANY PRODUCTS OR SOFTWARE WIllCH HAVE BEEN SUBJECTED TO ABUSE,
MISHANDLING, OR IMPROPER USE AS DETERMINED BY QUALITY COMMUNICATIONS AND IS IN LIEU OF ALL OTHER
WARRANTIES, EXPRESS OR IMPLIED, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABll..ITY OR FITNESS FOR A
PARTICULAR PURPOSE.
Warranty service will be performed at no charge between the hours of 8:00 am to 5:00 PM local time, Monday through Friday exclusive of Quality
Communications' holidays. Warranty service requested to be performed at other than during Quality Communications' normal work hours shall be
chargeable at Quality Communications' standard overtime rates. All repairs or adjustments that are or may become necessary under the warranty
provisions of this agreement shall be performed only by an authorized representative of Quality Communications. Any repairs. adjustments, or
interconnections performed by the purchaser or anyone other than an authorized Quality Communications representative shall void all warranties.
LIMITATION OF LIABll..ITY: QUALITY COMMUNICATIONS SHALL NOT BE UABLE FOR ANY INDIRECT, INCIDENTAL,
ECONOMIC, OR CONSEQUENTIAL LOSS OR DAMAGE TO THE PURCHASER OR USER OF THIS PRODUCT AND/OR SOFTWARE
ARISING OUT OF, AMONG OTHER THINGS, THE OPERATION OR FAILURE OF THE PRODUCT AND/OR SOFTWARE TO OPERATE,
THIS AGREEMENT, THE INSTALLATION, USE, DESIGN OR FUNCI10N OF ANY QUALITY COMMUNICATIONS PRODUCT AND/OR
SOFTWARE.
LIMITATION OF REMEDY: It is understood and agreed that since it its impractical and extremely difficult to fix actual damages, if any, or
ascertain what, if any, portion of any loss or injury would be proximately caused by the failure of Quality Communications' Product and/or Software
to operate, or to operate properly, or Quality Communications to perform any of its obligations or services described herein, UNDER NO
CIRCUMSTANCES WILL QUALITY COMMUNICATIONS'S UABILITY FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO
THOSE, ARISING IN ANY WAY OUT OF THE INSTALLATION, USE, DESIGN OR FUNCI10N OR FAILURE TO FUNCI10N OF ANY
PRODUCT AND SOFTWARE SOLD BY QUALITY COMMUNICATIONS BE IN EXCESS OF THE PURCHASE PRICE PAID FOR THE
PRODUCT, SOFTWARE AND/OR SERVICES. THIS SUM SHAll. BE THE PURCHASER'S SOLE, COMPLETE AND EXCLUSIVE REMEDY
AND SHAll. BE PAID AND RECEIVED AS LIQUIDATED DAMAGES OR A LIMITATION OF UABILITY AMOUNT AGREED ON BY THE
PARTIES AND NOT AS A PENALTY. IN NO CIRCUMSTANCES WILL QUALITY COMMUNICATIONS BE HELD LIABLE FOR ANY
CLAIMS, LOSSES, DAMAGES OF INJURIES ARISING FROM OR CAUSED BY, THE PURCHASER'S OR ANY OTHER PARTY'S
MATERIAL, EQUIPMENT, ACI10NS, OR OMISSIONS. If Purchaser wishes Quality Communications to increase the amount of the above
limitation of liability or liquidated damages amount stated in this Agreement, Purchaser may inquire about obtaining an increase to this amount in
exchange for an increased purchase or contract price. Under no circumstances will an increase in the purchase or contract price be construed to mean
that Quality Communications is an insurer or that the obligations of obtaining and maintaining insurance are not with the Purchaser.
INSURANCE OBLIGATIONS: It is understood and agreed by the Purchaser that Quality Communications is not an insurer and that it is the
Purchaser's obligation to obtain and maintain any insurance covering any losses to property or personal injury or any other damage which may occur
at the premises where the Quality Communications Product, Software or Services, which form the basis of this Agreement, are delivered, assembled,
installed, used, or performed. The Purchaser agrees to list Quality Communications as an additional insured on all such policies and to provide
Quality Communications a copy of the Certificate of Insurance upon request. Purchaser further agrees that the Certificate of Insurance shall contain a
provision that coverage afforded under the policies will not be canceled or materially altered until at least thirty (30) days after written notice is given
to Quality Communications.
WAIVER OF SUBROGATION: Purchaser does hereby for itself and all other parties claiming under it release and discharge Quality
Communications from and against all hazards covered by Purchaser's insurance, it being expressly agreed and understood that no insurance company,
insurer, or any other third party will have any right of subrogation against Quality Communications.
LIMITATION OF ACTIONS: The Purchaser hereby agrees that no claim, suit or action of any kind shall be brought against Quality
Communications, its agents, employees, and/or officers more than one year after the claim arises, whether known or unknown when the claim arises,
provided however, that if there is a claim, suit, or cause of action arising under the Warranty, it must be brought, if at all, within six months of
expiration of the Warranty period stated above. This clause is in no way to be interpreted as an extension of the Express Warranty stated in paragraph
4 above.
DRA WINGS: All drawings and wire diagrams provided by Quality Communications in connection with this Agreement are protected under United
States Copyright Laws and intended solely for the use of the installing contractor as a guide for the fabrication and installation of the system. These
drawings and wire diagrams are prepared in accordance with the project plans and specifications available to Quality Communications at the time of
the bid and are NOT intended to be System design or approval documents. Quality Communications is not a design professional. Under no
circumstances is any clause in this agreement or any actions taken by Quality Communications to be construed in such a way as to impose upon
Quality Communications the duties or liabilities of a design professional.
CHANGE ORDERS: This Agreement can be modified, amended or altered only by an Agreement in writing, signed by both parties or their duly
authorized representatives.
General Contract to Provide and Install Object Video at Key West Airport
Terms and Conditions - page2
Quality Communications Fire & Security, Inc.
SOFTWARE LICENSE AND USE: Software Products provided by Quality Communications are licensed, not sold, to the Customer. Customer has
only a non-exclusive, non-transferable license to use the Software ("License"). Quality Communications retains all right, title and interest to the
Software. In some cases, Quality Communications may have a right to relicense the Software. "Software" shall mean any part of Software provided
by Quality Communications in machine readable fonn indicated on this Agreement or contained in any Quality Communications Product indicated on
this Agreement or ordered subsequently, any modified versions and all related documentation. Customer shall use the Software only on the Product
and at the Product Site listed herein. Any Software received by Customer at any time is subject to this Agreement. The License tenn begins upon
delivery of the Software and continues until the last use of the Software with the Product, unless tenninated. Quality Communications may tenninate
this License if Customer: (I) fails to perfonn any obligation under the Agreement; (2) ceases to do business as a going concern; or (3) has its assets
assigned or attached by law. Within five (5) days after the License tenninates, Customer shall, at its expense, return the Software to Quality
Communications and destroy all copies of the Software, including memory or storage copies.
