
Security Intelligence
Security for Elections and Political Campaigns | CloseProtectionHire
Campaign trail security for candidates, party officials, and campaign staff in high-risk environments. Covers threat assessment, advance work, and election-period violence.
Written by James Whitfield
Security for Elections and Political Campaigns
Political violence in electoral contexts is not rare. The Armed Conflict Location and Event Data Project (ACLED) recorded over 7,000 election-related violence incidents globally in 2024, spanning attacks on candidates, polling station disruption, and post-result violence. The International Foundation for Electoral Systems (IFES) has documented a steady increase in threats and violence directed at election officials and candidates across all regions over the past decade.
For campaign security professionals, close protection providers operating in election contexts, and party organisations planning campaigns in high-risk environments, this guide covers the threat picture, the planning framework, and the specific security requirements of the campaign environment.
The Threat Landscape in Electoral Contexts
Pre-violence pattern
ACLED’s election violence methodology distinguishes between several forms of election-related violence: electoral intimidation, attacks on candidates and officials, attacks on campaign events, polling disruption, and post-result violence. The distribution across these categories varies by region and electoral context.
In sub-Saharan Africa – where ACLED’s most recent data identifies Nigeria, Ethiopia, Kenya, DRC, Mozambique, and Senegal as highest-incident countries – attacks on campaign events and candidates are the most common form in the pre-election period, with organised criminal groups and militias often aligned with specific candidates or parties. The 2023 Nigerian general election saw over 400 documented violence-related incidents in the electoral period according to the Civil Society Situation Room. The 2023 Kenyan post-election period saw protests and clashes that caused dozens of deaths.
In South and Southeast Asia, the 2024 Bangladesh elections were preceded by mass opposition arrests; the Philippines Midterm 2025 saw localised candidate-on-candidate violence particularly in Mindanao, consistent with the Maguindanao massacre pattern. Pakistan’s 2024 elections saw candidate campaign office attacks and worker killings across Balochistan and KPK.
In Latin America, Mexico’s June 2024 elections were marked by extensive candidate killings: the Programa de las Naciones Unidas para el Desarrollo (UNDP) and the Data Civica project documented over 30 candidate murders in the pre-election period, primarily at the municipal and state level where organised crime and local political power are most directly intertwined.
In Europe and North America, the scale is different but not absent. The targeted assassination attempt against former US President Donald Trump in July 2024 was the most significant high-profile incident in recent years. Threats to election officials in the United States have been documented by the Brennan Center for Justice (2024) as reaching historically high levels, with local returning officers facing harassment, doxxing, and physical threats.
Fixated individuals and ideologically motivated actors
The threat to political candidates from fixated individuals – those with an obsessive personal or ideological focus on a public figure – is structurally the same as the threat to any public figure but is amplified during an electoral period by the increased media coverage, the polarised public discourse, and the concentration of campaign events in accessible public environments.
The FTAC model for assessing fixated individuals applies directly to political candidates. The campaign period, which concentrates public appearances and increases the candidate’s social media and media profile, is typically when the volume of concerning contacts increases.
The Fundamental Security Tension
Standard close protection principles assume that limiting access to the principal is a security benefit. In a campaign context, the candidate’s accessibility to voters is the campaign’s core operating requirement. A candidate who cannot shake hands, attend town hall meetings, walk through crowded markets, and be photographed with supporters is not running a viable campaign.
This tension cannot be resolved – it must be managed. The security programme cannot be allowed to veto the campaign activity. Nor can the campaign activity be allowed to override every security consideration. The working relationship between the security lead and the campaign director determines whether the programme works.
The practical resolution: the security programme sets the conditions for high-risk activity (advance work, transport protocols, communications, medical provision) rather than prohibiting it. The campaign director sets the schedule. Both accept that certain activities require security-specific planning that takes time and resources.
Advance Work for Campaign Events
Advance work in a campaign context follows the same methodology as commercial close protection advance work but in a higher-volume, faster-tempo environment.
For each significant campaign event – rally, town hall meeting, market visit, fundraiser – the advance function should cover:
Venue survey. The physical environment: entry and exit points, crowd capacity and expected attendance, line of sight vulnerabilities for a principal who will be in the open, proximity of vehicle access to the stage or principal’s location, available safe room or withdrawal area.
Local intelligence. What is the specific threat picture for this location and this event? Are there known organised opposition groups in the area? Has the venue or the candidate been the subject of recent threats? What is the local law enforcement assessment? The advance officer should have direct contact with local police or security liaison before the event.
Medical provision. Is there first aid capability on-site? What is the evacuation route to the nearest hospital capable of treating a serious casualty? This is not a theoretical question in high-violence election environments.
Communications. Who is the contact at the venue? What are the radio channels? What is the emergency contact for local police? Communications should be confirmed, not assumed.
Crowd management plan. For large rallies, how is entry managed? Is there a credentialing system for close-access zones? Who controls the security perimeter and how are known threats managed if they present?
In high-risk environments (Mexico, Nigeria, Philippines-level threat), the advance work should also include confirmation of armed security availability at the venue and the route to it.
Candidate Transport and Movement Security
Movement to and from events is historically one of the highest-risk periods in political security. The assassination of Benigno Aquino Jr. occurred on arrival at Manila Airport in 1983. The 2024 Trump rally shooting occurred at an outdoor event. Both involved the predictability of a public schedule combined with a specific physical location.
