Scroll to top
Protective Intelligence: Understanding Your Threat Before It Materialises

Security Intelligence

Protective Intelligence: Building a Threat Picture Before You Need It

Protective intelligence is the intelligence function of executive protection. This guide explains what it covers, how threat assessments are built, and when organisations need dedicated protective intelligence capability.

Executive Protection 7 min read 30 Apr 2026

Written by James Whitfield — Senior Security Consultant

Protective intelligence is the intelligence function of executive protection. It answers the question that precedes every security decision: who is the threat, and what are they likely to do?

Without a current, accurate threat picture, security decisions default to generic measures applied without specific intelligence. That approach protects against the average threat, not the actual one. For principals with elevated threat profiles – executives in high-conflict sectors, senior government officials, high-net-worth individuals with contentious legal exposures – a protective intelligence capability is not a luxury supplement to physical security. It is the foundation on which physical security decisions are built.

What protective intelligence covers

Protective intelligence has four primary functions:

Threat identification. Who has the intent to harm, harass, or disrupt the principal? This includes: individuals who have made direct or indirect threats, persons who have exhibited concerning approach behaviour, former employees with a grievance, activist groups targeting the principal’s organisation, and in some contexts, state or state-proximate actors with an interest in the principal.

Threat assessment. For identified threat actors, what is their capability and intent? A determined individual who has made a direct threat and has a history of violence is categorically different from an individual who has made a social media post that includes the principal’s name. Assessment methodology draws on the work of threat assessment professionals including Gavin de Becker & Associates and the Association of Threat Assessment Professionals (ATAP).

Early warning monitoring. Ongoing monitoring of the information environment for indicators of elevated threat: new threatening communications, social media activity from identified persons of concern, dark web monitoring for personal data or explicit targeting, and news monitoring for events that could affect the threat picture.

Intelligence production. Converting raw information into assessed, actionable intelligence that security decision-makers can act on. This includes regular threat assessment updates, specific alerts when indicators change, and briefings to the protection team and, where appropriate, the principal.

Persons of concern: the management framework

Protective intelligence practice draws a critical distinction between persons of concern and threat actors. A person of concern is an individual whose behaviour warrants monitoring but does not yet constitute a confirmed threat. A threat actor has demonstrated intent and some level of capability.

The management framework for persons of concern is a structured process:

  • Record and document all concerning contacts or behaviour (communications, approaches, incidents)
  • Assess the nature and severity of the concern against established criteria
  • Assign a case status (monitor, manage, or refer)
  • Set review intervals based on the assessed risk level
  • Escalate if indicators change (frequency of contact increases, threatening content appears, physical proximity is established)
  • Coordinate with law enforcement if the threshold for legal action is reached

The Fixated Threat Assessment Centre (FTAC), a joint unit of the Metropolitan Police and the National Health Service in the UK, has published research identifying the behavioural indicators most predictive of escalation from communication to physical approach or attack. This research is used by professional protective intelligence practitioners to calibrate their assessment methodology.

Open-source intelligence for protective intelligence

The majority of protective intelligence collection is open-source. OSINT does not require covert methods and operates entirely within legal parameters.

Sources include:

  • Social media monitoring: keyword alerts for the principal’s name, title, and organisation on major platforms. Tools such as Brandwatch and Mention provide automated monitoring at scale, while manual review is required for nuanced interpretation of threatening content.

  • Court records: restraining orders, criminal history, civil litigation involving persons of concern. In the US, PACER provides federal court records. UK County Court judgments and Crown Court records provide similar data.

  • Incident databases: OSAC (Overseas Security Advisory Council) incident reports, ACLED (Armed Conflict Location and Event Data), and private-sector threat intelligence feeds provide context for environmental threat levels.

  • Dark web monitoring: trade in personal data, credential leaks, and in some cases explicit targeting communications. Dark web monitoring requires specialist tools and interpretation.

  • Corporate and property records: UK Companies House, US SEC filings, and property registries provide information about business relationships and addresses that may be relevant to persons of concern.

State actor and intelligence threats

For principals in sectors that attract state intelligence interest – extractive industries, defence, financial services, critical infrastructure, and senior government roles – protective intelligence includes an assessment of state-level threat.

Documented cases of state intelligence services targeting corporate executives include: Chinese MSS operations against executives in industries subject to Chinese industrial policy (energy, semiconductors, aerospace), Russian FSB operations against executives in conflict-adjacent sectors and against journalists, and various state-proximate actors targeting specific high-profile individuals for their public positions or affiliations.

The UK National Cyber Security Centre (NCSC) and the US CISA (Cybersecurity and Infrastructure Security Agency) have both published public guidance on state-directed threats to executives. The protective intelligence response to a state-level threat is different from a grievance-based individual threat: it prioritises digital security, counterintelligence awareness, and close coordination with relevant government agencies.

