69
Various Security Projects Pre-Proposal Conference

Various Security Projects

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Various Security Projects

Various Security Projects

Pre-Proposal Conference

Page 2: Various Security Projects

Agenda

• Introduction – Scott Rasplicka

• GPA Welcome – Kevin Doyle

• LINC – Page Siplon

• Request for Proposal - Scott Rasplicka

– Scope of Work

– Requirements

– Appendices

Page 3: Various Security Projects

Agenda (cont)

• RFP (cont)

– Commissioning

– Bid Process

– Schedule

– Contracts

• Questions

• Bus Tour – Port Police

• Conclusion – Scott Rasplicka

Page 4: Various Security Projects

Staff Introduction

• Kevin Doyle – GM of Protective Services

• Bill Sutton – Assistant Director of MIS

• Mill Lawson – Port Security Systems Administrator

• Adam Lutz – Manager of Terminal Automations

• Mike Bray – Purchasing Manager

• Cathy Willis - Administrative Manager for Grants

• Capt. Frank Manson – Chief of Port Police

Page 5: Various Security Projects

Staff Introduction (cont)

• Guy Buck – Port Police

• Sgt. David Eller – Port Police

• Artis Morrison – Facility Security MGR, Brunswick

• Maj. Thomas Thompson – Port Police

• Lisa Lansford – Purchasing Coordinator

• Randy Murray – Manager IT

• Randy Hutcheson – Manager, Systems Admin

Page 6: Various Security Projects

• Brad Goodman – City of Savannah Network Manager

• Lewis Leonard – Chatham County ICS Director

• Scott Rasplicka – CEO Home Port Solutions, Consultant to GPA

Page 7: Various Security Projects

Welcome

• Kevin Doyle

– General Manager of Protective Services

– Project Owner

Page 8: Various Security Projects

LINC

• Page Siplon – Executive Director

• Accelerating Growth & Competitiveness

– The Center of Innovation for Logistics is Georgia's leading resource for accelerating logistics growth and competitiveness in the state. Our approach is simple: we bring together a wide range of stakeholders to address logistics issues. We call this our problem holder–problem solver model.

• http://logistics.georgiainnovation.org

Page 9: Various Security Projects

Request for Proposal

• Scope of Work

• Requirements

• Appendices

• Commissioning

• Bid Process

• Schedule

• Contracts

Page 10: Various Security Projects

SOW General Comments

• One System

– Multiple Grants (new subsystems)

– Legacy Systems

• Access Control

• Fence Detection

• Security Cameras

• Operational Cameras

– Multiple Terminals

Page 11: Various Security Projects

General Comments (cont)

• Big Picture

– Where we are now

– Where we will be after these grant projects are implemented

– Where we want to go

• Choosing the Team is as Important as Choosing the Technology

– Who can get us where we want to go?

Page 12: Various Security Projects

General Comments (cont)

• Administratively Difficult– While project should be executed as one project,

administratively these are separate projects

• Reasonable Man Approach– Not a Fortress

• Must Improve Operations – Not Impede!

• KISS – Keep It Simple Stupid

• Projects Presented Here Are Concepts– You are the experts

Page 13: Various Security Projects

Scope of Work

– Savannah River Intrusion Network

– Colonel’s Island Intrusion Network

– Lowlight / Thermal Detection and Response

– TWIC Access System Integration

• Option 1: Access Control System

– Options 3-6

– Option 7: Unsolicited

Page 14: Various Security Projects

Savannah River Intrusion Network

• Visual Coverage of the Savannah River

– Elba Island to Houlihan Bridge

• Four Lines of Demarcation (Gates) – increasing scrutiny

– Houlihan Bridge

– Elba Island

– West of GCT

– East of OT – near Talmadge Bridge

Page 15: Various Security Projects

SRIN (cont)

Page 16: Various Security Projects

SRIN (cont)

• 24 hour coverage

• Semi-automated

– Detection by

• Size

• Speed

• Location

• Other considerations– Length of time in an area

– regular

Page 17: Various Security Projects

SRIN (cont)

• Ad hoc exclusion zones

• Areas of Particular Interest

– Rousakis Square / River Street

– Trade Center / Ferry Docks

– Back side of Elba Island

• Cameras

– Number, type and location determined by bidders

– Mixture of 24 fixed and PTZ in original concept

Page 18: Various Security Projects

SRIN Concept

Page 19: Various Security Projects

SRIN (cont)