PROTECflON AND NON-DISCLOSURE: Customer shall maintain the Software in strict confidence and shall disclose it only to its employees
requiring access. Customer shall implement adequate procedures controlling access to and use of the Software consistent with the protection of
Quality Communications' rights. Customer may duplicate Software only for internal use on the Product according to Quality Communications
instructions. The Quality Communications legend restricting Software use must appear on any copies of the Software. Customer shall not reverse
compile the Software.
TITLE: The Software and any relevant Product as described in this Agreement shall remain the personal property of Quality Communications, even
if attached to realty or other property. Customer shall not sell, assign, encumber or remove the Product or Software without the prior written consent
of Quality Communications. Customer shall perfonn all necessary acts to preserve and protect the right, title and interest of Quality Communications
in the Product and Software including but not limited to signing any financing statements or other documents requested by Quality Communications
or its agents. Quality Communications may inspect the Product and Software during nonnal business hours and may affix labels or notices of
ownership on the Product and Software.
FORCE MAJEURE: Quality Communications shall not be liable for any loss or damage of any kind resulting from delay, inability to deliver, or
install, or to perfonn any other work under this Agreement on account of fire, flood, labor problems, access to premises, accidents, acts of civil or
military authorities, acts of God, or from any other causes beyond Quality Communications' control.
TAXES, LICENSES AND PERMITS: The Purchaser is responsible for obtaining all licenses, and pennits and for paying all applicable taxes and
fees unless otherwise agreed to in writing.
INSTALLATION: The installation of the Goods is included as specifically provided for in this Agreement.
DRUG FREE WORKPLACE POLICY: Quality Communications has a written drug free workplace policy available for review by written request.
EXPORT COMPLIANCE: All sales hereunder shall at all times be subject to the export control laws and regulations of the Government of the
United States. Purchaser agrees that it shall not make any disposition, by way of trans-shipment, re-export, diversion, or otherwise, except as said
laws and regulations may expressly provide. Purchaser expressly agrees, to the fullest extent pennitted by law, to indemnify Quality Communications
for any and all damage arising from the violation of any export law or regulation with respect to any goods delivered to Purchaser or at Purchaser's
direction. Said damages include, but are not limited to, legal fees, court costs, expert fees, and any and all other resulting costs and expenses.
EVENTS OF DEFAULT: Purchaser shall be in default of this Agreement upon the occurrence of. but not limited to, any of the following:
A. The Purchaser's failure to make due and punctual payment of any payment due pursuant to this Agreement;
B. The Purchaser's failure to perfonn any obligation under this Agreement;
C. An order, judgment or decree entered, with the approval or consent of Quality Communications, by any court of competent jurisdiction,
approving a petition seeking reorganization of the Purchaser or appointing a receiver, trustee, or liquidator (or other officer having power,
under applicable law, similar to those of a receiver, trustee, or liquidator) of the Purchaser or of all or a major portion of its assets, and such
order, judgment, or decree shall continue unstayed and in effect for any period of sixty (60) consecutive days;
D. The Purchaser fails to provide Quality Communications with adequate assurances of due perfonnance under the Agreement, after receiving a
written request for same from Quality Communications;
E. The Purchaser's financial position materially deteriorates; or
F. The Purchaser shall cease to do business as a going concern.
GENERAL: Any provision of this Agreement which is prohibited by the law of any state shall, as to such state, be ineffective to the extent of such
provision without invalidating the remaining provisions of the Agreement. This Agreement shall be construed under the laws of the State of Florida.
General Contract to Provide and Install Object Video at Key West Airport
Tenns and Conditions - Page3
o.JAo"-
~
~dI8:1 '8z'^e~ aUJ1l pa^laJa~
LOBBYING AND CONFLICT OF INTEREST CLAUSE
SWORN STATEMENT UNDER ORDINANCE NO. 010-1990
MONROE COUNTY, FLORIDA
ETHICS CLAUSE . J '
\' 11 (\"" -- '-h' f~r~ 4 ~CLJf' "'I )hc - . " . .
Quo I \..D IlfOuC\ICa _()r\~ warrants that he/it has not employed, retained
,
or otherwise had act on his/its behalf any fonner County officer or employee in violation of
Section 2 of Ordinance No. 10-1990 or any County officer or employee in violation of
Section 3 of Ordinance No. 10-1990. For breach or violation of this provision the County
may, in its discretion, tenninate this contract without liability and may also, in its discretion,
deduct from the contract or purchase price, or otherwise recover, the full amount of any fee,
commission, percentage, gift. or consideration paid to t
tgnature)
,S;().B;G <I
Date:
-flu '\ck~
STATE OF
COUNTY OF -B..C'\....u,.,
PERSONALL Y APPEARED BEFORE ME, the undersigned authority,
-50\ 'W -\ '1?-tc-I"'-~ '/
who, after first being sworn by me, affixed hislher
signature (name of individual signing) in the space provided above on this 2 f:)) day of
r\\ ~ 20tl.
."'" Can Breaban
..,;'~~Y!IJ~<;;~_ Commission #DD 174692
~~'s:C~':.~ Expires: Oct 05, 2004
:.~" . ~. ''ff..: Bonded Thru
'"/'j''' 0"",
""..~~,f,~," 6,t1antic Bonding Co.. Inc
My commission expires: I [) c:; C)\--(
OMB - MCP FORM #4
~
i Jun 02 04
11:2 a
Jerome Fain
305-295-8974
p. 1
PUBLIC ENTITY CRIME STATEMENT
"A perSon or affiliate who has been placed on the convicted vendor list
following a conviction for public entity crime may not submit a bid on a
contratt to provide any goods or services to a public entity, may not submit
a bid or a contract with a public entity for the construction or repair of a
public puilding or public work, may not submit bids on leases of real
propeJ1y to public entity, may not be awarded or perform work as a
contradtor, supplier, subcontractor, or consultant under a contract with any
public entity, and may not transact business with any public entity in excess
,
of the tpreshold amount provided in Section 287.017, for CATEGORY
TWO for a period of36 months from the date of being placed on the
convicted vendor list."
t
By:
Received Time Jun. 2. 11:39AM
\ 3;
%
�I -
10
xm
i \
1
r
- - - \
`
a
y%
s
.1 18C USE' OI EdI1RP VIDEO SOEVEIGE4NCR 10 PROVIDF, - Quality ComrraaEnieat1010s
I�iHAV(ED PC11,I411l1R SECURITY AT KEY I�RST FIRE&SECURITY
r — 8700 S.E.SOTS p6E FL LAUOERILL FLORIDA 33314 2830
° p 1�TE,Iti 1�T O L IMPORT_ _ _ _ __ OFFICE 954-584 4111 FAX.954 584 7940
1 o FOR TSa CRAVT,QN11TY COhIL9[.RKMOVS FIRE&SECURITY A TAC8)07'
onununica~ions
~&i!Ia
VOICE I DATA I FIBER SYSTEMS
DESIBN .INSTAUATlON. FlNANClNB
February 9, 2004
Jerome Fain - Airport Security Director
Key West International Airport
3491 S. Roosevelt Blvd.
Key West, Florida 33040
Ref: TSA Grant for Pilot Projects
Dear Mr. Fain:
Thought I would take a moment to summarize our conversations to this point. It was good to hear that the
airport is on the county agenda to accept the grant money this month. Of the seven (7) airports to be
approved for these grants, Key West is the only one who has not yet accepted the grant and started the
project. Obviously, we want to do what we can to help. We are also concerned at the recent suggestion
that Key West might "bid" out this project.