Protective intelligence must operate within legal constraints that vary by jurisdiction.

In the UK, processing personal data in connection with a protective intelligence programme requires compliance with UK GDPR, including a lawful basis for processing, data minimisation, and retention limits. The Regulation of Investigatory Powers Act (RIPA) governs covert surveillance of UK subjects. Covert human intelligence sources require specific authorisation.

In the US, the Electronic Communications Privacy Act and various state surveillance statutes constrain electronic monitoring. Conducting physical surveillance of US subjects without legal authorisation creates significant liability.

Professional protective intelligence firms understand these constraints and operate within them. An organisation building an in-house protective intelligence capability should obtain legal review of its collection, retention, and processing practices before beginning operations.

For the specific protective intelligence and security posture adjustments required when an executive becomes the focus of public controversy – including fixated individual monitoring, schedule management, and residential security review – see our executive security during controversy guide. For executive protection services that incorporate threat assessment and protective intelligence, see our executive protection page. For understanding the digital component of protective intelligence, see our articles on TSCM and social media OPSEC for executives. For how open source intelligence is used by adversaries to build physical targeting packages – and what individuals can do about it – see our guide to OSINT and personal security for executives. For stalking and workplace harassment as a specific threat category requiring dedicated protective intelligence, see our guide to workplace stalking and harassment security. For the specific protective intelligence considerations that apply to government officials and public figures – fixated individuals, ideological motivation, and state actor threat – see our security for government officials and public figures guide. For hostile reconnaissance as the early-stage threat activity that protective intelligence programmes are specifically designed to detect and disrupt, see our hostile reconnaissance detection guide. For public-facing speakers and keynote presenters – where lone-wolf threat assessment, NFTAC fixated individual methodology, and protective intelligence monitoring of threatening social media activity form a specific application of the broader protective intelligence discipline – see our security for conference speakers and keynote presenters guide.

Summary

Key takeaways

1
1
Protective intelligence is the difference between reactive and proactive security

2
2
Persons of concern require a structured management process

3
3
Protective intelligence is a legal function

FAQ

Frequently Asked Questions

Protective intelligence is the structured collection and analysis of information about threats to a specific person, organisation, or asset. It is the intelligence function of executive protection: identifying who poses a threat, what their capability and intent is, and how that threat might materialise. Protective intelligence draws on open-source research (OSINT), social media monitoring, court records, incident data, and where appropriate, human source reporting. The output is a threat assessment that drives security decisions: protection levels, travel security, physical security measures, and access management. Without a current, accurate threat assessment, security decisions are made against the wrong threat picture.

A threat assessment identifies specific actors or categories of actor who have the intent and capability to harm a specific target. It answers: who wants to harm this person or organisation, and what can they actually do? A risk assessment evaluates the likelihood and impact of adverse events in a given environment or context. Threat assessments are person-specific and actor-focused. Risk assessments can be environmental (a city risk assessment, a venue risk assessment) and do not require the identification of specific threat actors. In executive protection, both are used: the threat assessment identifies who the principal needs to be protected from, and risk assessments determine how to protect them in specific environments.

The main categories are: targeted violence (an individual or group that intends to harm the executive, ranging from a disgruntled former employee to a politically motivated actor); kidnapping and extortion (criminal or terrorist groups that target the executive for financial gain); protest and activism (individuals or groups who intend to disrupt the executive’s public activities rather than harm them physically, but whose actions can escalate or enable other threats); cyberstalking and online harassment (which can precede physical threats and indicates a motivated individual); and state actor interest (intelligence services or state-proximate actors targeting the executive for their information, connections, or the organisation they represent). These categories are not mutually exclusive.

OSINT is the primary collection method for most protective intelligence operations. It covers: social media monitoring for threatening language targeting the principal, court records for restraining orders and criminal history of identified persons of concern, news monitoring for incidents involving the principal’s organisation or sector, dark web monitoring for trade in personal data or explicit threats, and travel and property records where legally accessible. The Berla iVe and PACER court records databases in the US, OSAC incident reports, and UK Companies House records are examples of open sources used in protective intelligence work. OSINT does not require any covert collection and operates entirely within legal parameters.

A dedicated protective intelligence assessment is appropriate when: the principal has received a direct threat or there has been an approach by a person of concern; the organisation is in a high-conflict sector (extractive industries in conflict-adjacent markets, financial services with regulatory disputes, journalism investigating serious crime); the principal has significant public visibility (C-suite at a major public company, senior government official); or a specific event has changed the threat picture (a controversial acquisition, a legal dispute with a determined adversary, a public controversy involving the principal). Ongoing protective intelligence monitoring is appropriate for principals whose threat profile is inherently elevated and does not resolve after a single event.
Get in Touch

Request a Consultation

Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.

Confidential. Your details are never shared with third parties.