Scroll to top
Security for Authors, Novelists, and Public Intellectuals

Security Intelligence

Security for Authors, Novelists, and Public Intellectuals

Authors with controversial published views face credible death threats, literary festival exposure, and coordinated online harassment. James Whitfield covers the security requirements for public intellectuals.

8 min 7 May 2026

Written by James Whitfield — Senior Security Consultant

The intersection of public expression and personal security is nowhere more starkly illustrated than in the experience of authors, novelists, essayists, and public intellectuals who have provoked sustained hostility through their published work. The Salman Rushdie case – a death sentence pronounced in 1989 and a near-fatal stabbing 33 years later in August 2022 at the Chautauqua Institution in upstate New York – stands as the most visible example of a pattern that is considerably more common at lower levels of severity.

James Whitfield, Senior Security Consultant, works with authors, their publishers, and their literary agents on security programmes proportionate to the specific threat they face. His consistent observation is that authors underestimate the duration and intensity of threats that religious, political, or social provocation can generate, and that publishers and literary agents often have no framework at all for managing the security implications of their authors’ public engagements.

The specific threat profile of the published author

Authors who publish work that provokes strong reaction in identifiable communities face a threat that has several features distinguishing it from the profiles of politicians, executives, or entertainers.

Duration. A book is a permanent, fixed text that can be encountered by new readers indefinitely. The threat generated by a controversial work does not have a natural expiry – it is renewed each time a new reader encounters the text and responds with hostility. The timeline from publication to physical attack in the Rushdie case was 33 years. Very few other threat types have this long-latency characteristic.

Perceived intimacy. Readers develop a relationship with an author’s text that feels personal. This is the quality that makes literature powerful, and it is also the quality that makes a hostile reader’s reaction more intense. The author is not an abstract organisation or policy position; they are a voice, a perspective, a perceived individual. A fixated or hostile reader may feel a personal relationship with the author that the author is entirely unaware of.

Community-based threat. For authors who provoke religious, political, or ideological opposition, the threat may be community-based rather than individual: an organised group of readers who regard the author as an enemy of their community and who may collectively create conditions for violence rather than acting alone. This is structurally different from the lone fixated individual who is the primary model in most threat assessment frameworks.

PEN International’s Rapid Response Network tracks documented cases of threats, attacks, and prosecutions against writers globally. Their annual reports – the 2024 report documents cases in over 70 countries – show that the threat to writers is neither rare nor geographically limited to authoritarian regimes. UK and US-based authors with controversial works have received credible threats documented in criminal proceedings.

Online harassment and escalation

The online harassment of authors – coordinated pile-ons, sustained threatening messages, doxing of home addresses, and sustained social media campaigns – has become the primary method by which hostile communities target authors in democratic jurisdictions.

The Online Safety Act 2023 imposes obligations on Category 1 platforms to address content that amounts to harassment or threatening communications. Major platforms have trust-and-safety teams that respond to formal complaints, and a complaint submitted with publisher or literary agent involvement carries more weight than an individual author complaint alone. Documenting and reporting threats via platform reporting tools, police (the Communications Act 2003 s.127 and the Malicious Communications Act 1988 both cover threatening electronic messages), and the National Cyber Security Centre’s Cyber Aware guidance for high-profile individuals are the primary legal channels.

For threats with an extremist or organised ideological character – threats connected to religious, political, or ethnic hostility – Counter Terrorism Policing (CTP) and the National Domestic Extremism Unit (NDEU) are the appropriate reporting routes in addition to local police. The NCSC’s Cyber Aware guidance for public figures (formerly Personal Internet Protection) covers the technical steps for hardening the digital profile against targeted harassment.

The NFTAC (National Fixated Threat Assessment Centre) framework is relevant for individual fixated readers: the pathway from obsessive engagement through direct contact, escalating communications, and potential physical approach is the same for authors as for other public figures. Escalating communications should be documented and reported rather than ignored.

Literary festivals and public events

Literary festivals present a specific challenge because they are designed as open, accessible public events. The Hay Festival attracted approximately 250,000 visitors over 10 days in 2024. The Edinburgh International Book Festival sells tickets that provide access to a wide variety of events across a multi-venue site in Charlotte Square Gardens. Cheltenham Literature Festival uses a mix of indoor and outdoor venues across the town centre.

For an author with a specific threat profile, the literary festival environment requires close coordination with the festival’s own security management team. The festival director or security lead should be briefed on the threat context – not the full intelligence picture, but enough to understand why the author’s movements require specific management. The author’s schedule of events, signing sessions, media commitments, and backstage access should be agreed in advance, not improvised on the day.

The specific vulnerabilities at literary festivals are: the author queue for signings (which creates a very slow, close-contact, unscreened interaction with a large number of members of the public over an extended period); the transit between venues across a large open site or town centre; and the festival social environment (author dinners, evening events) where the security team’s presence may be reduced.

For the counter-surveillance and threat monitoring methodology that underpins protection planning for authors at public events, the framework in our security for think tanks and policy research organisations guide – covering state-sponsored targeting of individuals associated with controversial output – is directly relevant. For the digital profile management, address suppression, and online harassment response that form the personal security baseline for authors, see our executive digital footprint management guide.


Sources:

PEN International: Annual Cases Report 2024. Cases of threats and attacks against writers globally. PEN America: Online Harassment Field Manual. 2024. National Fixated Threat Assessment Centre (NFTAC): Annual Report 2024. HMSO. NCSC: Cyber Aware – Guidance for High-Profile Individuals. 2024. Online Safety Act 2023. HMSO. Communications Act 2003, s.127. HMSO. Malicious Communications Act 1988. HMSO. Protection from Harassment Act 1997. HMSO. Counter Terrorism Policing: National Domestic Extremism Unit – Reporting Guidance. 2024. OSAC: Literary and Cultural Event Security Advisory. 2024. Control Risks: Public Figure Threat Assessment Framework. 2024.

