Scroll to top
When Activists Target Your Executives: Corporate Protest Security | CloseProtectionHire

Security Intelligence

When Activists Target Your Executives: Corporate Protest Security | CloseProtectionHire

Security guide for executives named as protest targets. Covers XR, Just Stop Oil, activist OSINT methodology, Protection from Harassment Act 1997, Public Order Act 2023, National Highways v Persons Unknown [2021], and executive personal security response.

12 May 2026

Written by James Whitfield, Senior Security Consultant

Protest groups in the UK and Europe have refined a specific form of pressure campaign over the last decade: moving from targeting corporate premises and public events to targeting named individual directors, executives, and major shareholders. The infrastructure for this transition costs nothing – Companies House, LinkedIn, and a campaign website. The personal impact on the targeted individual can be severe.

This is not entirely new. Labour disputes, anti-apartheid campaigns, and animal rights activism all produced individual targeting in earlier decades. What has changed is scale and speed: free open-source data, coordinated social media, and activist training networks that share tactics between groups allow a volunteer with internet access to build an executive target profile in an afternoon and coordinate a residential protest by the following weekend.

How Activist Groups Build Target Profiles

Companies House provides director filings for every UK-registered company – name, registered address, date of birth, appointment history. For executives at public companies, annual reports, investor relations biographies, and regulatory submissions add further detail. LinkedIn provides the professional history, connection graph, and photographs that complete the profile. Parliamentary committee transcripts and press archives add public statements and associated controversies.

Extinction Rebellion UK used this data in organised campaigns against Barclays directors and BP shareholders from 2019 to 2022, publishing target lists on campaign websites and co-ordinating attendance at residential addresses. Just Stop Oil – formed in October 2021 – has protested outside energy executives’ homes. Animal Rising has published named executives at food production and pharmaceutical companies in campaign materials.

The targeting is not random. Campaigns select individuals presented as decision-makers for the policy under challenge. Changing one named individual does not end the campaign; the group moves to the next director. This is a methodology, not a series of isolated incidents.

The Escalation Pattern

Campaigns follow a recognisable sequence: organisational targeting (premises disruption, AGM activity, event interruption) escalates to individual targeting when organisational pressure produces no outcome. A campaign running for six months against a company’s premises with no result is more likely to shift to individual targeting than a three-week-old campaign.

Security planning should not wait for this transition. Monitoring campaign channels – social media, websites, press releases, affiliated networks – provides early warning. Once an executive is named in campaign materials, the response moves from organisational to personal: an OSINT audit of the executive’s public data footprint, a residential security review, commute adjustments, and household briefing. These actions can be conducted quietly without amplifying the campaign’s profile.

Protection from Harassment Act 1997 (ss.1-7) creates civil and criminal remedies for a course of conduct amounting to harassment. A course of conduct requires at least two incidents. Where conduct causes fear of violence, the aggravated offences under the Protection of Freedoms Act 2012 (s.2A, s.4A) apply. A civil injunction under s.3 prohibits specified conduct; breach is contempt of court.

National Highways v Persons Unknown [2021] EWHC 3081 (QB) established the template for High Court injunctions binding unnamed future protesters. The injunction applies to any person served with it after publication, allowing prospective protection without pre-identifying individuals. The model has been used by energy, infrastructure, and farming companies in subsequent proceedings.

Public Order Act 2023 (ss.20-21) introduced serious disruption injunctions available to the police. Criminal Justice and Public Order Act 1994 s.68 covers aggravated trespass.

The limits of legal response matter: injunctions take time, create media coverage, and are obtained after a harassment course has been established. Legal and security strategies should be co-ordinated, not sequential.

For crisis management when executive security overlaps with corporate controversy, see our corporate crisis management guide. For the personal security programme that applies to executives under sustained personal pressure, see our executive security during controversy guide.


James Whitfield is a Senior Security Consultant with 20 years of experience in executive protection, threat assessment, and corporate security.