Quality Communications Fire and Security, Inc. worked closely with Object Video and Key West
International Airport to write this grant and push it through the TSA. If you reference the grant proposal,
Ouali{y Communications Fire and Security is specifically named as the contractor for this iob. The funds
were awarded for this project to be installed by this team.
There are many additional reasons, QCFSI and Object Video (OV) must execute this work.
QCFSI is currently installing the new base camera system. This base system is tied into the TSA
grant system on many levels (hardware and software). QCFSI must be the integrator to tie into
this system to maintain the integrity of the base system and to provide any type of warranty.
QCFSI and OV designed this entire system specifically to integrate into the existing system and
meet specific TSA guidelines for security and testing. We are using six (6) of the cameras in the
QCFSI base project for part of the TSA project.
QCFSI, as you can see from the attached letter, is the only Florida certified Object Video
installer/service in Florida. We are the only ones who can do this.
QCFSI and Object Video are specifically mentioned in the grant under "Project Team", and it the
project was funded by the TSA with this understanding.
3700 SW 30TH AVE- FT LAUDERDALE, FL, 33312 - PHONE (954) 584.4111 - FAX: (954) 584-7940
.. '.,' L ,\ LIT Y 1 S I'\i EVE R Y T H I '\i (; \X' F L"'"
-2-
February 9,2004
If you were to bid this job, you would have to hire an engineering 'consultant to "design" a system
as well as someone to write specifications and bid documents. Not only are these expenses not
covered by your grant ($20,000-$30,000), it would take 6-9 months for this process to occur. You
must accept and use this grant by ~ end of the year. This includes the testing phase of the project.
Basically, installation needs to be finished by May. In addition, you would violate all
confidentiality rules in place by the TSA. This is a need-to-know project and should not be
advertised publicly. This is why the grant asked for the project team up front. QCFSI and Object
Video were granted clearance to do this project when Key West was chosen for the grant. Our
companies were thoroughly researched by the TSA.
Jerome, QCFSI feels very strongly that it is in the best interests of Key West International Airport to award
this job to our team. As you know, QCFSI did all of the up-front design, engineering, and document
preparation and submittal. All of this ($12,000 in billable work) was done at no cost to Key West Airport
as we were to recoup our costs as part of this grant. If the grant is accepted by Key West, it is accepted for
a specific design, product and team. That was its purpose. Finally, by selecting QCFSI and OV as the
grant stated, Key West International airport would minimize its responsibility, as the airport would be using
QCFSI's design and team, as approved by the TSA, to execute this project.
I am available to talk to your county attorney at any time about this project. It is our hope that, at your
county meeting in mid-February, the county would not only accept the grant money from the TSA, but also
award the project, in its entirety, to Quality Communications Fire and Security, Inc. as the prime
contractor. We would, of course, then subcontract the software portion of the job to Object Video and
proceed with installation.
Should you have any questions, or require any further information, please do not hesitate to contact me.
Sincerely,
ft,;-- e ~
Bart C. Savage
Account Executive
QUALITY COMMUNICATIONS FIRE AND SECURITY; Inc.
Cj#) ObjectVideo"
11600 Sunrise Valley Drive, Suite 290
Reston, Virginia 20191
Phone (703)654-9300
Fax (703)654-9399
www.obiectvideo.com
February 2, 2004
Jerome Fain
Airport Security Director
Key West International Airport
Key West, Florida
Dear Director Fain,
In reference to the TSA-FAA Grant Application for using ObjectVideo intelligent video surveillance
to enhance the perimeter security of Key West Airport, ObjectVideo indicated a desire to work
with Quality Communications, Inc., (QCI). QCI is a preferred partner of ObjectVideo, as it is the
only integrator in Florida who is trained and certified to support and install ObjectVideo
technology. As such, QCI will be responsible for providing Key West Airport with first tier
troubleshooting and maintenance support; as well as helping to install the system. ObjectVideo
will, of course, provide factory support from our offices in Reston, Virginia, but QCI is the only
company certified to provide customer support for us in Florida.
Sincerely,
Melchior Baltazar
Director, Critical Infrastructure Protection
July 16, 2003
To: Nicole Feriozzi
WJ Hughes Technical Center
Aviation Research Center Office, ACX-50
Atlantic City International Airport, NJ 08405
Proposal For TSA Grant to Airport Authorities for Pilot Projects
For Key West International Airport
Key West International Airport is pleased to submit the enclosed proposal in response to
the TSA Announcement of Funding for Grants (Cooperative Agreements) to Airport
Authorities for Pilot Projects, dated June 12,2003.
Should you have any questions regarding this proposal or the associated documents,
please don't hesitate to contact us.
1
COVER SHEET FOR PROPOSALS
0 TO THE Form Approved:
FEDERAL AVIATION ADMINISTRATION O.M.B. No 2120-0559
us. Department 0( ianspor1ollon
Federal Aviation Administration
FOR CONSIDERATION BY FAA ORGANIZATION UNIT SOLICITATION NUMBER
Indicate the most specific unit known i.e. program, division, etc. Announcement for Funding of Grants (Cooperative
Dept. of Homeland Security / Transportation Security Agreements) to Airport Authorities for Pilot Projects, June
Administration 12.2003
EMPLOYER IDENTIFICATION NUMBER (EIN) or SHOW PREVIOUS GRANT NUMBER IF THIS IS A IS THIS PROPOSAL BEING SUBMITTED TO ANOTHER
TAXPAYER IDENTIFICATION NUMBER (TIN) SUPPLEMENT TO AN EXISTING GRANT FEDERAL AGENCY? YES_. NO X . IF YES, LIST
59-6000749 ACRONYMIS) -
NAME OF ORGANIZATION TO WHICH AWARD SHOULD BE MADE: INSTITUTION NAME (IF KNOWN)
Key West International Airport Not applicable
ADDRESS OF ORGANIZATION (INCLUDE ZIP CODE)
3491 South Roosevelt Blvd., Key West, FL 33040
CONGRESSIONAL DISTRICT 20th COUNTY Monroe
SUBMITTING ORGANIZATION o ACADEMIC D NON-PROFIT ORG xD FOR-PROFIT o OTHER
INSTITUTION ORG
BRANCH/CAMPUS/OTHER COMPONENT (Where work is performed. if different from above)
TITLE OF PROPOSED PROJECT The Use of Smart Video Surveillance to Provide Enhanced Perimeter Security at Key
West International Airport.
REQUESTED AMOUNT: PROPOSED DURATION REQUESTED STARTING DATE
12 months 9/1/2003
$195,400.00
PI/PD DEPARTMENT PI/PD PHONE NUMBER PI/PD FAX NUMBER
Not applicable r
,..
