


The CARVER Target Analysis and Vulnerability Assessment Methodology:
A Practical Guide for Evaluating Security Vulnerabilities Paperback

Cognizant Security Strategy:Â
A Proven Formula for Enhanced Security Decision-Making Paperback
Luke Bencie’s books can be found at the following locations:




About the author
Luke Bencie has worked in over 120 countries and has trained thousands of domestic and international students from police, military, and intelligence services on topics such as economic and industrial espionage, border security, intellectual property protection, counterfeiting/piracy, and recognizing/discouraging terrorist travel movement.
As the Managing Director of Security Management International (SMI), Mr. Bencie has been a consultant to the US Department of State, US Department of Defense, Fortune 500 companies, as well as foreign governments. He specializes in conducting strategic and security management assessments, performing counterintelligence and due-diligence investigations, and also provides specialized intelligence advisory services. He is the author of "Among Enemies: Counter-Espionage for the Business Traveler" and "Global Security Consulting: How to Build a Thriving International Practice."
Prior to establishing SMI, Mr. Bencie served on the US Department of State’s Foreign Emergency Support Team. In this capacity, he was responsible for responding to terrorist attacks carried out against US targets overseas. As a result, he performed numerous trips to Iraq, Afghanistan, and other "hot spots" throughout the world. In addition, Mr. Bencie was a Senior Security Consultant in the Intelligence and Information Systems, and assigned to the emerging markets of Brazil, India and Lebanon.
Mr. Bencie holds graduate degrees in “National Security Studies” from The George Washington University’s Elliott School of International Affairs and The American Military University, as well as an MBA from the University of Sarasota. He received his BA from Michigan State University and completed further course work from the University of Pennsylvania’s Wharton School, the Federal Bureau of Investigation’s National Training Academy, and the United Nations Institute for Training and Research.
The CARVER Mindset: How to Think Like a Spy

Luke Bencie’s The CARVER Mindset reveals how anyone can use the basics of spycraft to their advantage. Luke takes readers through those basics to help them gain better situational awareness, make quicker and smarter decisions, assess their opponent’s weaknesses, and even gain greater influence over others. In short, The CARVER Mindset can become both behavioral bible and survival guide. As Luke writes in his Introduction, the book can become “your intelligence pyramid for years to come.”
Global Security Consulting: How to Build a Thriving International Practice
With new security threats nearly every week all over the globe, governments and businesses are forced to take extraordinary measures to protect themselves. Likewise, espionage continues at levels comparable to the days of the Cold War—but many more players are now participating. In this environment, a new industry has grown to deal with these challenges: international security consulting. Drawing from military, law-enforcement, and intelligence communities, new private companies are springing up across the world. Global Security Consulting, written by a former intelligence specialist who has built a successful consultancy, provides solid guidance for anyone wishing to enter this glamorous but often dangerous field.

The Clandestine Consultant Resurfaces (The Clandestine Consultant Saga)
He’s back! The secretive man who traverses the globe in alias and is known only as “Paul Ward,” aka "The Tall Man," to the U.S. Intelligence Community, returns for another thrilling assignment. With a penchant for keeping the world’s most corrupt and nefarious leaders in power, the clandestine consultant must deliver humanity’s biggest secret to a ruthless, murderous, shadowy figure who calls herself Lady Eve. From his private retreat in the Italian Alps, Ward’s latest odyssey takes him from the Middle East to Southeast Asia, to the Florida Keys to Washington, DC. In the process he uncovers an even bigger secret, one that threatens to end his life as well as his career.

The Clandestine Consultant
(The Clandestine Consultant Saga Book 3)
The world is a tumultuous place, filled with war, corruption, and an evil desire for politicians, terrorists, and other underworld figures to achieve or maintain power. In the middle of this chaos is a small cadre of international consultants, who profit by brokering illicit business deals, discrediting the competition, and making "headaches" go away. In return for their services, these consultants are compensated millions of dollars, as well as provided with the most seductive perks that any king, sheik, warlord, and dictator can offer. The most successful of these consultants is a man whose real identity is neither known by his clients nor the international law enforcement community. That is until the day he finds himself double-crossed by a competitor, at which point he must cooperate with the US Intelligence Community to avoid spending the rest of his life in a dark hole.

The CARVER Target Analysis and Vulnerability Assessment Methodology: A Practical Guide for Evaluating Security Vulnerabilities

Cognizant Security Strategy: A Proven Formula for Enhanced Security Decision-Making
Cognizant Security Strategy (CSS) is a fresh approach to the antiquated security methods no longer useful to organizations in a post-pandemic world. Security departments have erroneosly functioned in a reactionary - rather than proactive - role for decades. CSS will help you quickly decipher your security posture and provide an actionable framework for how your organization makes decisions about security to determine strategic direction in a dangerous world.

Among Enemies: Counter-Espionage for the Business Traveler
Audiobook – Unabridged
Each business day, some 35,000 executives, scientists, consultants, and lawyers pass through the nation's airports to destinations across the globe. They carry, along with proprietary documents and computer files, the latest in personal electronic gear. However, carefully watching most of those travelers beginning the moment they arrive at the airport and often sooner are an uncounted number of espionage operatives.
These individuals work for foreign intelligence services and economic concerns and seek to separate international business travelers from their trade secrets. To succeed, they use many time-tested techniques to lure unsuspecting travelers into vulnerable or compromising positions. They also employ the latest electronic means to steal business information often at a distance from their prey.
This is the 21st century, after all, and economic and industrial espionage have become multibillion-dollar enterprises, utilizing a wide array of the most sophisticated means to obtain proprietary information. Luke Bencie is a veteran of this struggle. He knows intimately the threats business travelers face and how to combat those threats. In Among Enemies: Counter-Espionage for the Business Traveler, Bencie provides everything you need to know to protect yourself and your company from attempted espionage.