Summary

Key takeaways

1
1
Companies House, LinkedIn, and annual reports give activist groups everything they need to build executive target profiles -- at no cost

Both Extinction Rebellion and Just Stop Oil have used publicly available Companies House filings to identify director home addresses. LinkedIn provides the professional history, photograph, and location data that complete a target profile. For executives at organisations facing activist campaigns, a personal OSINT audit -- assessing what data is publicly available and what can be reduced -- is the most cost-effective preventive security measure. Companies House filings cannot be removed, but supplementary personal data across other platforms can be managed and reduced before a campaign begins.

2
2
The escalation from organisational to individual targeting is well-documented -- security planning should anticipate it before it happens

Activist campaigns that have targeted an organisation's premises for several months with no outcome are more likely to shift to named executive targeting than new campaigns. The transition signal is observable in campaign materials and social media: references to named individuals, requests for information about specific executives, framing that links a named person to a contested decision. Corporate security assessments should monitor active campaigns for this transition and trigger executive personal security reviews before the first home protest occurs, not in response to it.

3
3
National Highways v Persons Unknown [2021] EWHC 3081 established a High Court injunction model that binds unnamed future protesters -- understand its scope

The injunction template from National Highways v Persons Unknown applies to any person served with the order after publication. This creates prospective protection without pre-identifying individual activists. But injunctions require service and publication, take time to obtain, and generate media coverage that can amplify the campaign. They are most useful for organisations facing repeat actions from shifting groups of individuals acting under the same campaign banner. They are not appropriate as a first response to a new campaign, and do not substitute for security measures that reduce personal exposure.

4
4
Legal responses operate after the fact -- security measures must reduce risk before incidents escalate

A harassment injunction is obtained after a course of conduct has been established. A prosecution for aggravated trespass requires the offence to have been committed. Legal remedies are valuable but retrospective. Security measures -- adjusting commute and residential security, reducing the public data footprint, briefing household members, monitoring campaign intelligence -- operate before incidents occur. The most effective response to activist targeting combines early-warning threat intelligence with protective measures, running in parallel with legal strategy rather than waiting for legal proceedings to conclude.

5
5
Residential protests are more distressing and legally more complex than office protests -- they require a specific security response

Protests at an executive's home affect family members with no connection to the corporate controversy. They are more distressing than office protests, more likely to escalate, and create a different policing context. The corporate security response should not rely on police intervention as primary mitigation -- response will depend on local command decisions and available resources. Residential security review -- CCTV and perimeter audit, neighbour notification, family emergency protocol -- should be completed before a residential protest occurs.

FAQ

Frequently Asked Questions

Activist groups use open-source intelligence that requires no specialist access or technical capability. Companies House provides free access to director filings – name, registered address (often a home address for smaller companies), appointment history, and shareholding structures – for every UK-registered company. LinkedIn provides professional histories, photographs, stated locations, and connection graphs. Annual reports and investor relations materials name board members. Parliamentary select committee transcripts and regulatory hearing records identify executives associated with contested decisions. Activist groups compile this into target profiles that are shared internally and, in some cases, published on campaign websites to recruit participation. Extinction Rebellion UK published director and shareholder lists for Barclays, BP, and Shell as part of coordinated campaigns between 2019 and 2022. Just Stop Oil, formed in October 2021, has conducted protests outside energy executives’ homes using addresses sourced from Companies House director filings. Animal Rising has published named executives at food production and pharmaceutical companies in its campaign materials. The intelligence collection mirrors what headhunters, journalists, and commercial investigators do daily. For executives at organisations that face activist campaigns, the public data footprint – what information exists, where, and how easily it is found – is the primary targeting resource for activist groups.

Activist targeting of named executives follows a documented escalation pattern. Campaigns begin with organisational targeting – premises disruption, event interruption, proxy resolutions at AGMs. When organisational pressure does not produce the desired outcome, the campaign shifts to individual pressure: identifying named decision-makers and applying personal pressure. This may include: protests at or near the executive’s office with named placards; physical presence at the executive’s registered home address; attendance at public events where the executive is speaking; sustained social media campaigns naming and tagging the individual; and in some cases publishing the executive’s personal details or daily routine. The most aggressive documented UK cases involved executives at fossil fuel companies, live animal export operations, and pharmaceutical testing facilities. Tactics in those cases included multi-day protests outside residential properties, paint attacks on driveways, following vehicles from office to home, and attempts to approach children at school collection points. The security response must address the full range of tactics – not only incidents that clearly cross criminal thresholds. The Protection from Harassment Act 1997 creates the primary legal basis for civil and criminal remedy, but legal remedies operate after incidents. The security response must reduce exposure before escalation occurs.