NAMES (TYPED) SOCIAL SECURITY NO. HIGHEST DEGREE & SIGNATURE
YEAR ..----, ---'
PI/PD 4,.".{ SeA D'/ /?? I ~/
PQtor HsrteR :JUOJf1L fit;n 2~5..3'- 9~?~ 17 -
CO-PI/E:MAIL ADDRESS V f
ObiectVideo (see above)
I CO-PI/PD
CO-PI/PD
CO-PI/PD
By signing and submitting this proposal, the authorized official of the applicant institution is providing certification regarding federal debt status. debarment and suspension,
drug-free workplace. and lobbying activities
(If answering "yes" to either. please provide explanation.) YES NO
Is the organization delinquent in any Federal debt? .J
Is the organization or its principals presently debarred. suspended, proposed for debarment. declared ineligible, or voluntary excluded from covered .J
transactions by any Federal department or agency?
- - -
AUTHORIZED INSTITUTIONAL REPRESENTATIVE ..21'GNAyURE .---/ / DATE
I NAME/TITLE (TYPED) Director Jerome Fain Jl /. - ./ /Y 7-/t' -c:;S
C" . +-ul'. f'"\~....._~ . .....~~ ..~_~_ 7--'/
I TELEPHONE NUMBER ~ 'J ~ NUpa-ER V'
305-296-8099 ~ 305-2958974
FAA Form 9550-1110.95) Supersedes PrevIous Edition
"',
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
Table of Contents
1. Project Summary ......................................................... ......................................... ........... ................. ...2
~o j ect Description ...................................................;...... ............... ................. ................. ..... ..............3
'-}Y ~~%~:e~.~:.::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::~
2.3. Objectives............................................................................................................................. ........4
2.4. Pilot Project Work Plan ........ .......................... ............. ...... .................. ........... ...... ... ............. ........6
2.4.1. Secure Virtual Perimeter - SIDA After Hours ........................................................................6
2.4.2. Enhance Perimeter Security - Aircraft Quarantine Area........................................................8
2.4.3. Enhance Perimeter Security - Fuel Depot .............................................................................. 9
2.5. Relation of Proposed Work to Other Work in Progress and Long Term Goals .........................11
2.6. Project Reporting.......... ............................. ......... ................ ..... .... ........ ........... .... ...... .......... ....... .11
3. Principal Investiga to r Biographical Sketch ............................... ............. ....................................... ..12
4. Bibliograp hy .............................................................. ................... ..... ............ ............ ............ ........... ..13
5. Appendices ............... ............................................................................... ................................... ...... ...16
5.1. Facilities and Equipment ...............................................................................................................16
5.2. Summary Proposal Budget Form....................................................................................................17
1
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
1. Project Summary
U.S. airports currently face an extremely challenging security environment, with threats ranging
from common, opportunistic criminal-activity, through activities by more sophisticated organized
criminal elements to terrorist activity. As advances are made in fields, like computer vision, with
the potential to improve physical security systems, it is important to make the benefits of those
advances, in the form of enhanced security systems or capabilities, available as soon as possible.
In order to ensure that promising R&D efforts do translate into gains for airport security, Key
West International Airport, in concert with ObjectVideo™, is proposing an innovative pilot
project to exploit the advanced features of ObjectVideo'sTM Video Early Warning (hereinafter
YEW) product to provide a virtual, secure perimeter for the airport's SIDA area, and to
strengthen perimeter security for the aircraft quarantine area and the fuel depot.
An aggressive plan is being proposed for the deployment and testing of smart video surveillance
capabilities (including automatic target detection, classification and tracking, detection of threats
like left bags and loitering in security areas, etc) at Key West International Airport with the goal
of enabling the fast and efficient proliferation of the most successful of these capabilities to other
airports in the US.
2
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
2. Project Description
U.S. airports currently face an extremely challenging security environment, with threats ranging
from common, opportunistic criminal activity (e.g. thefts by untrustworthy baggage handlers),
through activities by more sophisticated organized criminal elements (e.g. organized drug
smuggling efforts) to terrorist activity (e.g. terrorist operatives attempting to bring down airliners
with shoulder-held rocket launchers). As advances are made in fields, like computer vision, with
the potential to improve physical security systems, it is important to make the benefits of those
advances, in the form of enhanced security systems or capabilities, available as soon as possible.
In this response to the Department of Homeland Security (hereinafter DHS) / Transportation
Security Administration (hereinafter TSA) announcement of funding for grants to airport
authorities for pilot projects, the Key West International Airport (hereinafter KWI) is proposing
an extensive pilot project to bring smart video surveillance capabilities and advanced computer
vision techniques to bear in providing an innovative virtual secure perimeter for KWI's SIDA
area, and strengthening perimeter security for other vital areas at the airport.
Project Team
For this effort, KWI has assembled an outstanding team that includes ObjectVideo™ and Quality
Communications Fire & Security of Florida, Inc. (hereinafter QCI). ObjectVideo™, the leading
developer of intelligent video surveillance software for physical security applications, was
founded in 1998 by a team of former research scientists from the Defense Advanced Research
Projects Agency (hereinafter DARPA) whose expertise in an elite area of artificial intelligence
known as computer vision provided the nucleus around which the company was formed. In
keeping with this foundation, ObjectVideo'sTM corporate mission is to provide a reliable conduit
for the efficient movement of computer vision research from the laboratory into commercially
successful software products and solutions addressing both the current and future video
surveillance needs of customers and potential customers. This corporate mission encompasses
three principal objectives:
· Research aimed at advancing the state-of-the-art in the field of computer vision
· Business practices aimed at accomplishing the successful, timely, and efficient transfer of
advances in computer vision from laboratory to commercially viable software and service
offerings-
· The maintenance of a high level of integrity in all dealings, and at all levels of the
company.
Headquartered in Reston, Virginia, ObjectVideo™ currently has close to 50 employees, with the
majority being involved in product development or the delivery of professional services.
ObjectVideo'sTM client list includes both commercial entities such as BP, and government
organizations such as the US Department of Energy, the US Customs Service, Andrews Air Force
Base, the Office of Naval Research, and the Pentagon Force Protection Agency. ObjectVideoTM
was founded on the concept of providing a reliable conduit for the timely, efficient movement of
computer vision research from the laboratory into commercially successful software products and
solutions and continues to live up to that goal by bringing advanced video surveillance and
analysis capabilities to market for its growing customer base.
QCI is an experienced integrator and installer specializing in all aspects of low-voltage and
telecommunications cabling systems, with demonstrated expertise in handling installations of
voice grade cabling, state-of-the-art fiber optics, security systems, and access control systems,
among others. Founded in 1990, the company currently has more than 60 technicians and
RCDDs on staff, and boasts a management team with over 100 years of combined technical and
~
3
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
engineering experience. QCI's corporate objectives are to maintain a competitive edge while
providing the highest quality of service possible to their growing customer base.
Figure 1: Key West International Airport - Overview
2.2. Purpose
The purpose of the pilot project proposed here is to exploit the advanced features of
ObjectVideo'sTM Video Early Warning (hereinafter YEW) product to investigate the use of
secure virtual perimeters and to provide significantly enhanced security for physically bounded
perimeters (e.g. perimeters bounded by a perimeter fence) at KWI. A detailed work plan has
been developed enabling an aggressive effort to accelerate the move of smart video surveillance
technologies currently in product development and/or testing from that environment into use in
"real world" situations and, by doing so, to significantly enhance security capabilities available to
airports across the US.
