Loading...
04/21/2004 Agreement DANNY L. KOLHAGE CLERK OF THE CIRCUIT COURT DATE: June 8, 2004 TO: Peter Horton, Manager Monroe County Airports ATTN: Bevette Moore Airport Business Administrator Pamela G. Hancoc~ Deputy Clerk lY FROM: At the April 21, 2004, Board of County Commissioner's meeting the Board granted approval and authorized execution of a General Contract between Monroe County and Quality Communications Fire & Security, Inc. (QCFSI), a specifically named contractor, to provide and install Object Recognition & CCTV upgrades at the Key West International Airport, and to waive the competitive bid process outlined in the Monroe County Purchasing Policy. Enclosed is a duplicate original of the above-mentioned for your handling. Should you have any questions please do not hesitate to contact this office. cc: County Administrator wlo document County Attorney Finance File./' GENERAL CONTRACT PROVIDE AND INSTALL OBJECT RECOGNITION & CCTV UPGRADES Project: The Use of Smart Video Surveillance to Provide Enhanced Perimeter Security at Key West International Airport Agreement made on this Date: Arrl 1- 7-( , 2004 between Quality Communications Fire & Security, Inc (QCFSI), of 3700 SW 30th Ave, Ft Lauderdale, Florida 33312 ("Seller"), and County of Monroe board of County Commissioners, DBA Key West International Airport, 3491 S Roosevelt Blvd, Key West, Florida 33040 ("Buyer"). 1. ITEMS PURCHASED. For value received and other consideration, the Seller agrees with the Buyer to provide the Buyer the following products ("Goods") in accordance with the terms and conditions of this Contract: Description Object Video added solution to existing CCTV to provide enhanced security Ouantitv 1 Unit Price Total Price $194,000.00 $194,000.00 Total Price: $194,000.00 2. PRODUCT STANDARDS. Goods shall comply with the Seller's quotation dated October 07, 2003 and incorporated into this Contract by this reference. This quotation is based upon the TSA grant for The Use of Smart Video Surveillance to Provide Enhanced Perimeter Security at Key West International Airport 3. TITLElRISK OF LOSS. Upon Beneficial Use 4. PAYMENT. Payment shall be made to Quality Communications Fire & Security, Inc (QCFSI), 3700 SW 30th Ave, Ft Lauderdale, Florida 33312. Buyer agrees to pay to Seller the sum of $194,000.00 as follows: $110,000 upon delivery of Object Video Servers and Software $32,500.00 upon installation of additional cameras and Object Video hardware & software $51,500.00 upon completion of acceptance testing Payment terms are net 30 days after receipt of invoice. If the Buyer should fail to make any of the payments set out in the above schedule, the Seller at its option may treat the Buyer's failure to pay as a material breach of this Contract, and may terminate this Contract and/or seek legal remedies. The buyer may take a 1 % discount if payment is received within 10 days of invoice PaMt'~ General Contract to Provide and Install Object Video at Key West Airport 5. DELIVERY. Time is of the essence in the performance of this Contract. Delivery of Goods shall be made according to the following schedule: Ouantitv 1 Description Object Video added solution to existing CCTV to provide enhanced security Delivery Date July 1, 2004 Seller is responsible for proper packaging of Goods so the Goods will arrive at the destination WithOutJRa e. Any damage sustained due to improper packaging will be charged to Seller. ~t. .Jmi'~ 1 s is an estimated date based on 90 days delivery and installation time frame from the execution date of the contract, projected as April 1 2004 6. WARRANTIES. Seller warrants to Buyer that the Goods will conform to the applicable drawings and design standards, to meet the TSA Grant proposal submitted by QCFSI & Object Video. Other Limitation of Warranty is included in attached Terms and Conditions 7. INSPECTION. The Buyer, upon receiving possession of Goods, shall have a reasonable opportunity to inspect the Goods to determine if the Goods conform to the conditions of this Contract. If the Buyer, in good faith, determines that all or a portion of the Goods are non- conforming, the Buyer may return the Goods to the Seller at Key West International Airport (EYW)'s costs. The Buyer must provide written notice to the Seller of the reason for rejecting the Goods. The Seller will have 30 days from the return of the Goods to cure any and all defects, or be held in breach. NOTE Attached is a copy of terms and conditions and a copy of the site plan (Attachment A) for camera and Object Video software coverage dated 2/25/04 that are hereby incorporated into this contract. General Contract to Provide and Install Object Video at Key West Airport W~O~ Page 2 8. TERMS AND CONDITONS. Attached The parties have executed this Contract at Key West, the day and year above written. Buyer: County of Monroe BDA Key West International Airport By: .~ Monroe County David P. Rice, Mayor Pro Tern ~ z-'. 2..D01 Date: Seller: Quality Co BY . OflTE By: Date: 3/'2- (0 y f'o..;) -1"\ c:::I :% 0 c:::I (:) ~ r z ~ c.... rr1 :::On~ C C Or'.' Z -r'I "':;'1:. ..... I n' f' Q) 0 on ::0 c: - ;:$. z?'o s. :::0 -1 n I ::It ", ~,...;::I: c; . . )> g .." C> a r- ,.." 0 ::::0 ".. .. '=' General Contract to Provide and Install Object Video at Key West Airport Page 3 Quality Communications Fire & Security, Inc. Terms and Conditions Introduction: For good and valuable consideration. the parties agree that the terms and conditions contained herein are the sole terms and conditions of sale and/or for service and represent the sole and complete Agreement between the parties and supersede all prior oral and/or written representations, understandings, proposals, agreements. and communications regarding the subject matter hereof. The parties agree that no additional terms will be binding upon Quality Communications even if they appear on Purchaser's formal purchase order, acceptance form, or any other of Purchaser's documents unless signed by an authorized representative of Quality Communications. PAYMENT TERMS: If not otherwise specified in the Contract Documents, the following applies: A. General Pavrnent Terms are net thirty (30) days from date of invoice where satisfactory open account credit is established and maintained. Quality Communications reserves the right to revoke or modify Purchaser's credit at its sole discretion. A mobilization payment up to fifty percent (50%) will be invoiced upon acceptance of customer's order. Progress payments to one hundred percent (100%) of order value will be invoiced monthly based upon equipment delivered or stored and work performed. At Quality Communications' sole option, Purchaser shall pay cash in advance, or upon delivery, or as otherwise specified by Quality Communications. In the event that Purchaser defaults on its obligation to pay each invoice when due, then, in addition to all other rights and remedies available to it, Quality Communications shall have the option to withhold any further shipments of materials and/or the provision of services, if any, until Purchaser's account is fully paid. Further, in the event payment is not received according to Terms, Quality Communications may, at its discretion, assess interest at the maximum rate allowed by law or at the rate of 1.5% per month, whichever is less. Purchaser also agrees to pay all costs incurred by Quality Communications in pursuit of payment which is past due including, but not limited to. collection agency commissions and attorneys fees. B. Cancellation: Any cancellation must be made in writing. Recognizing that Quality Communications' damages arising from cancellation will be difficult to estimate or determine, the following charges shall be construed as liquidated damages representing an approximation of the administrative, engineering, and other costs Quality Communications will actually incur in reliance upon this Agreement, and not a penalty: If, prior to shipment, Purchaser cancels this Agreement or any portion thereof, for any reason not attributable to Quality Communications, Purchaser agrees to pay Quality Communications an amount equal to 20% of the price of the products canceled if the cancellation occurs more than 21 days after Quality Communications receives Purchaser's order or Purchaser accepts this Agreement. If Purchaser cancels after shipment, Purchaser agrees to pay the above 20% of the price of the products canceled, return the products already shipped, and to pay Quality Communications an additional amount equal to 20% of the value of the returned products to cover the estimated costs of transportation and restocking. C. Custom Software Pavrnent Terms are as provided in section A. above with the following exceptions. A non-refundable twenty percent (20%) down payment will be invoiced upon acceptance of Purchaser's order. A non-refundable progress payment of forty percent (40%) of order value will be invoiced upon Purchaser's approval of a Custom Software Development Specification. The final forty percent (40%) payment will be invoiced upon delivery by Quality Communications of Custom Software. o Security System I Access Control Svstem Pavrnent Terms are as provided in Section A. above with the following exceptions. A non-refundable 20% down payment is required with Purchaser's order. Progress Payments will be invoiced based upon shipments to Purchaser. Quality Communications Services: Purchaser further agrees that Quality Communications offers various levels of services and that the Purchaser, after reviewing the same, has contracted with Quality Communications to perform only the services described in writing in this Agreement. Quality