Louis T. DeStefano and Associates, Inc.

Specializing in comprehensive security system design and support services for over 45 years.

Louis T. DeStefano, Inc. (LTD) is a full service security design and support company, specializing in the area of intrusion detection, access control and closed circuit television system design and integration. In addition to its president, Louis T. DeStefano, an electrical engineer with over 45 years of security design experience, LTD utilizes a select group of associates with specialized security experience to meet our clients' needs

It is our belief that a comprehensive design process is essential for providing security systems that not only protect the facility's assets and its personnel, but is also operationally and end-user compatible.

The following pages (use the tabs on the left to navigate) provide a brief description of the design process and other program components that we have found to be common to an effective and efficient security program.


Services include:
Servicing a wide range of clients including:


Systematic and thorough surveys of the facility, its operations, and staff are essential to the development of a successful security system design.

A typical survey would evaluate:

Survey data establishes a rational and documented basis to ensure the designed and installed system is able to meet not only the security needs of the facility, but also its operational and staff's security needs.

Vulnerability Analysis

Vulnerability analyses are performed to identify potential vulnerabilities of critical assets to loss by malevolent actions.

Vulnerability analyses help in identifying and defining:

Vulnerability analysis results can be incorporated into a risk management methodology that identifies critical assets, the probability that those assets may be lost during a security event, and the consequences of the loss of those assets.

Using the results of the risk management process, the vulnerabilities can be better quantified and countermeasures can be prioritized based on the probability of the threat occurring and/or the consequence of the potential loss.

System Design

The system design process utilizes the data developed during the survey and vulnerability analysis to establish the design basis document.

The design basis document:

The design process results in a documented design that is based on the facility and threat specific details. The result is a system design that is both efficient and effective.

Bid Preparation

The development of clear and concise bid documents is essential for obtaining accurate and complete bids from potential vendors, installers, and/or integrators.

Bid documentation includes:

With complete and accurate bid documentation, the bidders will be able to make more accurate bids and the potential for costly change orders will be greatly reduced.

Bid Evaluation

Proper bid evaluations require a detailed review and comparison of all aspects of the bidders' proposals.

Bid evaluations take into consideration:

The bid evaluation process must result in not only the selection of the best qualified bid, but must also document the evaluation process and results to ensure that any challenge to the bid evaluation process can be properly addressed.


The implementation phase of any design is essential for ensuring that the installed system is effective and fully operational.

Implementation support includes:

Design implementation support provides a assurance that the system is installed and configured as designed and that any necessary changes were made without negatively affecting the functional and operational aspects of the original design.


Testing can be accomplished at various points throughout the design process. Testing can be used to prove non-standard design or operational requirements; to verify product reliability; to ensure that proposed products have the functionality and operability required in the bid documents; and to verify that the system as installed meets the requirements of the design and the needs of the facility and organization.

Testing programs include:

To ensure the success of the various test programs, test procedures detailing step-by-step actions and expected results should be prepared. Test results should be documented in an orderly manner to facilitate future use of the data.

Plans and Procedures

The development and use of clear and concise security plans and procedures is essential for implementing an effective and efficient security program.

Program plans and procedures typically include:

Plans and procedures ensure that the security program is being properly and consistently implemented. They expedite new hire training and can provide facility personnel with a clear understanding of security system and program requirements.


Louis T. DeStefano, Inc. has provided service and support to a wide range of satisfied domestic and foreign clients.

Our Clients include:

Government Agencies:
National Laboratories:
Commercial Clients:
Power Companies:
Architects, Engineers and Consulting Firms:

Personal Resume

Louis T. DeStefano, Security Consultant


Polytechnic Institute of Brooklyn

B.S. Electrical Engineering

Polytechnic Institute of Brooklyn

M.S. Electrical Engineering



With over 45 years of experience in the security engineering industry, Mr. DeStefano specializes in security consulting services for nuclear facilities (over 52 NRC and DOE sites), airports (e.g., Chicago's O'Hare and Midway Terminals), industrial complexes (e.g., Federal Express' central sorting facility), office buildings (e.g., Boston's Center Plaza complex and the World Trade Center), government facilities (e.g., the Bureau of Engraving and Printing and the U.S. Capitol), military bases (e.g., Vandenberg Air Force Base and Ft. Greely Ballistic Missile Defense Base), rail facilities (e.g., Washington Metropolitan Area Transit Authority Storage and Inspection Yards), and penal institutions (e.g., the Baltimore Central Booking and Intake Facility). These services encompass all phases of security system planning, implementation, and operations. During the planning phase, he has conducted surveys of existing physical security measures: evaluated electronic security equipment, systems and their applications; identified security requirements based on client needs and applicable regulations; and developed security system design concepts and criteria. In this phase, he has also provided input for security, contingency, and emergency plan development. In the implementation phase, he has developed and evaluated security system technical specifications; performed evaluations of bid proposals; interfaced with hardware vendors and reviewed drawing submittals; coordinated engineering and installation; witnessed factory tests; provided on-site supervision of system installation; and developed and performed field acceptance test programs. In this phase, he has also provided technical support during regulatory reviews and inspections, as applicable. During the operations phase, he has prepared implementing procedures for system operations, testing, and maintenance; developed training and qualification programs for the operation and use of system hardware; presented operator and maintenance training classes; and conducted periodic surveys and audits of system performance.


Louis T. DeStefano & Associates, Incorporated

Springfield, PA

Independent Security Consultant

7/81-10/88, 11/93-Present
OGDEN Environmental and Energy Services (formerly ERCE)

Fairfax, VA

Senior Consultant, Manager of Engineering

NUSAC, Incorporated

Reston, VA

Security System Engineer

Bechtel Power Corporation

Gaithersburg, MD

Staff Security Specialist

United States Army

Aberdeen Proving Grounds, MD

Military Police Officer

Syska and Hennessy, Incorporated

New York, NY

Security Consultant



  • National Society of Professional Engineers (NSPE)
  • Virginia Society of Professional Engineers (VSPE)
  • Institute of Electrical and Electronics Engineers (IEEE)
  • Tau Beta Pi
  • Sigma Xi
  • American Society of Industrial Security (ASIS)
  • International Association of Professional Security Consultants (IAPSC)


Who's Who in the East, 18th Edition, 1981

Who's Who in the South and Southwest, 19th Edition, 1982

Member of IEEE Working Group that developed IEEE Standard 692-1986, "IEEE Standard Criteria for Security Systems for Nuclear Power Generating Stations"

Engineer-In-Training: State of New York

"Total System Integration: Beyond Access Control - Closed and Open," Presented at CardTech SecurTech, Washington, D.C., April 30, 1998

"Access System Upgrades from Design To Switchover," Presented at the Security System Integration Conference and Expo, Atlanta, Georgia, February 19, 1998

"Security System Upgrades - Designing the System," Presented at the American Society for Industrial Security Annual Meeting, Nashville, Tennessee, Sept. 12, 1989

"Optimizing a Plant Security System," Presented at the Instrument Society of America Power Industry Division Symposium, Philadelphia, Pennsylvania, May 22, 1978


Department of Defense: SECRET (administratively terminated)

Department of Energy: "Q" (administratively terminated)

Nuclear Regulatory Commission: "L" (administratively terminated)

* Required fields.