KWI is confident that the team assembled for this effort can successfully implement the proposed
enhancements in a way that will not only demonstrate their value but will also establish a solid
basis for their proliferation to other airports throughout the US. KWI is confident that this pilot
effort will serve as a solid initial step in enhancing air transportation safety on a national level.
2.3. Objectives
The overall goal of the proposed pilot project is the enhancement of physical security at Key
West International Airport by establishing a secure virtual perimeter to provide after-hours
protection for the airport's SIDA area, and strengthening security along existing physical
perimeter fence lines bordering KWI's aircraft quarantine area and the airport's fuel depot. These
goals are reflected in the objectives established for this effort. Many of these objectives can be
met by making use of features included in the current version ofObjectVideo'sTM YEW software
application while others will require the early implementation of features currently scheduled for
future versions of the product. ObjectVideo'sTM schedule for implementation and deployment of
4
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
enhancements to the VEW application will be adjusted in order to ensure that all of the objectives
listed here are met within the time scheduled for this pilot project.
The table below lists the objectives for this area, and provides a brief description for each
objective.
r .' ." ,.....,. ,.<ii.... ........ ....
Objective ..,..i)\CH< .'.' ."'<
Set Virtual A line is positioned across the image of an area being observed (e.g. across
Tripwires a corridor, along a fenceline) when a person or vehicle moving through the
area crosses the point designated by the line, or virtual tripwire, an alert is
generated
Establish Areas of The image of an area under observation can be sectioned and sections
Interest / designated as areas of interest or areas of disinterest. Actions or events
Disinterest taking place inside an area of interest will generate alerts. Actions or
events occurring inside an area of disinterest will be ignored by the system
Detect Loitering The system will detect people and/or vehicles remaining inside an area of
interest for longer than a specified amount of time, and will generate an
alert.
Detect the The system will detect the removal of objects from areas of interest (e.g.
Removal or the removal of a painting from its usual place on a gallery or museum
Insertion of wall) or the insertion of an object into an area of interest (e.g. an
Objects in Areas unattended bag or backpack left in an area where luggage should not be
ofInterest unattended) and will generate an alert.
Detect Gross The system will detect changes in the image that may indicate tampering
Changes with the camera. These might include the camera's have been moved from
its original position (pointed away from the area under observation), the
camera being covered, the lens being obscured in some other way (e.g. by
someone spray-painting the lens), or bright light being shone into the
camera to blind it. The system will generate an alert when any of these
conditions is detected.
-
Detect and Track The system will detect people, vehicles, or other objects, or targets, of
Objects interest and will be able to track those targets as they move through the
area being observed.
Count Tracked The system will be able to count objects, or targets, being tracked.
Obiects
Classify Tracked The system will recognize different classes, or types, of objects, such as
Objects people, and vehicles. The system also allows for user defined classes,
which can be used to designate objects such as specific types of vehicles
allowed within a SIDA area. Objects will be classified by attributes such
as size, motion, and color.
Perform Multi- The system will be capable of tracking a specific target (e.g. person or
Camera Target vehicle) as the target moves through the fields of view of multiple cameras
Tracking and and will maintain consistent information on the target's motion or
Handoff trajectory.
5
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
Perform The system will stabilize images by compensating for camera motion (e.g.
Automatic Image a stationary camera mount being shaken by a strong wind).
Stabilization
Provide a Map- The user interface display will be based on a map or satellite image of the
site (or relevant section of the site) and will display icons indicating
Based Gill camera placement and alert status. Alerts generated by the system will be
clearlv indicated on the interface display.
2.4. Pilot Project Work Plan
The work plan presented in this section has been developed for implementation of the pilot
project proposed here for KWI. The project involves the implementation of a secure virtual
perimeter for the entire SIDA area at the airport and the significant enhancement of security along
existing perimeter fencelines bordering the aircraft quarantine area and the fuel depot. As an
initial step in this process, ObjectVideo™ YEW will be installed on a server residing in a
centralized location at KWI. The server and installed copy ofVEW will be capable of supporting
all camera installations (both existing . and new) required for this effort. Where necessary,
infrastructure will be enhanced and fiber optic cable will be laid to provide high speed
connections between cameras and server.
The pilot project here proposed involves two specific areas of endeavor:
1) The installation of cameras and the development of YEW rules necessary to establish a
secure, virtual perimeter around the SIDA area. This perimeter will only be activated
after normal airport hours, to protect that area when normal airport operations have shut
down for the evening.
2) The installation of cameras and the development of YEW rules necessary to set up smart
video surveillance of existing physical perimeter fencelines bordering the aircraft
quarantine area, and the airport's fuel depot. Unlike the secure virtual SIDA perimeter,
these measures will be active around the clock.
Each of these proposed enhancements will involve the physical deployment of equipment such as
cameras, camera mounts, illuminators, etc. as well as the implementation of rule sets, designed to
deal with the specific security challenges presented by aspect of the project, in the ObjectVideo™
YEW system.
Sections 2.4.1., 2.4.2., and 2.4.3. describe the sites or areas involved in this pilot project, the
security challenges associated with each of these sites, and the measures proposed to provide the
innovative virtual perimeter approach and the significant enhancements to perimeter security.
2.4.1. Secure Virtual Perimeter - SIDA After Hours
While operations in the SIDA area at KWI are physically secured by the presence of airport, and
specifically SIDA area assigned, personnel during normal airport operating hours, KWI is
unusual among international airports in that normal airport operations shut down at a certain time
in the evening and remain shut down until the following morning. It is establishing and
maintaining security in this SIDA area in the hours during which the airport is shut down that are
a serious concern. The installation of a permanent physical banier such as a fence is not
compatible with normal airport operations in and around this area therefore there is no easy
physical way to ensure that the area is secure during those hours. KWI is, therefore, proposing an
6
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
The SIDA area at KWI IS a
long, rectangular area
covering the area in front of
the terminal as adjacent
buildings. The physical
enhancements required for the implementation of a virtual perimeter barrier include the
installation of six IDN (Day / Night) cameras with overlapping fields of view providing almost
complete coverage of the SIDA area.
The virtual perimeter itself is established by developing a set of rules in YEW that will enable the
system to deal with situations that represent potential threats in this area.
I) Designate an area of interest encompassing the SIDA and the some of the area
immediately adjacent to it. This establishes the boundaries of the area in which rules
(e.g. loitering detection) designated for this area will be applied.
Establish tripwires near and at the boundary of the Tripwire 1 _ Medium Level Alert
secured area. Tripwires will be established to
enable the generation of alerts when people or Tripwire 2 _ High Level Alert
vehicles are detected approaching the perimeter.
These tripwires will be drawn in at least three
places, one outside of the SIDA boundary, one at
the SIDA boundary, and one just inside the
boundary. An escalating series of alerts will be
generated, dependent upon the tripwire crossed, to
inform security personnel of the potential
seriousm:ss of any incursion threat. Figure 3
provides an example of the placement of these
tripwires and the urgency level of the alerts
generated at each point.
