
Security Intelligence
Security for Authors, Novelists, and Public Intellectuals
Authors with controversial published views face credible death threats, literary festival exposure, and coordinated online harassment. James Whitfield covers the security requirements for public intellectuals.
Written by James Whitfield — Senior Security Consultant
The intersection of public expression and personal security is nowhere more starkly illustrated than in the experience of authors, novelists, essayists, and public intellectuals who have provoked sustained hostility through their published work. The Salman Rushdie case – a death sentence pronounced in 1989 and a near-fatal stabbing 33 years later in August 2022 at the Chautauqua Institution in upstate New York – stands as the most visible example of a pattern that is considerably more common at lower levels of severity.
James Whitfield, Senior Security Consultant, works with authors, their publishers, and their literary agents on security programmes proportionate to the specific threat they face. His consistent observation is that authors underestimate the duration and intensity of threats that religious, political, or social provocation can generate, and that publishers and literary agents often have no framework at all for managing the security implications of their authors’ public engagements.
The specific threat profile of the published author
Authors who publish work that provokes strong reaction in identifiable communities face a threat that has several features distinguishing it from the profiles of politicians, executives, or entertainers.
Duration. A book is a permanent, fixed text that can be encountered by new readers indefinitely. The threat generated by a controversial work does not have a natural expiry – it is renewed each time a new reader encounters the text and responds with hostility. The timeline from publication to physical attack in the Rushdie case was 33 years. Very few other threat types have this long-latency characteristic.
Perceived intimacy. Readers develop a relationship with an author’s text that feels personal. This is the quality that makes literature powerful, and it is also the quality that makes a hostile reader’s reaction more intense. The author is not an abstract organisation or policy position; they are a voice, a perspective, a perceived individual. A fixated or hostile reader may feel a personal relationship with the author that the author is entirely unaware of.
Community-based threat. For authors who provoke religious, political, or ideological opposition, the threat may be community-based rather than individual: an organised group of readers who regard the author as an enemy of their community and who may collectively create conditions for violence rather than acting alone. This is structurally different from the lone fixated individual who is the primary model in most threat assessment frameworks.
PEN International’s Rapid Response Network tracks documented cases of threats, attacks, and prosecutions against writers globally. Their annual reports – the 2024 report documents cases in over 70 countries – show that the threat to writers is neither rare nor geographically limited to authoritarian regimes. UK and US-based authors with controversial works have received credible threats documented in criminal proceedings.
Online harassment and escalation
The online harassment of authors – coordinated pile-ons, sustained threatening messages, doxing of home addresses, and sustained social media campaigns – has become the primary method by which hostile communities target authors in democratic jurisdictions.
The Online Safety Act 2023 imposes obligations on Category 1 platforms to address content that amounts to harassment or threatening communications. Major platforms have trust-and-safety teams that respond to formal complaints, and a complaint submitted with publisher or literary agent involvement carries more weight than an individual author complaint alone. Documenting and reporting threats via platform reporting tools, police (the Communications Act 2003 s.127 and the Malicious Communications Act 1988 both cover threatening electronic messages), and the National Cyber Security Centre’s Cyber Aware guidance for high-profile individuals are the primary legal channels.
For threats with an extremist or organised ideological character – threats connected to religious, political, or ethnic hostility – Counter Terrorism Policing (CTP) and the National Domestic Extremism Unit (NDEU) are the appropriate reporting routes in addition to local police. The NCSC’s Cyber Aware guidance for public figures (formerly Personal Internet Protection) covers the technical steps for hardening the digital profile against targeted harassment.
The NFTAC (National Fixated Threat Assessment Centre) framework is relevant for individual fixated readers: the pathway from obsessive engagement through direct contact, escalating communications, and potential physical approach is the same for authors as for other public figures. Escalating communications should be documented and reported rather than ignored.
Literary festivals and public events
Literary festivals present a specific challenge because they are designed as open, accessible public events. The Hay Festival attracted approximately 250,000 visitors over 10 days in 2024. The Edinburgh International Book Festival sells tickets that provide access to a wide variety of events across a multi-venue site in Charlotte Square Gardens. Cheltenham Literature Festival uses a mix of indoor and outdoor venues across the town centre.
For an author with a specific threat profile, the literary festival environment requires close coordination with the festival’s own security management team. The festival director or security lead should be briefed on the threat context – not the full intelligence picture, but enough to understand why the author’s movements require specific management. The author’s schedule of events, signing sessions, media commitments, and backstage access should be agreed in advance, not improvised on the day.
The specific vulnerabilities at literary festivals are: the author queue for signings (which creates a very slow, close-contact, unscreened interaction with a large number of members of the public over an extended period); the transit between venues across a large open site or town centre; and the festival social environment (author dinners, evening events) where the security team’s presence may be reduced.
For the counter-surveillance and threat monitoring methodology that underpins protection planning for authors at public events, the framework in our security for think tanks and policy research organisations guide – covering state-sponsored targeting of individuals associated with controversial output – is directly relevant. For the digital profile management, address suppression, and online harassment response that form the personal security baseline for authors, see our executive digital footprint management guide.
Sources:
PEN International: Annual Cases Report 2024. Cases of threats and attacks against writers globally. PEN America: Online Harassment Field Manual. 2024. National Fixated Threat Assessment Centre (NFTAC): Annual Report 2024. HMSO. NCSC: Cyber Aware – Guidance for High-Profile Individuals. 2024. Online Safety Act 2023. HMSO. Communications Act 2003, s.127. HMSO. Malicious Communications Act 1988. HMSO. Protection from Harassment Act 1997. HMSO. Counter Terrorism Policing: National Domestic Extremism Unit – Reporting Guidance. 2024. OSAC: Literary and Cultural Event Security Advisory. 2024. Control Risks: Public Figure Threat Assessment Framework. 2024.
James Whitfield is a Senior Security Consultant with experience in public figure protection, threat assessment and management, and security for individuals in the creative and intellectual community.
Key takeaways
The author's threat may be long-duration and community-based, not individual
Unlike threats arising from a specific incident or controversy, threats to authors can be sustained by organised communities of hostile readers over years. Religious, political, and social provocation can generate ongoing threat from groups whose ideology identifies the author as an enemy. Security planning should account for a threat that may not diminish after the initial publication controversy passes.
Literary festivals are open public events requiring specific planning
Major literary festivals attract very large crowds with minimal access control. An author with a specific threat profile requires close coordination with festival security management, a defined schedule of movements between venues, and protection cover between public appearances -- not simply a backstage room with staff.
Threatening communications should be reported immediately and documented fully
A single specific death threat, whether delivered by message, email, letter, or social media, should be reported to the police on receipt and documented in full -- including screenshots, headers, and any available sender information. Late reporting loses evidence and delays the police's ability to identify a sender. The author's publisher and literary agent should be informed and kept in the loop on all serious threats.
Address suppression is a standard precaution for authors with a threat profile
Home addresses are discoverable from multiple sources for most authors. Electoral register open listing, historical press profiles, company filings, and grant acknowledgements all create disclosure vectors. A systematic OSINT audit identifying what is publicly available, followed by suppression where mechanisms exist, is a practical and non-disruptive security measure that reduces the information available to a motivated searcher.
University and lecture tour engagements require advance site work
Open campus environments with publicly promoted lecture schedules create predictable, accessible locations for anyone with hostile intent. An advance visit to the venue, coordination with campus security, and a defined extraction plan after the engagement are minimum requirements for an author with a credible threat profile.
Frequently Asked Questions
Request a Consultation
Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.
Your enquiry has been received. A security consultant will contact you within 24 hours to discuss your requirements.
