
Security Intelligence
Security for Energy Executives Targeted by Climate Activists | CloseProtectionHire
Climate activist groups are targeting oil, gas, and energy executives at home, at AGMs, and on the road. Here is how security professionals are responding.
Written by James Whitfield, Senior Security Consultant
Security for Energy Executives Targeted by Climate Activists
Energy executives have moved up the activist targeting agenda over the past five years. Not as a result of general corporate antipathy – the phenomenon is specific, intelligence-driven on the activist side, and increasingly sophisticated in its methods. Senior leaders at oil majors, gas companies, pipeline operators, and large mining businesses now face a category of threat that sits between mainstream protest and organised harassment. Security professionals working in this sector need to understand both the legal and operational dimensions before they can design an appropriate response.
This is not about restricting lawful protest. Climate activism is a protected right. The security issue begins where that right is exercised in ways that cause alarm, harassment, or property damage – and where certain individuals, named publicly by activist groups, become the focus of repeated, targeted attention.
The Landscape: Who Is Doing What
The major climate activist groups operating in the UK and Europe have different risk profiles, and conflating them is a planning error.
Extinction Rebellion (XR) operates on a declared non-violence commitment and focuses on mass disruption – road blockades, government building occupations, and large-scale attention events. XR’s threat to individual executives is primarily reputational: they name board members and senior leaders publicly, attribute climate damage to specific individuals, and encourage their supporters to make contact. The risk of physical confrontation is low by ER doctrine, but the reputational targeting creates secondary risks: data aggregation about named individuals, emboldened fringe actors, and online harassment that spills into the physical environment.
Just Stop Oil (JSO) emerged in 2022 with a declared strategy of causing maximum economic disruption through small-group direct action. JSO has targeted petrol station forecourts, roads, and – notably – financial institutions with ties to oil and gas projects. Their 2023 Annual Review referenced targeting of executives directly and their use of activists with minimal shareholdings to gain entry to AGMs. JSO’s actions have included paint attacks on vehicles, lock-on devices immobilising cars, and sustained road blockades. The Public Order Act 2023 was partly drafted in response to JSO tactics.
Earth First and the broader deep ecology network operate with a more decentralised structure and historically have tolerated property sabotage in a way that mainstream groups do not. Their UK presence is limited but the international network – particularly in North America – has a documented history of equipment sabotage at extraction sites.
The NPSA (National Protective Security Authority) has published guidance for CNI operators on protest threats. The working assumption within that guidance is that the vast majority of protest action will remain civil disobedience rather than violent extremism – but that named executives require individual threat assessment rather than relying on the corporate generic.
Home Address Targeting
The most operationally significant tactic in recent years has been residential targeting. This follows a simple methodology: identify the executive via Companies House director filings, LinkedIn, or published annual reports; cross-reference with the electoral roll; and use that address as a demonstration site.
XR UK co-ordinated residential demonstrations at the homes of Barclays board members during their 2021 divestment campaign. The demonstrations themselves were lawful peaceful protest – but the effect on family members who had no role in the company’s decisions was significant. Several non-executive directors reported that their spouses and children were present when protestors arrived with banners and megaphones.
The preventive tool is address suppression. Under the Economic Crime (Transparency and Enforcement) Act 2023, company directors can suppress their service address from the public Companies House register. Electoral roll opt-out removes home addresses from the open register. Historical OSINT – indexed press coverage, planning applications, social media geo-tags – requires a separate audit and takedown programme. These measures do not guarantee removal but they substantially increase the research effort required by activist targeting teams.
Where addresses are already in circulation, the response is physical. A residential security assessment covers the following: whether the current access control is adequate for a sustained demonstration (gates, hedging, camera coverage), whether neighbours have been briefed on the possibility of protest, whether there is a local police liaison point, and what the family’s immediate action plan is if protestors arrive. For senior executives on published activist targeting lists, a temporary security officer presence during any period of heightened activity is proportionate.
AGM Disruption
Annual general meetings have become a front line. The mechanism is straightforward: activist groups purchase a minimal shareholding – often one share – which entitles the holder to attend and ask questions. Coordinated attendance by multiple individuals can disrupt proceedings significantly.
The BP AGM in May 2023 saw repeated disruption from climate protesters within the hall. Shell’s 2023 AGM in London was subject to sustained floor protests requiring security intervention. These are not fringe events – they are publicly planned, well-coordinated, and covered by AGM security teams as a matter of routine at any major energy company’s annual meeting.
The security planning requirement for an AGM that faces organised activist attendance includes: pre-registration cross-referencing against known activist group member lists (a standard open-source intelligence task), physical access control that prevents unauthorised items being brought in (lock-on devices, superglue, paint canisters have all been used), coordination with the Metropolitan Police’s protest liaison unit or equivalent in other jurisdictions, a board and senior management extraction protocol if proceedings are disrupted, and a media management plan for the likely coverage.
The legal framework governing AGM access is a tension point. Registered shareholders have statutory rights under the Companies Act 2006. Security teams cannot simply exclude legitimate shareholders without legal risk. The response is physical management of conduct within the hall: trained security officers positioned within the venue, a prepared chairperson protocol for removing individuals who breach the terms of admission, and, where necessary, police referral for individuals suspected of planning property damage.