Classify targets approaching or intruding into the SIDA area. The system will not only
detect people, vehicles, etc. approaching or crossing into the SIDA area, but will also be
able to classify the target and to deliver information on the type of target to security
personnel. Target classifications will include not only target types such as people,
vehicles, aircraft, etc. that represent potential threats and should generate alerts, but also
targets such as wildlife that do not represent a threat and which should not generate alerts.
Detect loitering in the area of interest adjacent to the SIDA area. People or vehicles
loitering in this area could represent a serious threat. Loiterers could be individuals
making observations or testing security provisions in preparation for an attack or
individuals actively intending to carry out such an attack. . A set of rules will, therefore,
be implemented enabling the detection of people, vehicles, etc. that remain in this area of
interest for over a specified amount of time. If loitering is detected alerts are generated to
inform security personnel.
innovative approach in which
the capabilities of
ObjectVideo'sTM YEW
application are used to
establish a virtual barrier
effectively securing the
airport's SIDA area.
2)
3)
4)
~. . t
Figure 2: SIDA area at Key West International showing
proposed camera coverage. SIDA area is the rectangular area,
elongated triangular areas indicate fields of view providing almost
complete coverage of the area.
Figure 3: Illustrates placement of
tripwires and levels of associated
alerts.
7
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
5) Detect the presence of bags, packages, or other suspicious objects in the area of interest.
Objects left in the area of interest could constitute a significant threat to the SIDA. Rules
will be implemented, therefore, to detect the insertion of any object into the area of
interest, and to generate an !llert to inform security personnel of the presence of the
suspicious object.
6) Detect the removal of an object from the area of interest. Removal of objects from the
SIDA could indicate theft or attempted theft. The system will detect when/if objects are
removed from the area and will generate an alert for security personnel.
7) Detect any possible tampering or attempted tampering with surveillance cameras. People
wishing or intending to evade the surveillance system set up to protect the SIDA
perimeter may attempt to do so by tampering with the surveillance cameras set up in the
area. Rules will be implemented detecting tampering such as blinding the cameras in
some way (covering cameras, spray painting lenses, etc), turning cameras off target, or
interrupting either power to the cameras or video feed from the cameras. Detection of
any tampering or tampering attempts will generate alerts for security personnel.
2.4.2. Enhance Perimeter Security - Aircraft Quarantine Area
One of the recurring problems experienced at KWI
is the landing of aircraft that have been hijacked or
stolen and flown from Cuba to Key West. When
hijacked or stolen aircraft land at Key West the
aircraft themselves are seized by Federal law
enforcement officials and are quarantined in an area
of the airport to the right of the SIDA area, and
bordered by the airport perimeter fence. The area is
problematic for a number of reasons.
1)
While bordered by the airport perimeter
fence on one side, this area is completely
open on the other sides, with no physical
barrier to prevent incursion into the area.
--...
,. ... "-
/ , ~
, ~
I "I
Aircraft \ ei'
~
Quarantine ....
~
"I
Area ~ ~
~
:\ ~ . <
I = .
, ~ .
, / ~ : ~
"- ,. .
... .
.......--- I =
=
. ~
.
.
.
.
.
.
.
.
.
Figure 4: Aircraft quarantine area,
proposed coverage and tripwire
placement. Cross hatched area
indicates proposed camera coverage.
Solid red lines indicate tripwire
placement.
A significant part of the aircraft quarantine
area bordered by the airport perimeter fence
is placed so that it is out of sight of guards in
a central station, and is not currently covered
by any surveillance cameras. This
- constitutes a significant "blind spot".
The perimeter fence section bordering the aircraft quarantine area faces a heavily wooded
area just outside of that fence. The trees along this section of fence encroach closely on,
and in some areas, overhang the fence. This area could easily constitute cover for people
attempting to get into the quarantine area by going over the fence.
The installation of cameras providing coverage of the SIDA area will also provide coverage of
the aircraft quarantine area. This coverage will allow for the set up of rules in ObjectVideo™
YEW enabling KWI to virtually secure this area. These rules will include those listed below.
1) Designate an area of interest encompassing not only the aircraft quarantine area but much
of the area around it, up to and slightly past the airport perimeter fence. The area of
interest should extend beyond the quarantine are on the three sides that are not bordered
2)
3)
8
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
by the perimeter fence. The area of interest should cover all of the area that lies in the
"blind spot".
2) Establish tripwires surrounding the area, and slightly beyond the fence. Tripwires will be
established to enable the generation of alerts when people or vehicles are detected
approaching or entering the area. Tripwires will be placed just inside the perimeter fence,
and on the three unprotected sides of the area. A trip wire may also be placed on the far
side of the perimeter fence.
3) Classify targets approaching or intruding into the aircraft quarantine area. The system
will not only detect people, vehicles, etc. approaching or crossing into this area, but will
also be able to classify the target and to deliver information on the type of target to
security personnel. Target classifications will include not only target types such as
people, vehicles, aircraft, etc. that represent potential threats and should generate alerts,
but might also include targets such as wildlife that do not represent a threat and which
should not generate alerts.
4) Detect loitering in the area of interest adjacent to the aircraft quarantine area. People or
vehicles loitering in this area could be planning or attempting an incursion into this area.
A set of rules will, therefore, be implemented enabling the detection of people, vehicles,
etc. that remain in this area of interest for over a specified amount of time. If loitering is
detected alerts are generated to inform security personnel.
5) Detect the presence of bags, packages, or other suspicious objects in the area of interest.
Rules will be implemented, therefore, to detect the insertion of any object into the area of
interest, and to generate an alert to inform security personnel of the presence of the
suspicious object.
6) Detect the removal of an object from the area of interest. The system will detect when/if
objects are removed :from the area and will generate an alert for security personnel.
7) Detect any possible tampering or attempted tampering with surveillance cameras. People
wishing or intending to evade the surveillance system set up to protect the aircraft
quarantine area may attempt to do so by tampering with the surveillance cameras set up
in the area. Rules will be implemented detecting tampering such as blinding the cameras
in some way (covering cameras, spray painting lenses, etc), turning cameras off target, or
interrupt~ng either power to the cameras or video feed from the cameras. Detection of
any tampering or tampering attempts will generate alerts for security personnel.
2.4.3. Enhance Perimeter Security - Fuel Depot
The KWI fuel depot lies beyond the terminal buildings and represents an area that
requires protection for obvious reasons. Any attempt at sabotage at this site could cause
serious damage to the airport facilities and could endanger airport staff or passengers.
While the Fuel Depot is protected by a perimeter fence, surveillance of the area should be
enhanced to prevent intruders entering the area by climbing the fence and to prevent
incidents such as those where objects (e.g. explosive devices) are either thrown over the
fence or left just outside the fence.
In order to better secure the fuel depot area two cameras will be installed to cover the area, and will be connected to the ObjectVideo™ YEW system. A set of rules will be
implemented in the YEW system to provide the coverage required for this area. The rules that
will be implemented for this area will include those listed here.