The primary legal tools are: civil injunctions under the Protection from Harassment Act 1997; High Court injunctions against persons unknown following the National Highways model; and specific criminal offences where the threshold is met. Protection from Harassment Act 1997 (ss.1-7): creates civil and criminal remedies for a course of conduct that the respondent knows or ought to know amounts to harassment. ‘Course of conduct’ requires at least two incidents. The Protection of Freedoms Act 2012 added specific stalking offences (s.2A: pursuing a course of conduct amounting to stalking; s.4A: stalking involving fear of violence). A civil injunction under s.3 can prohibit specified conduct; breach is contempt of court. National Highways v Persons Unknown [2021] EWHC 3081 (QB) established the template for High Court injunctions binding unnamed future protesters. The injunction applies to any person served with it after publication, whether or not they were involved in the original proceedings – allowing an organisation to obtain prospective protection without pre-identifying individual activists. Public Order Act 2023 (ss.20-21) introduced serious disruption injunctions available to the police. Criminal Justice and Public Order Act 1994 s.68 covers aggravated trespass – obstructing, disrupting, or intimidating lawful activity on land. Police, Crime, Sentencing and Courts Act 2021 (ss.59-60) gave police expanded powers to impose conditions on protests causing serious disruption. Legal remedies are retrospective and can generate media coverage that amplifies a campaign. The decision to pursue injunction proceedings should be made on a realistic assessment of likely outcome.

The corporate security response operates in three phases. Assessment: establish what activists know by conducting an OSINT review of the executive’s public data footprint – Companies House entries, LinkedIn profile, press coverage, social media. Map the specific threat: which group, stated objective, historical tactics, how previous campaigns escalated or de-escalated. Immediate protective measures: brief the executive and household on the threat; conduct a residential security review; adjust commute and travel routines; review social media OPSEC for the executive and close family members; brief the executive’s personal assistant on vetting procedures for unknown contacts. Sustained programme: monitor campaign channels for intelligence on planned actions; assess whether harassment meets the legal threshold for injunction proceedings; maintain threat assessment review as the campaign evolves. The tendency of corporate legal teams to prioritise injunction applications as the first response should be assessed carefully. Injunction proceedings are public, create media coverage, and can amplify a campaign’s profile. Security response and legal response should be sequenced based on a realistic assessment of what each produces. For broader crisis management when executive security overlaps with corporate controversy, see our corporate crisis management guide. For the specific personal security programme for executives under sustained personal pressure, see our executive security during controversy guide.

UK law protects the right to protest under Article 10 (freedom of expression) and Article 11 (freedom of assembly) of the European Convention on Human Rights, incorporated by the Human Rights Act 1998. Peaceful protests in public spaces that do not constitute harassment of individuals are protected activity. The police have a duty to facilitate lawful protest. The practical lines for corporate security planning: organising or participating in a public protest outside a corporate building is protected; attending at an individual’s private home with intent to cause distress is not (Protection from Harassment Act; police powers under Criminal Justice and Public Order Act 1994 ss.35-36); a course of conduct causing fear of violence is a criminal offence (PHA s.4A); publishing personal data enabling others to target an individual may engage UK GDPR (ICO enforcement) and harassment law. The security response must be calibrated to this framework. Engaging police for genuinely criminal conduct is appropriate and effective. Attempting to suppress lawful protest through corporate pressure on police is legally and reputationally risky. The distinction between protected protest and targeted harassment must be assessed on the specific facts of each situation – generalised corporate hostility to protest is a different problem from specific criminal targeting of an individual.
Get in Touch

Request a Consultation

Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.

Confidential. Your details are never shared with third parties.