James Whitfield is a Senior Security Consultant with experience in public figure protection, threat assessment and management, and security for individuals in the creative and intellectual community.

Summary

Key takeaways

1
1
The author's threat may be long-duration and community-based, not individual

Unlike threats arising from a specific incident or controversy, threats to authors can be sustained by organised communities of hostile readers over years. Religious, political, and social provocation can generate ongoing threat from groups whose ideology identifies the author as an enemy. Security planning should account for a threat that may not diminish after the initial publication controversy passes.

2
2
Literary festivals are open public events requiring specific planning

Major literary festivals attract very large crowds with minimal access control. An author with a specific threat profile requires close coordination with festival security management, a defined schedule of movements between venues, and protection cover between public appearances -- not simply a backstage room with staff.

3
3
Threatening communications should be reported immediately and documented fully

A single specific death threat, whether delivered by message, email, letter, or social media, should be reported to the police on receipt and documented in full -- including screenshots, headers, and any available sender information. Late reporting loses evidence and delays the police's ability to identify a sender. The author's publisher and literary agent should be informed and kept in the loop on all serious threats.

4
4
Address suppression is a standard precaution for authors with a threat profile

Home addresses are discoverable from multiple sources for most authors. Electoral register open listing, historical press profiles, company filings, and grant acknowledgements all create disclosure vectors. A systematic OSINT audit identifying what is publicly available, followed by suppression where mechanisms exist, is a practical and non-disruptive security measure that reduces the information available to a motivated searcher.

5
5
University and lecture tour engagements require advance site work

Open campus environments with publicly promoted lecture schedules create predictable, accessible locations for anyone with hostile intent. An advance visit to the venue, coordination with campus security, and a defined extraction plan after the engagement are minimum requirements for an author with a credible threat profile.

FAQ

Frequently Asked Questions

Authors occupy a distinctive threat position: they produce a fixed, permanent text that can provoke a strong personal reaction in readers over an extended period – potentially years or decades after publication. The Salman Rushdie case is the most extreme example: the 1989 fatwa generated a threat that materialised in a physical attack at the Chautauqua Institution in New York in August 2022, more than three decades later. The threat is therefore long-duration in a way that distinguishes it from the shorter-cycle threats facing politicians or executives. Authors are also often perceived, by fixated or hostile readers, as speaking directly to them – a more intimate perceived relationship than the parasocial attachments formed with actors or musicians. Religious, political, and social subject matter creates identifiable adversary communities who may regard the author as a personal enemy.

Literary festivals – Hay Festival, Edinburgh International Book Festival, Cheltenham Literature Festival, the Jaipur Literature Festival – are open public events with paid admission and minimal access control. The Hay Festival, as an example, hosts approximately 250,000 visitors over 10 days at a mix of indoor tented venues and outdoor spaces on a large open site. Security for a high-profile author at such a festival requires close coordination with the festival’s own security management: the author’s schedule of appearances, signing sessions, and backstage access should be pre-agreed with the festival director, media commitments managed to a defined protocol, and the author escorted between venues rather than navigating the festival crowd independently. For authors with a specific threat profile, pre-event surveillance detection in the festival accommodation area and venue advance work are warranted.

Threatening communications to authors are primarily addressed through the Malicious Communications Act 1988, the Communications Act 2003 s.127 (grossly offensive or threatening electronic communications), and the Protection from Harassment Act 1997. A single specific death threat by message or letter should be reported to the police immediately and documented in full. The Online Safety Act 2023 imposes obligations on major platforms to address content that is threatening or facilitates targeted harassment of named individuals, and formal complaints to platform trust-and-safety teams (with the author’s publisher or literary agent involved where relevant) can result in account removal. For authors whose religious or ideological subject matter generates threats from organised groups – as distinct from individual fixated readers – the police National Domestic Extremism Unit (NDEU) and Counter Terrorism Policing (CTP) are the appropriate reporting routes.

Authors frequently have their home addresses, or addresses closely associated with them, registered in ways that create disclosure risk. Historical publisher and agent listings, journalist interview metadata, electoral register entries, and company filings all create potential address disclosure vectors. The Electoral Register Suppression (open register opt-out) should be activated for an author with a specific threat profile – many authors have not done this. The Companies House suppression provisions under the Economic Crime and Transparency Act 2023 apply where the author has any company registrations. Literary agents and publishers should be requested to use a PO box or agency address for all public-facing correspondence and metadata. Reviewing the author’s historical online presence for address disclosures – particularly in older press profiles, event listings, and grant application acknowledgements – is a practical OSINT audit task.

University speaking engagements create a specific vulnerability because universities are semi-open environments with limited access control and an institutional culture of open engagement that can conflict with operational security requirements. Lecture halls are accessible to the general student body and often to external visitors. An author who appears at a university lecture series on a publicly promoted schedule has a known location, a known time, and an open-access venue. Campus security capability varies enormously between institutions: a Russell Group university may have a competent campus security team; a smaller institution may have minimal provision. For authors with a credible threat profile, advance coordination with campus security, a pre-event walk-through, and a clear post-event extraction plan are the minimum requirements for a safe university engagement.
Get in Touch

Request a Consultation

Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.

Confidential. Your details are never shared with third parties.