Communications denies liability for materials, supplies or work provided by other persons. Unless specifically contracted for, Quality Communications denies any supervisory role and this Agreement shall not commit Quality Communications to any supervisory role, including, but not limited to, the placement or routing of any wires or other Product. Security Interest: The Purchaser grants to Quality Communications, and Quality Communications retains, a security interest in all Product, Software, and proceeds thereof shipped pursuant to this Agreement until the Purchaser shall have made full payment for the Product. Such interest is intended to be effective as a purchase money security interest. Purchaser agrees that Quality Communications may file this Agreement as a financing statement. In the event of failure to make payment on the due date in accordance with terms designated, the entire balance shall become due and payable at once. In case of default of payment, and to the extent permitted by law, Quality Communications shall have the right to take possession of the Product or Software immediately, wherever it may be found, and remove it with or without process of law and may retain all money paid hereunder as LIQUIDATED DAMAGES and rental for said product or Software. For the purposes of assisting Quality Communications in perfecting its security interests, in any Quality Communications Product or Software delivered to the Purchaser, Purchaser agrees to inform Quality Communications immediately if any other entity has or may have any security interest. perfected or otherwise, in the Quality Communications Product or Software described on the face of this Agreement and shipped to Purchaser. The Purchaser agrees to pay Quality Communications' costs of collection, including without limitation reasonable attorneys fees and legal expenses, and that the same are secured by the security interest granted herein. The Purchaser shall not sell, prior to payment, (except in the ordinary course of business), mortgage, pledge, or lease said Product or Software without prior written permission of Quality Communications. Limitation of Warranty: Purchaser understands that Quality Communications is not an Insurer. Subject to the limitations below, Quality Communications warrants that the Product (as distinguished from Software) be free from defects in material and workmanship under normal use for a period of one year from the date of first beneficial use of all or any part of the Product or 18 months after Product shipment whichever is earlier, provided, however, that Quality Communications' sole liability, and purchaser's sole remedy, under said warranty, shall be limited to the repair or replacement of any Product, or parts thereof, which Quality Communications determines to be defective at Quality Communications' sole option and subject to the availability of service personnel and parts, as determined by Quality Communications. Quality Communications warrants expendable items including, but not limited to, video and print heads, television camera tubes, video monitor display tubes, and batteries and certain other products in accordance with the applicable manufacturer's warranty. Quality Communications does not warrant devices designed to fail in protecting a system such as, but not limited to, fuses and circuit breakers. Quality Communications warrants that any Quality Communications Software described in this Agreement, as well as that Software contained in or sold as part of any Product described in this Agreement, will substantially conform to its published specifications in effect at the time of delivery and for ninety (90) days after delivery. However, Purchaser agrees and General Contract to Provide and Install Object Video at Key West Airport Terms and Conditions - Page 1 3~ \)1{ ~ Quality Communications Fire & Security,lnc. acknowledges that the Software may have inherent defects because of its complexity. Quality Communications' sole obligation with respect to software, and purchaser's sole remedy, shall be to make available published modifications, designed to correct inherent defects, which become available during the warranty period. THIS WARRANTY DOES NOT APPLY TO ANY PRODUCTS OR SOFTWARE WIllCH HAVE BEEN SUBJECTED TO ABUSE, MISHANDLING, OR IMPROPER USE AS DETERMINED BY QUALITY COMMUNICATIONS AND IS IN LIEU OF ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABll..ITY OR FITNESS FOR A PARTICULAR PURPOSE. Warranty service will be performed at no charge between the hours of 8:00 am to 5:00 PM local time, Monday through Friday exclusive of Quality Communications' holidays. Warranty service requested to be performed at other than during Quality Communications' normal work hours shall be chargeable at Quality Communications' standard overtime rates. All repairs or adjustments that are or may become necessary under the warranty provisions of this agreement shall be performed only by an authorized representative of Quality Communications. Any repairs. adjustments, or interconnections performed by the purchaser or anyone other than an authorized Quality Communications representative shall void all warranties. LIMITATION OF LIABll..ITY: QUALITY COMMUNICATIONS SHALL NOT BE UABLE FOR ANY INDIRECT, INCIDENTAL, ECONOMIC, OR CONSEQUENTIAL LOSS OR DAMAGE TO THE PURCHASER OR USER OF THIS PRODUCT AND/OR SOFTWARE ARISING OUT OF, AMONG OTHER THINGS, THE OPERATION OR FAILURE OF THE PRODUCT AND/OR SOFTWARE TO OPERATE, THIS AGREEMENT, THE INSTALLATION, USE, DESIGN OR FUNCI10N OF ANY QUALITY COMMUNICATIONS PRODUCT AND/OR SOFTWARE. LIMITATION OF REMEDY: It is understood and agreed that since it its impractical and extremely difficult to fix actual damages, if any, or ascertain what, if any, portion of any loss or injury would be proximately caused by the failure of Quality Communications' Product and/or Software to operate, or to operate properly, or Quality Communications to perform any of its obligations or services described herein, UNDER NO CIRCUMSTANCES WILL QUALITY COMMUNICATIONS'S UABILITY FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO THOSE, ARISING IN ANY WAY OUT OF THE INSTALLATION, USE, DESIGN OR FUNCI10N OR FAILURE TO FUNCI10N OF ANY PRODUCT AND SOFTWARE SOLD BY QUALITY COMMUNICATIONS BE IN EXCESS OF THE PURCHASE PRICE PAID FOR THE PRODUCT, SOFTWARE AND/OR SERVICES. THIS SUM SHAll. BE THE PURCHASER'S SOLE, COMPLETE AND EXCLUSIVE REMEDY AND SHAll. BE PAID AND RECEIVED AS LIQUIDATED DAMAGES OR A LIMITATION OF UABILITY AMOUNT AGREED ON BY THE PARTIES AND NOT AS A PENALTY. IN NO CIRCUMSTANCES WILL QUALITY COMMUNICATIONS BE HELD LIABLE FOR ANY CLAIMS, LOSSES, DAMAGES OF INJURIES ARISING FROM OR CAUSED BY, THE PURCHASER'S OR ANY OTHER PARTY'S MATERIAL, EQUIPMENT, ACI10NS, OR OMISSIONS. If Purchaser wishes Quality Communications to increase the amount of the above limitation of liability or liquidated damages amount stated in this Agreement, Purchaser may inquire about obtaining an increase to this amount in exchange for an increased purchase or contract price. Under no circumstances will an increase in the purchase or contract price be construed to mean that Quality Communications is an insurer or that the obligations of obtaining and maintaining insurance are not with the Purchaser. INSURANCE OBLIGATIONS: It is understood and agreed by the Purchaser that Quality Communications is not an insurer and that it is the Purchaser's obligation to obtain and maintain any insurance covering any losses to property or personal injury or any other damage which may occur at the premises where the Quality Communications Product, Software or Services, which form the basis of this Agreement, are delivered, assembled, installed, used, or performed. The Purchaser agrees to list Quality Communications as an additional insured on all such policies and to provide Quality Communications a copy of the Certificate of Insurance upon request. Purchaser further agrees that the Certificate of Insurance shall contain a provision that coverage afforded under the policies will not be canceled or materially altered until at least thirty (30) days after written notice is given to Quality Communications. WAIVER OF SUBROGATION: Purchaser does hereby for itself and all other parties claiming under it release and discharge Quality Communications from and against all hazards covered by Purchaser's insurance, it being expressly agreed and understood that no insurance company, insurer, or any other third party will have any right of subrogation against Quality Communications. LIMITATION OF ACTIONS: The Purchaser hereby agrees that no claim, suit or action of any kind shall be brought against Quality Communications, its agents, employees, and/or officers more than one year after the claim arises, whether known or unknown when the claim arises, provided however, that if there is a claim, suit, or cause of action arising under the Warranty, it must be brought, if at all, within six months of expiration of the Warranty period stated above. This clause is in no way to be interpreted as an extension of the Express Warranty stated in paragraph 4 above. DRA WINGS: All drawings and wire diagrams provided by Quality Communications in connection with this Agreement are protected under United States Copyright Laws and intended solely for the use of the installing contractor as a guide for the fabrication and installation of the system. These drawings and wire diagrams are prepared in accordance with the project plans and specifications available to Quality Communications at the time of the bid and are NOT intended to be System design or approval documents. Quality