Campaign transport security principles:
Route variance. The route to campaign events should vary. A publicly announced campaign schedule tells an attacker the destination; the route remains a variable that can be controlled. Pre-planned primary and alternative routes for all significant movements are standard.
Advance route check. Before the principal’s vehicle convoy departs, the route should have been checked by the advance element. Specific concern: choke points where a vehicle can be stopped or where a threat can be positioned without exposure.
Convoy composition. A principal vehicle with at minimum one follow car is the baseline for moderate-threat environments. In higher-threat environments, a lead vehicle sweeping the route is also appropriate. Vehicle selection should balance security (armoured where threat level warrants) against the campaign’s need for visible accessibility.
Last-mile management. The transition from vehicle to venue entry is consistently identified as a high-risk moment. The advance team should be in position to manage this transition before the principal exits the vehicle.
High-Risk Countries: Specific Considerations
In countries where organised crime, militias, or armed political factions are directly involved in electoral competition – Mexico, Nigeria, Philippines, Colombia, Bangladesh – the security programme must account for threats that go beyond fixated individuals and ideological actors.
In Mexico, municipal-level candidates in cartel-influenced states face threats from the cartels backing their opponents. The security programme must be designed with the assumption of well-resourced, organised opposition capable of following a campaign schedule and executing timed attacks. Moving predictably is the primary risk factor.
In Nigeria, campaign event security in areas with documented militia activity requires armed security with local knowledge and established law enforcement liaison. The ACLED data for recent Nigerian election periods shows that attacks frequently occur at campaign offices and rallies rather than only at polling stations.
For campaigns operating in these environments, independent security assessment from a provider with current in-country knowledge is a requirement, not a luxury. The local security environment changes faster than any published risk assessment can track.
Staff and Party Worker Security
Campaign workers and party officials in high-risk environments are often significantly under-protected relative to the candidate. The focus of the security programme on the principal can leave field workers, organisers, and data-collecting staff with no security provision.
Staff deploying to areas with documented election violence should receive: a security briefing specific to the area and the risks, a check-in protocol with a defined escalation procedure if check-ins are missed, vetted transport rather than informal local arrangements, an emergency contact available 24 hours, and clear protocols for what to do if an event environment becomes hostile.
In the highest-risk environments, personal tracking devices and a defined extraction plan are appropriate. The organisation’s duty of care to deployed staff does not diminish because they are campaign workers rather than employees.
Post-Election Period
Security planning that stands down after polling day misses what is frequently the highest-risk window in contested or close elections. Disputed results trigger mobilisation; losing faction groups who believe the result was manipulated have a documented propensity for violence in the days and weeks following the count.
Post-result threat assessment should be conducted as a separate exercise from the pre-election assessment. The threat actors, their motivations, and the likely incident types differ substantially between the pre-election and post-result periods.
For the broader political risk framework that provides early warning of election-cycle deterioration well in advance of polling day, see our political risk and corporate travel guide. For close protection services for political figures and candidates in our P1 city network, see our executive protection services. For the security framework specific to political fundraising events – protest management under the Public Order Act 2023, donor list data protection under UK GDPR, counter-intelligence considerations, and police protection team coordination – see our security for political fundraising and donor events guide. For the security and operational security requirements facing government affairs and lobbying professionals – including public register exposure, the Foreign Influence Registration Scheme under the National Security Act 2023, foreign intelligence targeting of lobbyists at party conferences, and parliamentary estate security limitations – see our security for government affairs and lobbying professionals guide.
Source: ACLED Election Violence Data and Methodology, 2024. International Foundation for Electoral Systems (IFES): Election Violence Dataset 2024. UNDP and Data Civica: Mexican Election Violence Report, June 2024. Civil Society Situation Room (Nigeria): 2023 General Election Violence Report. Brennan Center for Justice: Threats to Election Workers 2024. OSAC: Election Security Planning Guide 2024. NPSA (UK): Protecting the Democratic Process – Guidance for Candidates and Officials 2024.
Key takeaways
Accessibility is the fundamental tension in campaign security
A candidate's ability to meet and be seen by voters is the campaign's core requirement. Security programmes that restrict access too heavily damage the campaign. Those that allow it without structure create physical vulnerability. The balance is the planning challenge, not a binary choice.
Election-period threat levels are higher than off-cycle
Most candidates and politicians have a higher threat level during an active campaign than at other times. The combination of public visibility, polarised media coverage, and concentrated public events creates conditions for both fixated individuals and organised groups to act.
Advance work is non-negotiable for contested environments
In environments where election violence is a documented risk, advance work for campaign events is not optional. Venues should be surveyed, local intelligence gathered, and coordination with local security authorities confirmed before the principal arrives.
Campaign staff in high-risk environments need their own security protocols
The focus on the candidate can leave campaign staff in high-risk environments without adequate security provisions. Staff operating in areas with documented election violence need check-in protocols, secure transport, and emergency procedures.
Post-result period requires sustained security posture
Security planning that stands down after polling day misses the highest-risk window in many contested elections. Disputed results, incumbent-challenger confrontation, and the mobilisation of losing faction groups are documented post-election risk factors.
Frequently Asked Questions
Request a Consultation
Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.
Your enquiry has been received. A security consultant will contact you within 24 hours to discuss your requirements.