• Network

– Near Terminals may tie directly into existing network

– Off Terminal may use wireless, internet or other means

• Some areas may not have power or transmission sources available

– May use existing equipment as available

Page 20: Various Security Projects

SRIN (cont)

• SCMPD Connection to GCT Admin building

– Server room to corner of HWY 25 and Dean Forrest Rd

• Pass data to SCMPD monitoring room and allow control of certain cameras

• Other Connections

– Any terminal may connect at their expense to the SRIN and pass data to GPA/SCMPD

– USCG and other government entities

Page 21: Various Security Projects

SRIN (cont)

• New Monitoring Center

– Designed for 3 people

• Minimum of 1 person on duty at all times in SOC

• 2 people on duty in SOC when needed

• 3rd person is supervisory position to be used in higher MARSEC levels, emergencies or training

– 2nd monitoring station at GCT front desk – full time

– 3rd monitoring station at credentialing center

• Distributed Monitoring and Analytics - shall allow increased coverage without increased labor

Page 22: Various Security Projects

SRIN

• Video / Data Recording

– Data recording devices may be located in the server room

• Must provide heat/power requirements for all equipment

• Redundancy is required to minimize risk of loss

– Distributed Recording may also be used to reduce network congestion

• Redundancy still required

Page 23: Various Security Projects

Scope of Work

– Savannah River Intrusion Network

– Colonel’s Island Intrusion Network

– Lowlight / Thermal Detection and Response

– TWIC Access System Integration

• Option 1: Access Control System

– Options 3-6

– Option 7: Unsolicited

Page 24: Various Security Projects

Colonel’s Island Intrusion Network

• Visual Coverage of the Brunswick River– Docks on Colonel’s Island

– Southern tip of Blythe Island

• Lines of Demarcation (Gates) – East and West of Colonel’s Island

• Ad hoc exclusion zones

• Cameras– Number, type and location determined by bidders

– Mixture of 6 fixed and PTZ in original concept

Page 25: Various Security Projects
Page 26: Various Security Projects

CIIN (cont)

• 24 hour coverage

• Semi-automated

– Detection by

• Size

• Speed

• Location

• Other considerations– Length of time in an area

– regular

Page 27: Various Security Projects

CIIN (cont)

• Network

– Dockside Cameras may tie directly into existing network

– Blythe Island may need wireless data connection and solar power / batteries

• Current Network between GCT and CI / MP is a T-1

• Future Network shall provide up to 600 Mbs

Page 28: Various Security Projects

CIIN (cont)

• Distributed Monitoring and Analytics - shall allow increased coverage without increased labor

– Primary Monitor - GCT’s New Monitoring Center

– Secondary Monitor - Locally in Guard Shack

• Data Recording Most Likely On site

– Must be redundant

Page 29: Various Security Projects

Scope of Work

– Savannah River Intrusion Network

– Colonel’s Island Intrusion Network

– Lowlight / Thermal Detection and Response

– TWIC Access System Integration

• Option 1: Access Control System

– Options 3-6

– Option 7: Unsolicited

Page 30: Various Security Projects

LL / Thermal

• Provide Thermal Detection

– See beyond fence into trees and water

• Mostly fixed cameras in most vulnerable spots (4)

• At least one mobile asset (mounted on patrol car)

• Vehicle-mounted (rugged) laptops (2)

– TWIC readers attached

– Wireless connection

– Ability to receive and display video feeds and control cameras

Page 31: Various Security Projects

LL/Thermal (cont)

• Analytics

• Recorder

• Monitor

– Guard Shack

– Capability to distribute to roving patrols

• Primary Monitor at GCT

• Must provide power and video to camera locations

Page 32: Various Security Projects

Scope of Work

– Savannah River Intrusion Network

– Colonel’s Island Intrusion Network

– Lowlight / Thermal Detection and Response

– TWIC Access System Integration

• Option 1: Access Control System

– Options 3-6

– Option 7: Unsolicited

Page 33: Various Security Projects

TWIC Access System Integration

• Fixed TWIC biometric readers at MP and CI gates

– Integrate into Access Control System

• Build New Pedestal at CI

• TWIC Enrollment Stations

– Two may be fixed

– At least two should be mobile

Page 34: Various Security Projects

TWIC ASI (cont)