Communications is not a design professional. Under no circumstances is any clause in this agreement or any actions taken by Quality Communications to be construed in such a way as to impose upon Quality Communications the duties or liabilities of a design professional. CHANGE ORDERS: This Agreement can be modified, amended or altered only by an Agreement in writing, signed by both parties or their duly authorized representatives. General Contract to Provide and Install Object Video at Key West Airport Terms and Conditions - page2 Quality Communications Fire & Security, Inc. SOFTWARE LICENSE AND USE: Software Products provided by Quality Communications are licensed, not sold, to the Customer. Customer has only a non-exclusive, non-transferable license to use the Software ("License"). Quality Communications retains all right, title and interest to the Software. In some cases, Quality Communications may have a right to relicense the Software. "Software" shall mean any part of Software provided by Quality Communications in machine readable fonn indicated on this Agreement or contained in any Quality Communications Product indicated on this Agreement or ordered subsequently, any modified versions and all related documentation. Customer shall use the Software only on the Product and at the Product Site listed herein. Any Software received by Customer at any time is subject to this Agreement. The License tenn begins upon delivery of the Software and continues until the last use of the Software with the Product, unless tenninated. Quality Communications may tenninate this License if Customer: (I) fails to perfonn any obligation under the Agreement; (2) ceases to do business as a going concern; or (3) has its assets assigned or attached by law. Within five (5) days after the License tenninates, Customer shall, at its expense, return the Software to Quality Communications and destroy all copies of the Software, including memory or storage copies. PROTECflON AND NON-DISCLOSURE: Customer shall maintain the Software in strict confidence and shall disclose it only to its employees requiring access. Customer shall implement adequate procedures controlling access to and use of the Software consistent with the protection of Quality Communications' rights. Customer may duplicate Software only for internal use on the Product according to Quality Communications instructions. The Quality Communications legend restricting Software use must appear on any copies of the Software. Customer shall not reverse compile the Software. TITLE: The Software and any relevant Product as described in this Agreement shall remain the personal property of Quality Communications, even if attached to realty or other property. Customer shall not sell, assign, encumber or remove the Product or Software without the prior written consent of Quality Communications. Customer shall perfonn all necessary acts to preserve and protect the right, title and interest of Quality Communications in the Product and Software including but not limited to signing any financing statements or other documents requested by Quality Communications or its agents. Quality Communications may inspect the Product and Software during nonnal business hours and may affix labels or notices of ownership on the Product and Software. FORCE MAJEURE: Quality Communications shall not be liable for any loss or damage of any kind resulting from delay, inability to deliver, or install, or to perfonn any other work under this Agreement on account of fire, flood, labor problems, access to premises, accidents, acts of civil or military authorities, acts of God, or from any other causes beyond Quality Communications' control. TAXES, LICENSES AND PERMITS: The Purchaser is responsible for obtaining all licenses, and pennits and for paying all applicable taxes and fees unless otherwise agreed to in writing. INSTALLATION: The installation of the Goods is included as specifically provided for in this Agreement. DRUG FREE WORKPLACE POLICY: Quality Communications has a written drug free workplace policy available for review by written request. EXPORT COMPLIANCE: All sales hereunder shall at all times be subject to the export control laws and regulations of the Government of the United States. Purchaser agrees that it shall not make any disposition, by way of trans-shipment, re-export, diversion, or otherwise, except as said laws and regulations may expressly provide. Purchaser expressly agrees, to the fullest extent pennitted by law, to indemnify Quality Communications for any and all damage arising from the violation of any export law or regulation with respect to any goods delivered to Purchaser or at Purchaser's direction. Said damages include, but are not limited to, legal fees, court costs, expert fees, and any and all other resulting costs and expenses. EVENTS OF DEFAULT: Purchaser shall be in default of this Agreement upon the occurrence of. but not limited to, any of the following: A. The Purchaser's failure to make due and punctual payment of any payment due pursuant to this Agreement; B. The Purchaser's failure to perfonn any obligation under this Agreement; C. An order, judgment or decree entered, with the approval or consent of Quality Communications, by any court of competent jurisdiction, approving a petition seeking reorganization of the Purchaser or appointing a receiver, trustee, or liquidator (or other officer having power, under applicable law, similar to those of a receiver, trustee, or liquidator) of the Purchaser or of all or a major portion of its assets, and such order, judgment, or decree shall continue unstayed and in effect for any period of sixty (60) consecutive days; D. The Purchaser fails to provide Quality Communications with adequate assurances of due perfonnance under the Agreement, after receiving a written request for same from Quality Communications; E. The Purchaser's financial position materially deteriorates; or F. The Purchaser shall cease to do business as a going concern. GENERAL: Any provision of this Agreement which is prohibited by the law of any state shall, as to such state, be ineffective to the extent of such provision without invalidating the remaining provisions of the Agreement. This Agreement shall be construed under the laws of the State of Florida. General Contract to Provide and Install Object Video at Key West Airport Tenns and Conditions - Page3 o.JAo"- ~ ~dI8:1 '8z'^e~ aUJ1l pa^laJa~ LOBBYING AND CONFLICT OF INTEREST CLAUSE SWORN STATEMENT UNDER ORDINANCE NO. 010-1990 MONROE COUNTY, FLORIDA ETHICS CLAUSE . J ' \' 11 (\"" -- '-h' f~r~ 4 ~CLJf' "'I )hc - . " . . Quo I \..D IlfOuC\ICa _()r\~ warrants that he/it has not employed, retained , or otherwise had act on his/its behalf any fonner County officer or employee in violation of Section 2 of Ordinance No. 10-1990 or any County officer or employee in violation of Section 3 of Ordinance No. 10-1990. For breach or violation of this provision the County may, in its discretion, tenninate this contract without liability and may also, in its discretion, deduct from the contract or purchase price, or otherwise recover, the full amount of any fee, commission, percentage, gift. or consideration paid to t tgnature) ,S;().B;G <I Date: -flu '\ck~ STATE OF COUNTY OF -B..C'\....u,., PERSONALL Y APPEARED BEFORE ME, the undersigned authority, -50\ 'W -\ '1?-tc-I"'-~ '/ who, after first being sworn by me, affixed hislher signature (name of individual signing) in the space provided above on this 2 f:)) day of r\\ ~ 20tl. ."'" Can Breaban ..,;'~~Y!IJ~<;;~_ Commission #DD 174692 ~~'s:C~':.~ Expires: Oct 05, 2004 :.~" . ~. ''ff..: Bonded Thru '"/'j''' 0"", ""..~~,f,~," 6,t1antic Bonding Co.. Inc My commission expires: I [) c:; C)\--( OMB - MCP FORM #4 ~ i Jun 02 04 11:2 a Jerome Fain 305-295-8974 p. 1 PUBLIC ENTITY CRIME STATEMENT "A perSon or affiliate who has been placed on the convicted vendor list following a conviction for public entity crime may not submit a bid on a contratt to provide any goods or services to a public entity, may not submit a bid or a contract with a public entity for the construction or repair of a public puilding or public work, may not submit bids on leases of real propeJ1y to public entity, may not be awarded or perform work as a contradtor, supplier, subcontractor, or consultant under a contract with any public entity, and may not transact business with any public entity in excess , of the tpreshold amount provided in Section 287.017, for CATEGORY TWO for a period of36 months from the date of being placed on the convicted vendor list." t By: Received Time Jun. 2. 