9
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
1)
Designate an area of interest encompassing not only the fuel depot itself but also
including a significant area around the depot's perimeter fence. This will define the area
in which specified actions will trigger alerts for security personnel.
Establish tripwires surrounding in the area slightly beyond the fence. Tripwires will be
established to enable the generation of alerts when people or vehicles are detected in the
areas immediately adjacent to the fence.
Classify targets approaching or intruding into the fuel depot area. The system will not
only detect people, vehicles, etc.
approaching or crossing into this
area, but will also be able to classify
the target and to deliver information
on the type of target to security
personnel. Target classifications
will include not only target types
such as people, vehicles, etc. that
represent potential threats and
should generate alerts.
Classifications will also be
developed for targets such as
wildlife that do not represent a
threat and which will be classified in
such a way as to allow the
development of rules specifying that
those target do not generate alerts.
Detect loitering in the area of
interest around the fuel depot.
People or vehicles loitering in this
area could be planning or attempting
some destructive action. A set of rules will, therefore, be implemented enabling the
detection of people, vehicles, etc. that remain in this area of interest for over a specified
amount of time. If loitering is detected alerts are generated to inform security personnel.
Detect the presence of bags, packages, or other suspicious objects in the area of interest.
Rules will be implemented, therefore, to detect the insertion of any object into the area of
interest. This will include bags that are left in the area or bags, packages, etc. thrown
over the perimeter fence into the fuel depot. Detection of any object left or thrown into
the area will generate an alert to inform security personnel of its presence.
Detect any possible tampering or attempted tampering with surveillance cameras. People
wishing or intending to evade the surveillance system set up to protect the aircraft
quarantine area may attempt to do so by tampering with the surveillance cameras set up
in the area. Rules will be implemented detecting tampering such as blinding the cameras
in some way (covering cameras, spray painting lenses, etc), turning cameras off target, or
interrupting either power to the cameras or video feed from the cameras. Detection of
any tampering or tampering attempts will generate alerts for security personnel.
2)
3)
4)
Figure 5: lllustration showing camera coverage of
Fuel Depot and surrounding area outside depot
perimeter fence. (Cross hatched areas represent
camera fields of view. Solid black lines represent
tripwires.)
5)
6)
10
The Use of Smart Video Surveillanct'
To Provide Enhanced Perimeter Security
At Key West International Airport
2.5. Relation of Proposed Work to Other Work in Progress and Long Term Goals
ObjectVideo™ was founded in 1998 by a team of noted computer vision research scientists from
DARPA and has had, since its foundation, a corporate mission encompassing the two following
objectives:
· To undertake research aimed at advancing the state-of-the-art in the field of computer
ViSion
· To pursue business practices aimed at accomplishing the successful, timely and efficient
transfer of advances achieved in the course of that research from the laboratory to the
video surveillance and video security systems marketplace.
In the release of the ObjectVideo™ YEW product, and its subsequent success in the marketplace,
the company has demonstrated its ability to successfully meet both those objectives.
ObjectVideo™ continues to pursue a policy of aggressively moving technologies from R&D into
features and upgrades to the existing product, and new software offerings. Participation in
programs such as the pilot project proposed here for KWI are essential both as a motivator and a
testbed for technology in the process of commercialization. Technology developed or fine-tuned
under this award is designed to be integrated into either current or future versions of
ObjectVideo™ products and services.
KWI sees a vital connection between work proposed for this pilot project and advanced video
surveillance capabilities resulting from this pilot that will then be available for proliferation to
airports throughout the US, thus enabling a general enhancement in airport security throughout
the country.
2.6. Project Reporting
An established set of project management procedures which include the generation of a
standard set of reports for all projects will be followed for this pilot project. The reports
to be produced under this effort will include the following:
· Monthly Project Status Report - providing information on progress made during
the reporting month, including progress against project milestones and discussion
of any issues, problems, etc encountered during the month
· Monthly Project Financial Report - providing information on money expended on
the project during the previous month, and on funds remaining.
· Final Project Summary Report - A Final Project Summary Report will be
delivered following the conclusion of the project. This report will provide
information on work done, accomplishments and results of the project.
In addition, if circumstances require, ad hoc reports may be generated regarding the
specific circumstances or situations. All reports will be provided by the KWI Principal
Investigator or KWI Project Manager to the TSA Program Manager, or to an appropriate
point of contact designated by the TSA Program Manager.
11
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
3. Principal Investigator
The Principal Investigator for this effort will be Peter Horton.
12
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
4. Bibliography
I.G. Di Battista, P. Eades, R. Tamassia and I.G. Tollis, "Graph Drawing: Algorithms for the
Visualization of Graphs," Prentice-Hall, 1999.
2.A. Del Bimbo, E. Vicario, D. Zingoni, "A Spatial Logic for Symbolic Description of Image
Contents", Journal of Visual Languages and Computing, vol. 5, pp. 267-286, 1994.
3.A. F. Bobick and J. W. Davis. "An Appearance-Based Representation Of Action," ICPR 13,
August 1996
4.E. Boult, R. Micheals, X. Gao, P. Lewis, C. Power, W. Yin and A. Erkan, "Frame-Rate
Omnidirectional Surveillance and Tracking of Camouflaged and Occluded Targets," Proc.
Workshop on Visual Surveillance, Fort Collins, CO, June 1999.
5.M. Brand, N. Oliver, and A. Pentland. "Coupled Hidden Markov Models For Complex Action
Recognition," CVPR, 1997.
6.M. Brand and V. Kettnaker, "Discovery and Segmentation of Activities in Video," IEEE Trans.
Pattern Analysis and Machine Intelligence, vol. 22, no. 8, August 2000.
7.C. Bregler. "Learning and Recognizing Human Dynamics in Video Sequences," CVPR, pp.
568-574, 1997.
8.C. Bregler. "Tracking People With Twists And Exponential Maps," CVPR, 1998.
9.R. Collins, A. Lipton, T. Kanade, H. Fujiyoshi, D. Duggins, Y. Tsin, D. Tolliver, N. Enomoto,
O. Hasegawa, P. Burt, A. Wixson, "A System for Video Surveillance and Monitoring," CMU
Technical Report CMU-RI-TR-00-12, 2000.
10. D. Comaniciu, V. Ramesh, and P. Meer, "Real-Time Tracking of Non-Rigid Objects using
Mean Shift." CVPR, pp. 11-142-149,2000.
11. Davis, J. and Bobick, A. "The Representation And Recognition of Action Using Temporal
Templates," CVPR, pp.928-934. 1997.
12. S. Davies, and A. Moore, "Mix-nets: Factored mixtures of Gaussians in Bayesian networks
with mixed continuous and discrete variables", Sixteenth Conference on Uncertainty in
Artificial Intelligence, 1996.
13. A. Dempster, N. Laird and D. Rubin, "Maximum Likelihood from Incomplete Data via the
EM Algorithm," Journal of the Royal Statistical Society, 39 (Series B):1-38, 1977.