• Wireless Access Points

– MP

• Complete coverage of MP including inside the warehouse

– CI

• As much coverage as possible

• Gates and dock areas at a minimum

• May be used to transmit video to network

Page 35: Various Security Projects

TWIC ASI (cont)

• Hand-held TWIC Readers (8)

– Communicate over wireless system

– Read and capture data from TWIC

– Communicate with access control system

• Compare existing data to current read

• Check TWIC TSA Hot List

• Record data from TWIC

Page 36: Various Security Projects

Scope of Work

– Savannah River Intrusion Network

– Colonel’s Island Intrusion Network

– Lowlight / Thermal Detection and Response

– TWIC Access System Integration

• Option 1: Access Control System

– Options 3-6

– Option 7: Unsolicited

Page 37: Various Security Projects

Option 1: Access Control System

• Existing AMAG ACS is Not TWIC Compatible

– AMAG requires an upgrade

– All biometric readers must be replaced

– Visitor Control system is home grown

– Enrollment System is home grown

• System Selection Will Be Made in conjunction with TWIC ASI

– Funding is imminent

Page 38: Various Security Projects

ACS (cont)

• Existing System includes:

– Magal Senstar fence detection system

– Perimeter cameras

• Passes Data to Navis TOS

– Allows mission tickets to be printed at gate if valid ID presented by trucker

– Link Trucker / Passenger to Truck

Page 39: Various Security Projects

Scope of Work

– Savannah River Intrusion Network

– Colonel’s Island Intrusion Network

– Lowlight / Thermal Detection and Response

– TWIC Access System Integration

• Option 1: Access Control System

– Options 3-6

– Option 7: Unsolicited

Page 40: Various Security Projects

Options 4 & 5: SRIN & CIIN

• Concepts and Budgeting were developed two years ago for SRIN and CIIN

– Budget may be inadequate

– Full system design should be developed regardless

• Make recommendation regarding what to buy first

• Options will be used to seek future funding

Page 41: Various Security Projects

Option 3: Command and Control System

• GPA has Multiple Systems in Place

– Magal Senstar Fence Detection

– Perimeter Cameras

– Operational Cameras

– AMAG ACS

– Navis TOS / ATAMS

– Trouble Kiosks

Page 42: Various Security Projects

Option 3 (cont)

• New Systems to be Fielded

– SRIN

– CIIN

– Lowlight / Thermal

– TWIC

– Remote TWIC Monitoring

Page 43: Various Security Projects

Option 3 (cont)

• 1 System

– All systems shall be brought into 1 system for command, control, dispatch, dissemination, analysis, recording

– SRIN, CIIN and LL/Thermal should all be installed as a single system

– Provide a plan to connect existing systems

Page 44: Various Security Projects

Option 3 (cont)

• Command and Control Can Be Deployed in Multiple Ways

– As part of an access control system

– As part of an analytics system

– As a standalone system

• No Funding Available

– Fund through SRIN, CIIN or LL/Thermal

– Make request for future grants

Page 45: Various Security Projects

Option 6: Connect Existing Systems

• Depending on How the Command and Control System is Fielded, Option 6 May Be needed to:

– Provide a plan for connecting existing systems

– Determine funding necessary

– Identify additional equipment or changes that must take place to bring everything into one system

Page 46: Various Security Projects

Scope of Work

– Savannah River Intrusion Network

– Colonel’s Island Intrusion Network

– Lowlight / Thermal Detection and Response

– TWIC Access System Integration

• Option 1: Access Control System

– Options 3-6

– Option 7: Unsolicited

Page 47: Various Security Projects

Option 7: Unsolicited

• This is an opportunity to recommend systems or changes to improve the overall security of the Ports that have not been requested in the RFP

– May be used to obtain future grants

Page 48: Various Security Projects

Request for Proposal

• Scope of Work

• Requirements

• Appendices

• Commissioning

• Bid Process

• Schedule

• Contracts

Page 49: Various Security Projects

Requirements

• 3 Types of Requirements

– Shall – indicates mandatory

– Should – indicates reasonably required

– May – indicates a “nice-to-have”

• No One is Expected to Meet All Requirements

– Must indicate levels guaranteed for each requirement

Page 50: Various Security Projects

Requirements (cont)

• General Requirements

– Improve Security

– Use Automation to reduce/maintain personnel

– Life Cycle Costs estimates

• Initial Cost

• Replacements

• Maintenance

– Reliability – No Single Point Failures

– Grounding – 5 ohms – no chemicals

Page 51: Various Security Projects

Requirements (cont)