11:39AM \ 3; % �I - 10 xm i \ 1 r - - - \ ` a y% s .1 18C USE' OI EdI1RP VIDEO SOEVEIGE4NCR 10 PROVIDF, - Quality ComrraaEnieat1010s I�iHAV(ED PC11,I411l1R SECURITY AT KEY I�RST FIRE&SECURITY r — 8700 S.E.SOTS p6E FL LAUOERILL FLORIDA 33314 2830 ° p 1�TE,Iti 1�T O L IMPORT_ _ _ _ __ OFFICE 954-584 4111 FAX.954 584 7940 1 o FOR TSa CRAVT,QN11TY COhIL9[.RKMOVS FIRE&SECURITY A TAC8)07' onununica~ions ~&i!Ia VOICE I DATA I FIBER SYSTEMS DESIBN .INSTAUATlON. FlNANClNB February 9, 2004 Jerome Fain - Airport Security Director Key West International Airport 3491 S. Roosevelt Blvd. Key West, Florida 33040 Ref: TSA Grant for Pilot Projects Dear Mr. Fain: Thought I would take a moment to summarize our conversations to this point. It was good to hear that the airport is on the county agenda to accept the grant money this month. Of the seven (7) airports to be approved for these grants, Key West is the only one who has not yet accepted the grant and started the project. Obviously, we want to do what we can to help. We are also concerned at the recent suggestion that Key West might "bid" out this project. Quality Communications Fire and Security, Inc. worked closely with Object Video and Key West International Airport to write this grant and push it through the TSA. If you reference the grant proposal, Ouali{y Communications Fire and Security is specifically named as the contractor for this iob. The funds were awarded for this project to be installed by this team. There are many additional reasons, QCFSI and Object Video (OV) must execute this work. QCFSI is currently installing the new base camera system. This base system is tied into the TSA grant system on many levels (hardware and software). QCFSI must be the integrator to tie into this system to maintain the integrity of the base system and to provide any type of warranty. QCFSI and OV designed this entire system specifically to integrate into the existing system and meet specific TSA guidelines for security and testing. We are using six (6) of the cameras in the QCFSI base project for part of the TSA project. QCFSI, as you can see from the attached letter, is the only Florida certified Object Video installer/service in Florida. We are the only ones who can do this. QCFSI and Object Video are specifically mentioned in the grant under "Project Team", and it the project was funded by the TSA with this understanding. 3700 SW 30TH AVE- FT LAUDERDALE, FL, 33312 - PHONE (954) 584.4111 - FAX: (954) 584-7940 .. '.,' L ,\ LIT Y 1 S I'\i EVE R Y T H I '\i (; \X' F L"'" -2- February 9,2004 If you were to bid this job, you would have to hire an engineering 'consultant to "design" a system as well as someone to write specifications and bid documents. Not only are these expenses not covered by your grant ($20,000-$30,000), it would take 6-9 months for this process to occur. You must accept and use this grant by ~ end of the year. This includes the testing phase of the project. Basically, installation needs to be finished by May. In addition, you would violate all confidentiality rules in place by the TSA. This is a need-to-know project and should not be advertised publicly. This is why the grant asked for the project team up front. QCFSI and Object Video were granted clearance to do this project when Key West was chosen for the grant. Our companies were thoroughly researched by the TSA. Jerome, QCFSI feels very strongly that it is in the best interests of Key West International Airport to award this job to our team. As you know, QCFSI did all of the up-front design, engineering, and document preparation and submittal. All of this ($12,000 in billable work) was done at no cost to Key West Airport as we were to recoup our costs as part of this grant. If the grant is accepted by Key West, it is accepted for a specific design, product and team. That was its purpose. Finally, by selecting QCFSI and OV as the grant stated, Key West International airport would minimize its responsibility, as the airport would be using QCFSI's design and team, as approved by the TSA, to execute this project. I am available to talk to your county attorney at any time about this project. It is our hope that, at your county meeting in mid-February, the county would not only accept the grant money from the TSA, but also award the project, in its entirety, to Quality Communications Fire and Security, Inc. as the prime contractor. We would, of course, then subcontract the software portion of the job to Object Video and proceed with installation. Should you have any questions, or require any further information, please do not hesitate to contact me. Sincerely, ft,;-- e ~ Bart C. Savage Account Executive QUALITY COMMUNICATIONS FIRE AND SECURITY; Inc. Cj#) ObjectVideo" 11600 Sunrise Valley Drive, Suite 290 Reston, Virginia 20191 Phone (703)654-9300 Fax (703)654-9399 www.obiectvideo.com February 2, 2004 Jerome Fain Airport Security Director Key West International Airport Key West, Florida Dear Director Fain, In reference to the TSA-FAA Grant Application for using ObjectVideo intelligent video surveillance to enhance the perimeter security of Key West Airport, ObjectVideo indicated a desire to work with Quality Communications, Inc., (QCI). QCI is a preferred partner of ObjectVideo, as it is the only integrator in Florida who is trained and certified to support and install ObjectVideo technology. As such, QCI will be responsible for providing Key West Airport with first tier troubleshooting and maintenance support; as well as helping to install the system. ObjectVideo will, of course, provide factory support from our offices in Reston, Virginia, but QCI is the only company certified to provide customer support for us in Florida. Sincerely, Melchior Baltazar Director, Critical Infrastructure Protection July 16, 2003 To: Nicole Feriozzi WJ Hughes Technical Center Aviation Research Center Office, ACX-50 Atlantic City International Airport, NJ 08405 Proposal For TSA Grant to Airport Authorities for Pilot Projects For Key West International Airport Key West International Airport is pleased to submit the enclosed proposal in response to the TSA Announcement of Funding for Grants (Cooperative Agreements) to Airport Authorities for Pilot Projects, dated June 12,2003. Should you have any questions regarding this proposal or the associated documents, please don't hesitate to contact us. 1 COVER SHEET FOR PROPOSALS 0 TO THE Form Approved: FEDERAL AVIATION ADMINISTRATION O.M.B. No 2120-0559 us. Department 0( ianspor1ollon Federal Aviation Administration FOR CONSIDERATION BY FAA ORGANIZATION UNIT SOLICITATION NUMBER Indicate the most specific unit known i.e. program, division, etc. Announcement for Funding of Grants (Cooperative Dept. of Homeland Security / Transportation Security Agreements) to Airport Authorities for Pilot Projects, June Administration 12.2003 EMPLOYER IDENTIFICATION NUMBER (EIN) or SHOW PREVIOUS GRANT NUMBER IF THIS IS A IS THIS PROPOSAL BEING SUBMITTED TO ANOTHER TAXPAYER IDENTIFICATION NUMBER (TIN) SUPPLEMENT TO AN EXISTING GRANT FEDERAL AGENCY? YES_. NO X . IF YES, LIST 59-6000749 ACRONYMIS) - NAME OF ORGANIZATION TO WHICH AWARD SHOULD BE MADE: INSTITUTION NAME (IF KNOWN) Key West International Airport Not applicable ADDRESS OF ORGANIZATION (INCLUDE ZIP CODE) 3491 South Roosevelt Blvd., Key West, FL 33040 CONGRESSIONAL DISTRICT 20th COUNTY Monroe SUBMITTING ORGANIZATION o ACADEMIC D NON-PROFIT ORG xD FOR-PROFIT o OTHER INSTITUTION ORG BRANCH/CAMPUS/OTHER COMPONENT (Where work is performed. if different from above) TITLE OF PROPOSED PROJECT The Use of Smart Video Surveillance to Provide Enhanced Perimeter Security at Key West International Airport. REQUESTED AMOUNT: PROPOSED DURATION REQUESTED STARTING DATE 12 months 9/1/2003 $195,400.00 PI/PD DEPARTMENT PI/PD PHONE NUMBER PI/PD FAX NUMBER Not applicable r ,.. NAMES (TYPED) SOCIAL SECURITY NO. HIGHEST DEGREE & SIGNATURE YEAR ..----, ---' PI/PD 4,.".{ SeA D'/ /?? I ~/ PQtor HsrteR :JUOJf1L fit;n 2~5..3'- 9~?~ 17 - CO-PI/E:MAIL ADDRESS V f ObiectVideo (see above) I CO-PI/PD CO-PI/PD CO-PI/PD By signing and submitting this proposal, the authorized official of the applicant institution is providing certification regarding federal debt status. debarment and suspension, drug-free workplace. and lobbying activities (If answering "yes" to either. please provide explanation.) YES NO Is the organization delinquent in any Federal debt? .J Is the organization or its principals presently debarred. suspended, proposed for debarment. declared ineligible, or voluntary excluded from covered .J transactions by any Federal department or agency? - - - AUTHORIZED INSTITUTIONAL REPRESENTATIVE ..21'GNAyURE .---/ / DATE I NAME/TITLE (TYPED) Director Jerome Fain Jl /. - ./ /Y 7-/t' -c:;S C" . +-ul'. f'"\~....._~ . .....~~ ..~_~_ 7--'/ I TELEPHONE NUMBER ~ 'J ~ NUpa-ER V' 305-296-8099 ~ 305-2958974 FAA Form 9550-1110.95) Supersedes PrevIous Edition "', The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport Table of Contents 1. Project Summary ......................................................... ......................................... ........... ................. ...2 ~o j ect Description ...................................................;...... ............... ................. ................. ..... ..............3 '-}Y ~~%~:e~.~:.::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::~ 2.3. Objectives............................................................................................................................. ........4 2.4. Pilot Project Work Plan ........ .......................... ............. ...... .................. ........... ...... ... ............. ........6 2.4.1. Secure Virtual Perimeter - SIDA After Hours ........................................................................6 2.4.2. Enhance Perimeter Security - Aircraft Quarantine Area........................................................8 2.4.3. Enhance Perimeter Security - Fuel Depot .............................................................................. 9 2.5. Relation of Proposed Work to Other Work in Progress and Long Term Goals .........................11 2.6. Project Reporting.......... ............................. ......... ................ ..... .... ........ ........... .... ...... .......... ....... .11 3. Principal Investiga to r Biographical Sketch ............................... ............. ....................................... ..12 4. Bibliograp hy .............................................................. ................... ..... ............ ............ ............ ........... ..13 5. Appendices ............... ............................................................................... ................................... ...... ...16 5.1. Facilities and Equipment ...............................................................................................................16 5.2. Summary Proposal Budget Form....................................................................................................17 1 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 1. Project Summary U.S. airports currently face an extremely challenging security environment, with threats ranging from common, opportunistic criminal-activity, through activities by more sophisticated organized criminal elements to terrorist activity. As advances are made in fields, like computer vision, with the potential to improve physical security systems, it is important to make the benefits of those advances, in the form of enhanced security systems or capabilities, available as soon as possible. In order to ensure that promising R&D efforts do translate into gains for airport security, Key West International Airport, in concert with ObjectVideo™, is proposing an innovative pilot project to exploit the advanced features of ObjectVideo'sTM Video Early Warning (hereinafter YEW) product to provide a virtual, secure perimeter for the airport's SIDA area, and to strengthen perimeter security for the aircraft quarantine area and the fuel depot. An aggressive plan is being proposed for the deployment and testing of smart video surveillance capabilities (including automatic target detection, classification and tracking, detection of threats like left bags and loitering in security areas, etc) at Key West International Airport with the goal of enabling the fast and efficient proliferation of the most successful of these capabilities to other airports in the US. 2 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 2. Project Description U.S. airports currently face an extremely challenging security environment, with threats ranging from common, opportunistic criminal activity (e.g. thefts by untrustworthy baggage handlers), through activities by more sophisticated organized criminal elements (e.g. organized drug smuggling efforts) to terrorist activity (e.g. terrorist operatives attempting to bring down airliners with shoulder-held rocket launchers). As advances are made in fields, like computer vision, with the potential to improve physical security systems, it is important to make the benefits of those advances, in the form of enhanced security systems or capabilities, available as soon as possible. In this response to the Department of Homeland Security (hereinafter DHS) / Transportation Security Administration (hereinafter TSA) announcement of funding for grants to airport authorities for pilot projects, the Key West International Airport (hereinafter KWI) is proposing an extensive pilot project to bring smart video surveillance capabilities and advanced computer vision techniques to bear in providing an innovative virtual secure perimeter for KWI's SIDA area, and strengthening perimeter security for other vital areas at the airport. Project Team For this effort, KWI has assembled an outstanding team that includes ObjectVideo™ and Quality Communications Fire & Security of Florida, Inc. (hereinafter QCI). ObjectVideo™, the leading developer of intelligent video surveillance software for physical security applications, was founded in 1998 by a team of former research scientists from the Defense Advanced Research Projects Agency (hereinafter DARPA) whose expertise in an elite area of artificial intelligence known as computer vision provided the nucleus around which the company was formed. In keeping with this foundation, ObjectVideo'sTM corporate mission is to provide a reliable conduit for the efficient movement of computer vision research from the laboratory into commercially successful software products and solutions addressing both the current and future video surveillance needs of customers and potential customers. This corporate mission encompasses three principal objectives: · Research aimed at advancing the state-of-the-art in the field of computer vision · Business practices aimed at accomplishing the successful, timely, and efficient transfer of advances in computer vision from laboratory to commercially viable software and service offerings- · The maintenance of a high level of integrity in all dealings, and at all levels of the company. Headquartered in Reston, Virginia, ObjectVideo™ currently has close to 50 employees, with the majority being involved in product development or the delivery of professional services. ObjectVideo'sTM client list includes both commercial entities such as BP, and government organizations such as the US Department of Energy, the US Customs Service, Andrews Air Force Base, the Office of Naval Research, and the Pentagon Force Protection Agency. ObjectVideoTM was founded on the concept of providing a reliable conduit for the timely, efficient movement of computer vision research from the laboratory into commercially successful software products and solutions and continues to live up to that goal by bringing advanced video surveillance and analysis capabilities to market for its growing customer base. QCI is an experienced integrator and installer specializing in all aspects of low-voltage and telecommunications cabling systems, with demonstrated expertise in handling installations of voice grade cabling, state-of-the-art fiber optics, security systems, and access control systems, among others. Founded in 1990, the company currently has more than 60 technicians and RCDDs on staff, and boasts a management team with over 100 years of combined technical and ~ 3 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport engineering experience. QCI's corporate objectives are to maintain a competitive edge while providing the highest quality of service possible to their growing customer base. Figure 1: Key West International Airport - Overview 2.2. Purpose The purpose of the pilot project proposed here is to exploit the advanced features of ObjectVideo'sTM Video Early Warning (hereinafter YEW) product to investigate the use of secure virtual perimeters and to provide significantly enhanced security for physically bounded perimeters (e.g. perimeters bounded by a perimeter fence) at KWI. A detailed work plan has been developed enabling an aggressive effort to accelerate the move of smart video surveillance technologies currently in product development and/or testing from that environment into use in "real world" situations and, by doing so, to significantly enhance security capabilities available to airports across the US. KWI is confident that the team assembled for this effort can successfully implement the proposed enhancements in a way that will not only demonstrate their value but will also establish a solid basis for their proliferation to other airports throughout the US. KWI is confident that this pilot effort will serve as a solid initial step in enhancing air transportation safety on a national level. 2.3. Objectives The overall goal of the proposed pilot project is the enhancement of physical security at Key West International Airport by establishing a secure virtual perimeter to provide after-hours protection for the airport's SIDA area, and strengthening security along existing physical perimeter fence lines bordering KWI's aircraft quarantine area and the airport's fuel depot. These goals are reflected in the objectives established for this effort. Many of these objectives can be met by making use of features included in the current version ofObjectVideo'sTM YEW software application while others will require the early implementation of features currently scheduled for future versions of the product. ObjectVideo'sTM schedule for implementation and deployment of 4 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport enhancements to the VEW application will be adjusted in order to ensure that all of the objectives listed here are met within the time scheduled for this pilot project. The table below lists the objectives for this area, and provides a brief description for each objective. r .' ." ,.....,. ,.<ii.... ........ .... Objective ..,..i)\CH< .'.' ."'< Set Virtual A line is positioned across the image of an area being observed (e.g. across Tripwires a corridor, along a fenceline) when a person or vehicle moving through the area crosses the point designated by the line, or virtual tripwire, an alert is generated Establish Areas of The image of an area under observation can be sectioned and sections Interest / designated as areas of interest or areas of disinterest. Actions or events Disinterest taking place inside an area of interest will generate alerts. Actions or events occurring inside an area of disinterest will be ignored by the system Detect Loitering The system will detect people and/or vehicles remaining inside an area of interest for longer than a specified amount of time, and will generate an alert. Detect the The system will detect the removal of objects from areas of interest (e.g. Removal or the removal of a painting from its usual place on a gallery or museum Insertion of wall) or the insertion of an object into an area of interest (e.g. an Objects in Areas unattended bag or backpack left in an area where luggage should not be ofInterest unattended) and will generate an alert. Detect Gross The system will detect changes in the image that may indicate tampering Changes with the camera. These might include the camera's have been moved from its original position (pointed away from the area under observation), the camera being covered, the lens being obscured in some other way (e.g. by someone spray-painting the lens), or bright light being shone into the camera to blind it. The system will generate an alert when any of these conditions is detected. - Detect and Track The system will detect people, vehicles, or other objects, or targets, of Objects interest and will be able to track those targets as they move through the area being observed. Count Tracked The system will be able to count objects, or targets, being tracked. Obiects Classify Tracked The system will recognize different classes, or types, of objects, such as Objects people, and vehicles. The system also allows for user defined classes, which can be used to designate objects such as specific types of vehicles allowed within a SIDA area. Objects will be classified by attributes such as size, motion, and color. Perform Multi- The system will be capable of tracking a specific target (e.g. person or Camera Target vehicle) as the target moves through the fields of view of multiple cameras Tracking and and will maintain consistent information on the target's motion or Handoff trajectory. 