Vehicle and Transit Targeting
JSO’s most direct targeting of individual executives has involved vehicles. Lock-on devices attached to company cars, paint attacks on vehicles outside named company premises, and road blockades on routes that executives routinely use have all been deployed.
The protective response follows standard close protection anti-surveillance principles. Route variation is the primary operational tool. If a principal uses a predictable daily route – same departure time, same roads, same entrance – they are vulnerable to pre-planned vehicle interception. A protective driver with awareness of JSO’s published location tactics (they announce operations publicly before execution) can vary both timing and route to reduce exposure.
For executives who receive a specific threat communication or find themselves on a published JSO targeting list, a security driver is not optional – it is a proportionate and defensible response. The SIA Close Protection licence framework covers vehicle escort operations. Armoured vehicle specifications are a secondary consideration: for most climate activist scenarios, standard vehicle security is sufficient. The threat is disruption and publicity, not armed attack.
Legal Tools Available to Companies
The legal landscape has shifted significantly in favour of companies dealing with sustained activist campaigns.
The Public Order Act 2023 created Serious Disruption Prevention Orders (SDPOs), which can be imposed by courts on individuals with a history of protest-related offences, restricting their ability to attend specific locations or participate in specified activities. The Act also created new offences for lock-on tactics and tunnelling, with sentences of up to 51 weeks’ custody. Police powers to impose conditions on protests were substantially broadened.
The Protection from Harassment Act 1997 covers sustained campaigns against individuals that cause alarm or distress. Civil injunctions have been obtained against XR and JSO under this Act. The evidential requirement is a course of conduct – at least two instances – and demonstrable distress caused to the target. Companies pursuing injunctions need documented evidence from the outset: dated incident logs, photographs, video, witness statements.
The Criminal Justice and Public Order Act 1994 covers aggravated trespass (section 68) – entering land or premises with intent to disrupt lawful activity. This is a police enforcement matter, but corporate security teams should document incidents to support police action.
Where an executive has received a direct threat communication – email, letter, or social media message – this is a police matter immediately. The Counter Terrorism Policing network maintains threat assessment capacity for individuals receiving credible threats. Most climate activist targeting does not meet this threshold, but any specific, personal threat should be reported.
Operating in P1 Cities
For energy companies operating in P1 cities – Lagos, Nairobi, Johannesburg, Jakarta, Manila, Bogota – the climate activist threat profile is lower but not absent. Domestic environmental protest movements exist in all of these markets (Niger Delta community activism, South Sulawesi mining protests, Bogota anti-fracking campaigns). The threat in these markets is more likely to be community blockades at operational sites, local political actors instrumentalising environmental grievances, and – in some cases – organised groups with links to criminal or political violence. The VPSHR (Voluntary Principles on Security and Human Rights) framework, which is addressed separately in the context of extractive sector security, is the relevant operational reference for field operations in these environments.
For headquarters-based executives managing assets in these markets, the UK and European activist threat is the primary personal security concern. For personnel deployed to field operations in P1 markets, the community relations and physical site security assessment takes precedence.
What Effective Protective Intelligence Looks Like
The most effective security response to climate activist targeting is not reactive – it is intelligence-led. That means monitoring the published communications of relevant activist groups, tracking when a company or individual is named, identifying when protests are being planned (JSO in particular announces operations publicly), and assessing the credibility and capability of specific threats.
For most energy companies this function sits within a broader corporate security intelligence team. For smaller operators that lack this capacity, specialist open-source intelligence firms can provide monitoring as a subscription service. The cost is modest compared to the disruption cost of an unplanned residential demonstration or an AGM occupation.
For further context on broader protest security, the corporate protest and civil unrest security guide covers the full range of protest threat typologies. The parallel threat from ideologically motivated non-climate activism is covered in security for animal rights extremism and corporate targets.
Key takeaways
Address suppression is the first step
Before any other measure, energy executives named in activist publications should suppress their home addresses from the Companies House register under the Economic Crime (Transparency and Enforcement) Act 2023 and from the electoral roll. Most residential targeting begins with open-source research -- removing the data removes the starting point.
Understand the group before designing the response
Just Stop Oil, Extinction Rebellion, Greenpeace, and Earth First each operate differently. JSO's declared tactics are civil disobedience aimed at disruption and publicity. ER has published commitments to non-violence. Earth First has a more radical tradition. The security response should match the assessed group behaviour, not a worst-case generalisation.
AGM security requires specific planning
Activist groups have used minimal share purchases to gain AGM entry legally. Security planning for annual general meetings should include pre-registration vetting, coordination with the venue on access control, a protest management protocol for outside, and a board extraction plan if proceedings are disrupted from the floor. Stage 2DH on event security applies directly here.
Family awareness is not optional
If a principal has been named publicly on an activist targeting list, their family needs a proportionate briefing. Not alarmist -- factual. What the group's stated tactics are, what to do if protestors arrive at the family home, how to photograph and document for police, and who to call. Uninformed family members are a vulnerability.
Document everything for legal remedies
Sustained activist targeting can cross the threshold for a harassment injunction. To obtain one, a company needs evidence: dated logs of incidents, photographs, social media posts, and ideally body camera footage from security officers present at protests. Courts have granted injunctions against XR, JSO, and associated individuals. Documentation discipline from day one matters.
Frequently Asked Questions
Request a Consultation
Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.
Your enquiry has been received. A security consultant will contact you within 24 hours to discuss your requirements.