• Backup Power

– 1 hour general requirement

– 3 Days if supplied by solar power

– None if tied to a source with generator backup

• OFF THE SHELF – Open Architecture

• Operations and Maintenance Manuals

• Warranties

Page 52: Various Security Projects

Requirements (cont)

• Weather

– All conditions – no exceptions

• Winds – 3 Stages

– Low Winds – operational

– Medium Winds – Not operational but returns automatically when winds die down

– Cat 5 Hurricane – Not operational without assistance

Page 53: Various Security Projects

Requirements (cont)

• Network Latency – Camera Control and Response Times

• Automation – no excuses

– Camera Angles

– Sun Spots

• Recording – 30 Days

• GPA Prefers Oracle Databases but also uses SQL

Page 54: Various Security Projects

Requirements (cont)

• TWIC Biometric Readers– Fast Enrollment

– Fast Reads

– Few Failures – No Exceptions• Greasy Hands

• Cut Fingers

• Poor Ridges

• Command Center– Situational Awareness!!!

Page 55: Various Security Projects

Request for Proposal

• Scope of Work

• Requirements

• Appendices

• Commissioning

• Bid Process

• Schedule

• Contracts

Page 56: Various Security Projects

Appendices

• AMAG Inventory

– AMAG Symmetry S813 – 48

• Biometric + Smartcard

– AMAG Symmetry S635 – 54

• Magnetic Swipe

– Keypad Only - 1

Page 57: Various Security Projects

Appendices

• Appendices are being Re-evaluated– As described in RFP – too sensitive

• Appendix 14: Fiber Loop– Dark fiber is unreliable

• Bidders shall select camera locations

• Bidders shall seek closest network node and price accordingly

• Top proposals shall verify locations and network before final pricing

– Network Nodes will be published

Page 58: Various Security Projects

Appendices (cont)

• Appendix 16: Existing Fence Detection System– No benefit to providing it to bidders

– If you need specific information, submit a formal question in writing

– Will not be published

• Appendix 17: List of Existing Camera Locations– Will not be published

– Bidders shall assume no cameras are present in locations sought with these grants

Page 59: Various Security Projects

Appendix 18: Camera Fields of View

• Too Sensitive – Will Not be Published

– Specific questions can be asked in writing

Page 60: Various Security Projects

Request for Proposal

• Scope of Work

• Requirements

• Appendices

• Commissioning

• Bid Process

• Schedule

• Contracts

Page 61: Various Security Projects

Commissioning

• Provide Draft Test Plan

– What tests at component level?

– What tests at system level?

– How will you accomplish tests – set up scenarios?

Page 62: Various Security Projects

Request for Proposal

• Scope of Work

• Requirements

• Appendices

• Commissioning

• Bid Process

• Schedule

• Contracts

Page 63: Various Security Projects

Bid Process

• Bid Team Will Review Proposals

– Finance Team (40%)

– Technical Team (60%)

• 20 Copies of Technical Proposal with Disks

• 1 Copy of Financial Proposal

• GPA Will Invite 2-5 Teams for Orals

– May be followed by demonstrations or proof of concept

Page 64: Various Security Projects

Proposal

• 10% Bid Bond

• Bid Forms

– Appendices

• Several forms will be turned in with proposal

– Addendums

• Must indicate that proposals take into account addendums

Page 65: Various Security Projects

Request for Proposal

• Scope of Work

• Requirements

• Appendices

• Commissioning

• Bid Process

• Schedule

• Contracts

Page 66: Various Security Projects

Schedule

• Written Questions Due – 24 April

• GPA Responses – 8 May

• Proposals Due – 21 May

• Expect 3 months minimum before evaluations completed

• Letter of Intent

– Contract negotiations

• Start Work – Estimate 1 Nov

Page 67: Various Security Projects

Request for Proposal

• Scope of Work

• Requirements

• Appendices

• Commissioning

• Bid Process

• Schedule

• Contracts

Page 68: Various Security Projects

Contract

• Selected Team will be required to supply a contract

– Acknowledge Forms

• Multiple Contracts – One Per System

• Proposal and RFP will remain a Part of the Contract

– Requirements

– Accepted Levels of Performance

Page 69: Various Security Projects

Questions and Answers

• Questions and Responses will be Published

– Exception: Questions that are sensitive to bidder

– Must be indicated

– May be overruled by GPA