5 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport Perform The system will stabilize images by compensating for camera motion (e.g. Automatic Image a stationary camera mount being shaken by a strong wind). Stabilization Provide a Map- The user interface display will be based on a map or satellite image of the site (or relevant section of the site) and will display icons indicating Based Gill camera placement and alert status. Alerts generated by the system will be clearlv indicated on the interface display. 2.4. Pilot Project Work Plan The work plan presented in this section has been developed for implementation of the pilot project proposed here for KWI. The project involves the implementation of a secure virtual perimeter for the entire SIDA area at the airport and the significant enhancement of security along existing perimeter fencelines bordering the aircraft quarantine area and the fuel depot. As an initial step in this process, ObjectVideo™ YEW will be installed on a server residing in a centralized location at KWI. The server and installed copy ofVEW will be capable of supporting all camera installations (both existing . and new) required for this effort. Where necessary, infrastructure will be enhanced and fiber optic cable will be laid to provide high speed connections between cameras and server. The pilot project here proposed involves two specific areas of endeavor: 1) The installation of cameras and the development of YEW rules necessary to establish a secure, virtual perimeter around the SIDA area. This perimeter will only be activated after normal airport hours, to protect that area when normal airport operations have shut down for the evening. 2) The installation of cameras and the development of YEW rules necessary to set up smart video surveillance of existing physical perimeter fencelines bordering the aircraft quarantine area, and the airport's fuel depot. Unlike the secure virtual SIDA perimeter, these measures will be active around the clock. Each of these proposed enhancements will involve the physical deployment of equipment such as cameras, camera mounts, illuminators, etc. as well as the implementation of rule sets, designed to deal with the specific security challenges presented by aspect of the project, in the ObjectVideo™ YEW system. Sections 2.4.1., 2.4.2., and 2.4.3. describe the sites or areas involved in this pilot project, the security challenges associated with each of these sites, and the measures proposed to provide the innovative virtual perimeter approach and the significant enhancements to perimeter security. 2.4.1. Secure Virtual Perimeter - SIDA After Hours While operations in the SIDA area at KWI are physically secured by the presence of airport, and specifically SIDA area assigned, personnel during normal airport operating hours, KWI is unusual among international airports in that normal airport operations shut down at a certain time in the evening and remain shut down until the following morning. It is establishing and maintaining security in this SIDA area in the hours during which the airport is shut down that are a serious concern. The installation of a permanent physical banier such as a fence is not compatible with normal airport operations in and around this area therefore there is no easy physical way to ensure that the area is secure during those hours. KWI is, therefore, proposing an 6 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport The SIDA area at KWI IS a long, rectangular area covering the area in front of the terminal as adjacent buildings. The physical enhancements required for the implementation of a virtual perimeter barrier include the installation of six IDN (Day / Night) cameras with overlapping fields of view providing almost complete coverage of the SIDA area. The virtual perimeter itself is established by developing a set of rules in YEW that will enable the system to deal with situations that represent potential threats in this area. I) Designate an area of interest encompassing the SIDA and the some of the area immediately adjacent to it. This establishes the boundaries of the area in which rules (e.g. loitering detection) designated for this area will be applied. Establish tripwires near and at the boundary of the Tripwire 1 _ Medium Level Alert secured area. Tripwires will be established to enable the generation of alerts when people or Tripwire 2 _ High Level Alert vehicles are detected approaching the perimeter. These tripwires will be drawn in at least three places, one outside of the SIDA boundary, one at the SIDA boundary, and one just inside the boundary. An escalating series of alerts will be generated, dependent upon the tripwire crossed, to inform security personnel of the potential seriousm:ss of any incursion threat. Figure 3 provides an example of the placement of these tripwires and the urgency level of the alerts generated at each point. Classify targets approaching or intruding into the SIDA area. The system will not only detect people, vehicles, etc. approaching or crossing into the SIDA area, but will also be able to classify the target and to deliver information on the type of target to security personnel. Target classifications will include not only target types such as people, vehicles, aircraft, etc. that represent potential threats and should generate alerts, but also targets such as wildlife that do not represent a threat and which should not generate alerts. Detect loitering in the area of interest adjacent to the SIDA area. People or vehicles loitering in this area could represent a serious threat. Loiterers could be individuals making observations or testing security provisions in preparation for an attack or individuals actively intending to carry out such an attack. . A set of rules will, therefore, be implemented enabling the detection of people, vehicles, etc. that remain in this area of interest for over a specified amount of time. If loitering is detected alerts are generated to inform security personnel. innovative approach in which the capabilities of ObjectVideo'sTM YEW application are used to establish a virtual barrier effectively securing the airport's SIDA area. 2) 3) 4) ~. . t Figure 2: SIDA area at Key West International showing proposed camera coverage. SIDA area is the rectangular area, elongated triangular areas indicate fields of view providing almost complete coverage of the area. Figure 3: Illustrates placement of tripwires and levels of associated alerts. 7 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 5) Detect the presence of bags, packages, or other suspicious objects in the area of interest. Objects left in the area of interest could constitute a significant threat to the SIDA. Rules will be implemented, therefore, to detect the insertion of any object into the area of interest, and to generate an !llert to inform security personnel of the presence of the suspicious object. 6) Detect the removal of an object from the area of interest. Removal of objects from the SIDA could indicate theft or attempted theft. The system will detect when/if objects are removed from the area and will generate an alert for security personnel. 7) Detect any possible tampering or attempted tampering with surveillance cameras. People wishing or intending to evade the surveillance system set up to protect the SIDA perimeter may attempt to do so by tampering with the surveillance cameras set up in the area. Rules will be implemented detecting tampering such as blinding the cameras in some way (covering cameras, spray painting lenses, etc), turning cameras off target, or interrupting either power to the cameras or video feed from the cameras. Detection of any tampering or tampering attempts will generate alerts for security personnel. 2.4.2. Enhance Perimeter Security - Aircraft Quarantine Area One of the recurring problems experienced at KWI is the landing of aircraft that have been hijacked or stolen and flown from Cuba to Key West. When hijacked or stolen aircraft land at Key West the aircraft themselves are seized by Federal law enforcement officials and are quarantined in an area of the airport to the right of the SIDA area, and bordered by the airport perimeter fence. The area is problematic for a number of reasons. 1) While bordered by the airport perimeter fence on one side, this area is completely open on the other sides, with no physical barrier to prevent incursion into the area. --... ,. ... "- / , ~ , ~ I "I Aircraft \ ei' ~ Quarantine .... ~ "I Area ~ ~ ~ :\ ~ . < I = . , ~ . , / ~ : ~ "- ,. . ... . .......