14. P. Duygu1u, N. de Freitas, K. Barnard and D.A. Forsyth, "Object Recognition as Machine
Translation," ECCV, 2002
15. A. Elgammal, D. Harwood and L. Davis, "Non-parametric Model for Background
Subtraction," Proc. IEEE Frame Rate Workshop, 1999.
16. Makris, D.[Dimitrios], Ellis, T.[Tim], "Path detection in video surveillance", IVC(20), No.
12, October 2002, pp. 895-903.
17. N. Friedman and S. Russell, "Image Segmentation in Video Sequences: A Probabilistic
Approach," Uncertainty in Artificial Intelligence, 1997.
18. Y. Gong and X. Liu, "Generating Optimal Video Summaries," Int'l Conf. Multimedia and
Expo, 2000.
19. E. Grimson, C. Sauffer, R. Romano and L. Lee, "Using Adaptive tracking to Classify and
Monitor Activities in a Site," Proc. Computer Vision and Pattern Recognition Conf., pp. 22-29,
1998.
20. N.C. Haering and N. Da Vitoria Lobo, "Visual Event Detection", Kluwer Academic Press,
1997
21. K.M. Hall, "An r-dimensional Quadratic Placement Algorithm," Management Science,
17:212-229, 1970.
22. I. Haritaog1u, D. Harwood and L. Davis, "W4: Real-Time Surveillance of People and Their
Activities," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 8, August
2000.
13
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
23. W.H. Highleyman. "Linear Decision Functions, with Applications to Pattern Recognition,"
Proc. IRE, vol 50, pp. 1501-1514, 1962.
24. S. Hongeng and R. Nevatia. "Multi-Agent Event Recognition," ICCV, 2001.
25. M. Isard and A Blake. "CONpENSATION - conditional density propagation for visual
tracking," IJCV, vol. 29,1, pp. 5-28, 1998.
26. H. Ismai, D. Harwood and L. Davis, "W4: Who? When? Where? What? A Real Time System
for Detecting and Tracking People," 3rd Int'l Conf Automatic Face and Gesture Recognition,
1998.
27. Y. Ivanov and A Bobick, "Recognition of visual activities and interactions by stochastic
parsing", IEEE Transactions of Pattern Analysis and Machine Intelligence, Vol 22(8), August
2000, pp.852-872.
28. N. Johnson and D.C. Hogg, Learning the Distribution of Object Trajectories for Event
Recognition", Image and Vision Computing, 1995.
29. M. Kaufmann and D. Wagner, "Drawing Graphs: Methods and Models," LNCS 2025,
Springer Verlag, 2001.
30. V. Kettnaker and R Zabih, "Bayesian Multi-Camera Surveillance." CVPR, pp. 11-253-259,
1999.
31. B. Li, R Chellappa, Q. Zheng, and S.Z. Der, "Model-based Temporal Object Verification
Using Video." Image Processing 10(6): 897-908,2001.
32. G. Medioni, R Nevatia and I. Cohen. "Event Detection and Analysis from Video Streams,"
DARP A98, pp. 63-72, 1998.
33. D.J. Moore and I.A Essa. "Recognizing Multitasked Activities using Stochastic Context-Free
Grammar." Proc. ofWkshp. on Models versus Exemplars in Computer Vision, CVPR, 2001.
34. D.J. Moore, I.A Essa, and M.H. Hayes III. "Exploiting Human Actions And Object Context
For Recognition Tasks." ICCV, vol. 1, pages 80-86, 1999.
35. M.R Naphade and T.S. Huang, "A Probabilistic Framework for Semantic Indexing and
Retrieval in Video." IEEE Int'l ConfMultimedia and Expo, 2000.
36. S.K. Nayar, R Swaminathan, and 1M Gluckman, "Combined Wide Angle and Narrow Angle
Imaging System and Method for Surveillance and Monitoring." US Patent # 6,215,519, 2001.
37. N. Oliver, B. Rosario, and A Pentland. "Graphical models for recognizing human
interactions," Proc. NIPS, November 1998.
38. Hanna Pasula, Stuart Russell, Michael Ostland, and Ya'acov Ritov, "Tracking many objects
with many sensors." In Proc. IJCAl-99, Stockholm, 1999.
39. P.l Phillips, P. Grother, S. Sarkar, I. Robledo, and K. Bowyer, "Baseline Results for the
Challenge Problem of Human ill Using Gait Analysis." 5th IEEE In1'l Conf. on Automatic Face
and Gesture Recognition, 2002.
40. D.E. Rumelhart, G.E. Hinton, and RJ. Williams. "Learning Internal Representations by
Back-Propagating Errors, " Nature, vol. 323, number 99, pp. 533-536, 1986.
41. lShi and lMalik. "Normalized Cuts and Image Segmentation," CVPR, pages 731--7, June
1997.
42. C. Stauffer and E. Grimson, "Learning Patterns of Activity Using Real-Time Tracking,"
PAMI, 22(8):747-757, 2000.
43. M. Trajkovic. "Intruder Tracking with a Pan-Tilt-Zoom Camera." ACCV, 2002.
44. N. Vaswani, AR Chowdhury, and R. Chellappa, "Activity Recognition Using the Dynamics
of the Configuration ofInteracting Objects." CVPR, 2003.
45. L.E. Wixson, R Mandelbaum, M.W. Hanson, J. Eledath, D. Mishra, "Method and Apparatus
for Fixating a Camera on a Target Using Image Alignment." US Patent 6,396,961, 2002.
46. C. Wren, A Azarbayejani, T. Darrell, and A Pentland. "Pfinder: Real-Rime Tracking Of The
Human Body," Photonics East, SPIE, vol. 2615, 1995.
14
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
47. K. Woods, D. Cook, L. Hall, L. Stark, "Learning Membership Functions in a Function-Based
Object Recognition System", Journal of Artificial Intelligence Research 3, ppI87-222, 1995.
48. Z. Zhang, "A Flexible New Technique for Camera Calibration," PAMI 22(11): pp. 1330-
1344, August 2000.
49. Q. Zhou and lK. Aggarwal, "Tracking and Classifying Moving Objects from Video," Prec.
2nd IEEE Int. Workshop on PETS, Kauai, HI, December 2001.
15
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
5. Appendices
5.1. Facilities and Equipment
ObjectVideo's headquarters office in Reston, Virginia has facilities with a wide range of video
processing and storage equipment as well as state-of-the-art software development facilities for
developing, testing, integrating, and hardening computer vision algorithms. Development will be
done primarily in C++ and C# within a Microsoft environment. Analysis and support tools
include a wide range of in-house and commercial packages for analyzing video content and
rapidly testing algorithm components. We have a wide variety of test data, including 3600 RGB
and IR camera video and the equipment to digitize, store, and convert video from almost any
commonly used format, such as digital-beta, VHS, MPEG-2, MPEG-4, A VI and many others.
Our secure video network and storage system provides several terabytes of on-line digital video
storage. We have digital video capable projection systems and meeting rooms for demonstrating
our results as well as having the video servers and Internet access required to host streaming
video over the Internet as well as private virtual networks.
16
The Use of Smart Video Surveillance
To Provide Enhanced Perimeter Security
At Key West International Airport
5.2. Summary Proposal Budget Form
17