The CARVER Mindset:

How to Think Like a Spy

Learn More
Global Security Consulting:

How to Build a Thriving International Practice 

Learn More
The Clandestine Consultant Resurfaces

(The Clandestine Consultant Saga)

Learn More
The Clandestine Consultant

(The Clandestine Consultant Saga Book 3)

Learn More
The CARVER Target Analysis and Vulnerability Assessment Methodology:

A Practical Guide for Evaluating Security Vulnerabilities Paperback

Learn More
Cognizant Security Strategy: 

A Proven Formula for Enhanced Security Decision-Making Paperback

Learn More
Among Enemies: Counter-Espionage for the Business Traveler

Paperback and Audio

Learn More
Luke Bencie’s books can be found at the following locations:

About the author

Luke Bencie has worked in over 120 countries and has trained thousands of domestic and international students from police, military, and intelligence services on topics such as economic and industrial espionage, border security, intellectual property protection, counterfeiting/piracy, and recognizing/discouraging terrorist travel movement.

As the Managing Director of Security Management International (SMI), Mr. Bencie has been a consultant to the US Department of State, US Department of Defense, Fortune 500 companies, as well as foreign governments. He specializes in conducting strategic and security management assessments, performing counterintelligence and due-diligence investigations, and also provides specialized intelligence advisory services. He is the author of "Among Enemies: Counter-Espionage for the Business Traveler" and "Global Security Consulting: How to Build a Thriving International Practice."

Prior to establishing SMI, Mr. Bencie served on the US Department of State’s Foreign Emergency Support Team. In this capacity, he was responsible for responding to terrorist attacks carried out against US targets overseas. As a result, he performed numerous trips to Iraq, Afghanistan, and other "hot spots" throughout the world. In addition, Mr. Bencie was a Senior Security Consultant in the Intelligence and Information Systems, and assigned to the emerging markets of Brazil, India and Lebanon.

Mr. Bencie holds graduate degrees in “National Security Studies” from The George Washington University’s Elliott School of International Affairs and The American Military University, as well as an MBA from the University of Sarasota. He received his BA from Michigan State University and completed further course work from the University of Pennsylvania’s Wharton School, the Federal Bureau of Investigation’s National Training Academy, and the United Nations Institute for Training and Research.

The CARVER Mindset: How to Think Like a Spy

In the world of intelligence, the word “spy” is rarely used as a noun. In fact, it’s rarely used at all. The correct term for a field operative is “case officer,” while his/her source (who typically commits treason against their host nation) is referred to as an “asset” or “agent.” Among the public at large, the practice of gathering intelligence – spying – is even less understood. But beyond the murky world of intelligence and espionage, there are special techniques (known as “tradecraft”) used by these professionals that can provide great value to ordinary people. One of the most unique of these tactics is a little-known acronym called CARVER.

Luke Bencie’s The CARVER Mindset reveals how anyone can use the basics of spycraft to their advantage. Luke takes readers through those basics to help them gain better situational awareness, make quicker and smarter decisions, assess their opponent’s weaknesses, and even gain greater influence over others. In short, The CARVER Mindset can become both behavioral bible and survival guide. As Luke writes in his Introduction, the book can become “your intelligence pyramid for years to come.”

GRAB IT HERE

Global Security Consulting: How to Build a Thriving International Practice

With new security threats nearly every week all over the globe, governments and businesses are forced to take extraordinary measures to protect themselves. Likewise, espionage continues at levels comparable to the days of the Cold War—but many more players are now participating. In this environment, a new industry has grown to deal with these challenges: international security consulting. Drawing from military, law-enforcement, and intelligence communities, new private companies are springing up across the world. Global Security Consulting, written by a former intelligence specialist who has built a successful consultancy, provides solid guidance for anyone wishing to enter this glamorous but often dangerous field.