--- I = = . ~ . . . . . . . . . Figure 4: Aircraft quarantine area, proposed coverage and tripwire placement. Cross hatched area indicates proposed camera coverage. Solid red lines indicate tripwire placement. A significant part of the aircraft quarantine area bordered by the airport perimeter fence is placed so that it is out of sight of guards in a central station, and is not currently covered by any surveillance cameras. This - constitutes a significant "blind spot". The perimeter fence section bordering the aircraft quarantine area faces a heavily wooded area just outside of that fence. The trees along this section of fence encroach closely on, and in some areas, overhang the fence. This area could easily constitute cover for people attempting to get into the quarantine area by going over the fence. The installation of cameras providing coverage of the SIDA area will also provide coverage of the aircraft quarantine area. This coverage will allow for the set up of rules in ObjectVideo™ YEW enabling KWI to virtually secure this area. These rules will include those listed below. 1) Designate an area of interest encompassing not only the aircraft quarantine area but much of the area around it, up to and slightly past the airport perimeter fence. The area of interest should extend beyond the quarantine are on the three sides that are not bordered 2) 3) 8 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport by the perimeter fence. The area of interest should cover all of the area that lies in the "blind spot". 2) Establish tripwires surrounding the area, and slightly beyond the fence. Tripwires will be established to enable the generation of alerts when people or vehicles are detected approaching or entering the area. Tripwires will be placed just inside the perimeter fence, and on the three unprotected sides of the area. A trip wire may also be placed on the far side of the perimeter fence. 3) Classify targets approaching or intruding into the aircraft quarantine area. The system will not only detect people, vehicles, etc. approaching or crossing into this area, but will also be able to classify the target and to deliver information on the type of target to security personnel. Target classifications will include not only target types such as people, vehicles, aircraft, etc. that represent potential threats and should generate alerts, but might also include targets such as wildlife that do not represent a threat and which should not generate alerts. 4) Detect loitering in the area of interest adjacent to the aircraft quarantine area. People or vehicles loitering in this area could be planning or attempting an incursion into this area. A set of rules will, therefore, be implemented enabling the detection of people, vehicles, etc. that remain in this area of interest for over a specified amount of time. If loitering is detected alerts are generated to inform security personnel. 5) Detect the presence of bags, packages, or other suspicious objects in the area of interest. Rules will be implemented, therefore, to detect the insertion of any object into the area of interest, and to generate an alert to inform security personnel of the presence of the suspicious object. 6) Detect the removal of an object from the area of interest. The system will detect when/if objects are removed :from the area and will generate an alert for security personnel. 7) Detect any possible tampering or attempted tampering with surveillance cameras. People wishing or intending to evade the surveillance system set up to protect the aircraft quarantine area may attempt to do so by tampering with the surveillance cameras set up in the area. Rules will be implemented detecting tampering such as blinding the cameras in some way (covering cameras, spray painting lenses, etc), turning cameras off target, or interrupt~ng either power to the cameras or video feed from the cameras. Detection of any tampering or tampering attempts will generate alerts for security personnel. 2.4.3. Enhance Perimeter Security - Fuel Depot The KWI fuel depot lies beyond the terminal buildings and represents an area that requires protection for obvious reasons. Any attempt at sabotage at this site could cause serious damage to the airport facilities and could endanger airport staff or passengers. While the Fuel Depot is protected by a perimeter fence, surveillance of the area should be enhanced to prevent intruders entering the area by climbing the fence and to prevent incidents such as those where objects (e.g. explosive devices) are either thrown over the fence or left just outside the fence. In order to better secure the fuel depot area two cameras will be installed to cover the area, and will be connected to the ObjectVideo™ YEW system. A set of rules will be implemented in the YEW system to provide the coverage required for this area. The rules that will be implemented for this area will include those listed here. 9 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 1) Designate an area of interest encompassing not only the fuel depot itself but also including a significant area around the depot's perimeter fence. This will define the area in which specified actions will trigger alerts for security personnel. Establish tripwires surrounding in the area slightly beyond the fence. Tripwires will be established to enable the generation of alerts when people or vehicles are detected in the areas immediately adjacent to the fence. Classify targets approaching or intruding into the fuel depot area. The system will not only detect people, vehicles, etc. approaching or crossing into this area, but will also be able to classify the target and to deliver information on the type of target to security personnel. Target classifications will include not only target types such as people, vehicles, etc. that represent potential threats and should generate alerts. Classifications will also be developed for targets such as wildlife that do not represent a threat and which will be classified in such a way as to allow the development of rules specifying that those target do not generate alerts. Detect loitering in the area of interest around the fuel depot. People or vehicles loitering in this area could be planning or attempting some destructive action. A set of rules will, therefore, be implemented enabling the detection of people, vehicles, etc. that remain in this area of interest for over a specified amount of time. If loitering is detected alerts are generated to inform security personnel. Detect the presence of bags, packages, or other suspicious objects in the area of interest. Rules will be implemented, therefore, to detect the insertion of any object into the area of interest. This will include bags that are left in the area or bags, packages, etc. thrown over the perimeter fence into the fuel depot. Detection of any object left or thrown into the area will generate an alert to inform security personnel of its presence. Detect any possible tampering or attempted tampering with surveillance cameras. People wishing or intending to evade the surveillance system set up to protect the aircraft quarantine area may attempt to do so by tampering with the surveillance cameras set up in the area. Rules will be implemented detecting tampering such as blinding the cameras in some way (covering cameras, spray painting lenses, etc), turning cameras off target, or interrupting either power to the cameras or video feed from the cameras. Detection of any tampering or tampering attempts will generate alerts for security personnel. 2) 3) 4) Figure 5: lllustration showing camera coverage of Fuel Depot and surrounding area outside depot perimeter fence. (Cross hatched areas represent camera fields of view. Solid black lines represent tripwires.) 5) 6) 10 The Use of Smart Video Surveillanct' To Provide Enhanced Perimeter Security At Key West International Airport 2.5. Relation of Proposed Work to Other Work in Progress and Long Term Goals ObjectVideo™ was founded in 1998 by a team of noted computer vision research scientists from DARPA and has had, since its foundation, a corporate mission encompassing the two following objectives: · To undertake research aimed at advancing the state-of-the-art in the field of computer ViSion · To pursue business practices aimed at accomplishing the successful, timely and efficient transfer of advances achieved in the course of that research from the laboratory to the video surveillance and video security systems marketplace. In the release of the ObjectVideo™ YEW product, and its subsequent success in the marketplace, the company has demonstrated its ability to successfully meet both those objectives. ObjectVideo™ continues to pursue a policy of aggressively moving technologies from R&D into features and upgrades to the existing product, and new software offerings. Participation in programs such as the pilot project proposed here for KWI are essential both as a motivator and a testbed for technology in the process of commercialization. Technology developed or fine-tuned under this award is designed to be integrated into either current or future versions of ObjectVideo™ products and services. KWI sees a vital connection between work proposed for this pilot project and advanced video surveillance capabilities resulting from this pilot that will then be available for proliferation to airports throughout the US, thus enabling a general enhancement in airport security throughout the country. 2.6. Project Reporting An established set of project management procedures which include the generation of a standard set of reports for all projects will be followed for this pilot project. The reports to be produced under this effort will include the following: · Monthly Project Status Report - providing information on progress made during the reporting month, including progress against project milestones and discussion of any issues, problems, etc encountered during the month · Monthly Project Financial Report - providing information on money expended on the project during the previous month, and on funds remaining. · Final Project Summary Report - A Final Project Summary Report will be delivered following the conclusion of the project. This report will provide information on work done, accomplishments and results of the project. In addition, if circumstances require, ad hoc reports may be generated regarding the specific circumstances or situations. All reports will be provided by the KWI Principal Investigator or KWI Project Manager to the TSA Program Manager, or to an appropriate point of contact designated by the TSA Program Manager. 11 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 3. Principal Investigator The Principal Investigator for this effort will be Peter Horton. 12 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 4. Bibliography I.G. Di Battista, P. Eades, R. Tamassia and I.G. Tollis, "Graph Drawing: Algorithms for the Visualization of Graphs," Prentice-Hall, 1999. 2.A. Del Bimbo, E. Vicario, D. Zingoni, "A Spatial Logic for Symbolic Description of Image Contents", Journal of Visual Languages and Computing, vol. 5, pp. 267-286, 1994. 3.A. F. Bobick and J. W. Davis. "An Appearance-Based Representation Of Action," ICPR 13, August 1996 4.E. Boult, R. Micheals, X. Gao, P. Lewis, C. Power, W. Yin and A. Erkan, "Frame-Rate Omnidirectional Surveillance and Tracking of Camouflaged and Occluded Targets," Proc. Workshop on Visual Surveillance, Fort Collins, CO, June 1999. 5.M. Brand, N. Oliver, and A. Pentland. "Coupled Hidden Markov Models For Complex Action Recognition," CVPR, 1997. 6.M. Brand and V. Kettnaker, "Discovery and Segmentation of Activities in Video," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 8, August 2000. 7.C. Bregler. "Learning and Recognizing Human Dynamics in Video Sequences," CVPR, pp. 568-574, 1997. 8.C. Bregler. "Tracking People With Twists And Exponential Maps," CVPR, 1998. 9.R. Collins, A. Lipton, T. Kanade, H. Fujiyoshi, D. Duggins, Y. Tsin, D. Tolliver, N. Enomoto, O. Hasegawa, P. Burt, A. Wixson, "A System for Video Surveillance and Monitoring," CMU Technical Report CMU-RI-TR-00-12, 2000. 10. D. Comaniciu, V. Ramesh, and P. Meer, "Real-Time Tracking of Non-Rigid Objects using Mean Shift." CVPR, pp. 11-142-149,2000. 11. Davis, J. and Bobick, A. "The Representation And Recognition of Action Using Temporal Templates," CVPR, pp.928-934. 1997. 12. S. Davies, and A. Moore, "Mix-nets: Factored mixtures of Gaussians in Bayesian networks with mixed continuous and discrete variables", Sixteenth Conference on Uncertainty in Artificial Intelligence, 1996. 13. A. Dempster, N. Laird and D. Rubin, "Maximum Likelihood from Incomplete Data via the EM Algorithm," Journal of the Royal Statistical Society, 39 (Series B):1-38, 1977. 14. P. Duygu1u, N. de Freitas, K. Barnard and D.A. Forsyth, "Object Recognition as Machine Translation," ECCV, 2002 15. A. Elgammal, D. Harwood and L. Davis, "Non-parametric Model for Background Subtraction," Proc. IEEE Frame Rate Workshop, 1999. 16. Makris, D.[Dimitrios], Ellis, T.[Tim], "Path detection in video surveillance", IVC(20), No. 12, October 2002, pp. 895-903. 17. N. Friedman and S. Russell, "Image Segmentation in Video Sequences: A Probabilistic Approach," Uncertainty in Artificial Intelligence, 1997. 18. Y. Gong and X. Liu, "Generating Optimal Video Summaries," Int'l Conf. Multimedia and Expo, 2000. 19. E. Grimson, C. Sauffer, R. Romano and L. Lee, "Using Adaptive tracking to Classify and Monitor Activities in a Site," Proc. Computer Vision and Pattern Recognition Conf., pp. 22-29, 1998. 20. N.C. Haering and N. Da Vitoria Lobo, "Visual Event Detection", Kluwer Academic Press, 1997 21. K.M. Hall, "An r-dimensional Quadratic Placement Algorithm," Management Science, 17:212-229, 1970. 22. I. Haritaog1u, D. Harwood and L. Davis, "W4: Real-Time Surveillance of People and Their Activities," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 22, no. 8, August 2000. 13 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 23. W.H. Highleyman. "Linear Decision Functions, with Applications to Pattern Recognition," Proc. IRE, vol 50, pp. 1501-1514, 1962. 24. S. Hongeng and R. Nevatia. "Multi-Agent Event Recognition," ICCV, 2001. 25. M. Isard and A Blake. "CONpENSATION - conditional density propagation for visual tracking," IJCV, vol. 29,1, pp. 5-28, 1998. 26. H. Ismai, D. Harwood and L. Davis, "W4: Who? When? Where? What? A Real Time System for Detecting and Tracking People," 3rd Int'l Conf Automatic Face and Gesture Recognition, 1998. 27. Y. Ivanov and A Bobick, "Recognition of visual activities and interactions by stochastic parsing", IEEE Transactions of Pattern Analysis and Machine Intelligence, Vol 22(8), August 2000, pp.852-872. 28. N. Johnson and D.C. Hogg, Learning the Distribution of Object Trajectories for Event Recognition", Image and Vision Computing, 1995. 29. M. Kaufmann and D. Wagner, "Drawing Graphs: Methods and Models," LNCS 2025, Springer Verlag, 2001. 30. V. Kettnaker and R Zabih, "Bayesian Multi-Camera Surveillance." CVPR, pp. 11-253-259, 1999. 31. B. Li, R Chellappa, Q. Zheng, and S.Z. Der, "Model-based Temporal Object Verification Using Video." Image Processing 10(6): 897-908,2001. 32. G. Medioni, R Nevatia and I. Cohen. "Event Detection and Analysis from Video Streams," DARP A98, pp. 63-72, 1998. 33. D.J. Moore and I.A Essa. "Recognizing Multitasked Activities using Stochastic Context-Free Grammar." Proc. ofWkshp. on Models versus Exemplars in Computer Vision, CVPR, 2001. 34. D.J. Moore, I.A Essa, and M.H. Hayes III. "Exploiting Human Actions And Object Context For Recognition Tasks." ICCV, vol. 1, pages 80-86, 1999. 35. M.R Naphade and T.S. Huang, "A Probabilistic Framework for Semantic Indexing and Retrieval in Video." IEEE Int'l ConfMultimedia and Expo, 2000. 36. S.K. Nayar, R Swaminathan, and 1M Gluckman, "Combined Wide Angle and Narrow Angle Imaging System and Method for Surveillance and Monitoring." US Patent # 6,215,519, 2001. 37. N. Oliver, B. Rosario, and A Pentland. "Graphical models for recognizing human interactions," Proc. NIPS, November 1998. 38. Hanna Pasula, Stuart Russell, Michael Ostland, and Ya'acov Ritov, "Tracking many objects with many sensors." In Proc. IJCAl-99, Stockholm, 1999. 39. P.l Phillips, P. Grother, S. Sarkar, I. Robledo, and K. Bowyer, "Baseline Results for the Challenge Problem of Human ill Using Gait Analysis." 5th IEEE In1'l Conf. on Automatic Face and Gesture Recognition, 2002. 40. D.E. Rumelhart, G.E. Hinton, and RJ. Williams. "Learning Internal Representations by Back-Propagating Errors, " Nature, vol. 323, number 99, pp. 533-536, 1986. 41. lShi and lMalik. "Normalized Cuts and Image Segmentation," CVPR, pages 731--7, June 1997. 42. C. Stauffer and E. Grimson, "Learning Patterns of Activity Using Real-Time Tracking," PAMI, 22(8):747-757, 2000. 43. M. Trajkovic. "Intruder Tracking with a Pan-Tilt-Zoom Camera." ACCV, 2002. 44. N. Vaswani, AR Chowdhury, and R. Chellappa, "Activity Recognition Using the Dynamics of the Configuration ofInteracting Objects." CVPR, 2003. 45. L.E. Wixson, R Mandelbaum, M.W. Hanson, J. Eledath, D. Mishra, "Method and Apparatus for Fixating a Camera on a Target Using Image Alignment." US Patent 6,396,961, 2002. 46. C. Wren, A Azarbayejani, T. Darrell, and A Pentland. "Pfinder: Real-Rime Tracking Of The Human Body," Photonics East, SPIE, vol. 2615, 1995. 14 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 47. K. Woods, D. Cook, L. Hall, L. Stark, "Learning Membership Functions in a Function-Based Object Recognition System", Journal of Artificial Intelligence Research 3, ppI87-222, 1995. 48. Z. Zhang, "A Flexible New Technique for Camera Calibration," PAMI 22(11): pp. 1330- 1344, August 2000. 49. Q. Zhou and lK. Aggarwal, "Tracking and Classifying Moving Objects from Video," Prec. 2nd IEEE Int. Workshop on PETS, Kauai, HI, December 2001. 15 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 5. Appendices 5.1. Facilities and Equipment ObjectVideo's headquarters office in Reston, Virginia has facilities with a wide range of video processing and storage equipment as well as state-of-the-art software development facilities for developing, testing, integrating, and hardening computer vision algorithms. Development will be done primarily in C++ and C# within a Microsoft environment. Analysis and support tools include a wide range of in-house and commercial packages for analyzing video content and rapidly testing algorithm components. We have a wide variety of test data, including 3600 RGB and IR camera video and the equipment to digitize, store, and convert video from almost any commonly used format, such as digital-beta, VHS, MPEG-2, MPEG-4, A VI and many others. Our secure video network and storage system provides several terabytes of on-line digital video storage. We have digital video capable projection systems and meeting rooms for demonstrating our results as well as having the video servers and Internet access required to host streaming video over the Internet as well as private virtual networks. 16 The Use of Smart Video Surveillance To Provide Enhanced Perimeter Security At Key West International Airport 5.2. Summary Proposal Budget Form 17