GRAB IT HERE

The Clandestine Consultant Resurfaces (The Clandestine Consultant Saga)

He’s back! The secretive man who traverses the globe in alias and is known only as “Paul Ward,” aka "The Tall Man," to the U.S. Intelligence Community, returns for another thrilling assignment. With a penchant for keeping the world’s most corrupt and nefarious leaders in power, the clandestine consultant must deliver humanity’s biggest secret to a ruthless, murderous, shadowy figure who calls herself Lady Eve. From his private retreat in the Italian Alps, Ward’s latest odyssey takes him from the Middle East to Southeast Asia, to the Florida Keys to Washington, DC. In the process he uncovers an even bigger secret, one that threatens to end his life as well as his career.

GRAB IT HERE

The Clandestine Consultant

(The Clandestine Consultant Saga Book 3)

The world is a tumultuous place, filled with war, corruption, and an evil desire for politicians, terrorists, and other underworld figures to achieve or maintain power. In the middle of this chaos is a small cadre of international consultants, who profit by brokering illicit business deals, discrediting the competition, and making "headaches" go away. In return for their services, these consultants are compensated millions of dollars, as well as provided with the most seductive perks that any king, sheik, warlord, and dictator can offer. The most successful of these consultants is a man whose real identity is neither known by his clients nor the international law enforcement community. That is until the day he finds himself double-crossed by a competitor, at which point he must cooperate with the US Intelligence Community to avoid spending the rest of his life in a dark hole.

GRAB THE PAPERBACK/HARDCOVER
GRAB AUDIBLE AUDIOBOOK

The CARVER Target Analysis and Vulnerability Assessment Methodology: A Practical Guide for Evaluating Security Vulnerabilities

The CARVER Target Analysis and Vulnerability Assessment Methodology is a system that uses specific procedures, both qualitative and quantitative in nature, to interpret and determine the Probability of Attack from an adversary againstcritical assets and/or key resources. Originally developed by the Office of Strategic Services, the precursor to the Central Intelligence Agency, during World War II, CARVER was an offensive targeting tool used to determine where bomber pilots should most effectively drop their munitions on enemy targets.In 1976, CIA Officer Leo Labaj and his team of sabotage experts in the Special Activities Branch, were tasked to develop a methodology that could identify vulnerabilities in an infrastructure system, for both offensive and defensive purposes. This process became known as the Defense Against Terrorism Survey. Using a scoring system based on the likelihood vs. impact ofan attack, the modern-day CARVER matrix was born..

GRAB IT HERE

Cognizant Security Strategy: A Proven Formula for Enhanced Security Decision-Making

Cognizant Security Strategy (CSS) is a fresh approach to the antiquated security methods no longer useful to organizations in a post-pandemic world. Security departments have erroneosly functioned in a reactionary - rather than proactive - role for decades. CSS will help you quickly decipher your security posture and provide an actionable framework for how your organization makes decisions about security to determine strategic direction in a dangerous world.

GRAB IT HERE

Among Enemies: Counter-Espionage for the Business Traveler

Audiobook – Unabridged

Each business day, some 35,000 executives, scientists, consultants, and lawyers pass through the nation's airports to destinations across the globe. They carry, along with proprietary documents and computer files, the latest in personal electronic gear. However, carefully watching most of those travelers beginning the moment they arrive at the airport and often sooner are an uncounted number of espionage operatives.

These individuals work for foreign intelligence services and economic concerns and seek to separate international business travelers from their trade secrets. To succeed, they use many time-tested techniques to lure unsuspecting travelers into vulnerable or compromising positions. They also employ the latest electronic means to steal business information often at a distance from their prey.

This is the 21st century, after all, and economic and industrial espionage have become multibillion-dollar enterprises, utilizing a wide array of the most sophisticated means to obtain proprietary information. Luke Bencie is a veteran of this struggle. He knows intimately the threats business travelers face and how to combat those threats. In Among Enemies: Counter-Espionage for the Business Traveler, Bencie provides everything you need to know to protect yourself and your company from attempted espionage.

GRAB THE PAPERBACK/HARDCOVER
GRAB THE AUDIBLE AUDIOBOOK HERE