Close Protection Against Stalking & Harassment — Assessment & Response
Published 9 April 2026 · 11 min read
Stalking and harassment represent some of the most psychologically taxing and operationally complex threats that close protection teams encounter. Unlike a one-time security event — a robbery, an assault at a public appearance — stalking is a sustained pattern of behaviour that escalates unpredictably and erodes the principal's sense of safety over weeks, months, or years. The protection team's role extends beyond physical security into threat assessment, evidence documentation, legal coordination, and the psychological support of a client who may be living in constant fear. This article examines how close protection professionals assess and respond to stalking and harassment cases, the legal frameworks that govern these situations in Australia and the United States, and the technology tools that support effective protection.
Understanding Stalking as a Threat
Stalking is not a single behaviour but a pattern of behaviours — repeated, unwanted contact or surveillance that causes the target to fear for their safety. The behaviours themselves may seem individually innocuous: a letter, a phone call, a person appearing at a public event. It is the pattern, persistence, and escalation that transform individual acts into a campaign of harassment that demands a protective response.
Stalker typologies. Research into stalking behaviour — notably the work of forensic psychologists Paul Mullen and Michele Pathé in Australia — has identified several stalker types, each with different motivations and risk profiles:
- Rejected stalkers — Former intimate partners or close associates who stalk in response to the end of a relationship. This is the most common category and statistically the most likely to escalate to violence.
- Resentful stalkers — Individuals who believe they have been wronged by the target and stalk as a form of retaliation. They seek to frighten and control rather than establish a relationship.
- Intimacy seekers — Individuals who believe they have a special connection with the target, often driven by delusional beliefs (erotomania). They seek to establish a relationship that exists only in their mind.
- Incompetent suitors — Individuals with poor social skills who engage in unwanted pursuit without understanding that their attention is unwelcome. Less likely to escalate to violence but persistent and difficult to deter.
- Predatory stalkers — Individuals who stalk as preparation for a planned attack, often sexual in nature. The stalking is surveillance-driven rather than communication-driven, making it harder to detect but the most immediately dangerous.
Understanding which category a stalker falls into is critical because it determines the appropriate response strategy. An intimacy seeker who is directly confronted may escalate to a rejected stalker. A resentful stalker who is ignored may increase the severity of their behaviour to provoke a reaction. The protection team must work with threat assessment professionals to classify the stalker and tailor the response accordingly.
Threat Assessment for Stalking Cases
Threat assessment is the structured evaluation of whether a person of concern poses a genuine risk of violence or harm to the principal. In stalking cases, this assessment is ongoing — it is not a one-time evaluation but a continuous monitoring and analysis process that evolves as the stalker's behaviour changes.
Warning behaviours. The protection team should monitor for specific warning behaviours that indicate escalation toward violence:
- Pathway behaviour — Research, planning, or preparation for an attack, such as acquiring weapons, conducting surveillance of the target's routine, or testing security measures.
- Fixation — Increasing preoccupation with the target, evidenced by the volume and intensity of communications, social media activity, or third-party reports.
- Identification — Association with attackers or violent role models, or expressions of willingness to use violence.
- Novel aggression — Acts of violence or destruction that are new for the individual, even if not directed at the target (e.g., property damage, threats to third parties).
- Energy burst — A sudden increase in the frequency or intensity of contact after a period of relative quiet, which may indicate that the stalker has made a decision to act.
- Leakage — Communication to third parties about intent to harm the target, whether direct threats or veiled references.
- Last resort — Statements or behaviours suggesting the stalker feels they have nothing to lose, which significantly increases the risk of violence.
Documentation. Every incident — every letter, every phone call, every sighting, every social media message — must be documented with date, time, location, content, and context. This documentation serves three purposes: it supports the threat assessment by revealing patterns and escalation; it provides evidence for law enforcement and legal proceedings; and it creates a record that can be shared with any new protection team members or law enforcement agencies that become involved. Platforms like EP-CP that centralise incident reporting and documentation are invaluable in stalking cases, where the volume of incidents over time can be substantial and the ability to search, filter, and analyse the history matters.
Professional assessment. Complex stalking cases should involve a specialist threat assessment professional — typically a forensic psychologist with experience in stalking and targeted violence. The protection team provides the raw data (incident reports, communications, surveillance findings), and the threat assessor provides the analysis and risk rating. This collaboration ensures that protective decisions are informed by evidence-based assessment rather than intuition alone.
Legal Frameworks — Australia
Stalking is a criminal offence in every Australian state and territory, though the specific legislation and definitions vary by jurisdiction.
Key legislation:
- New South Wales — Crimes (Domestic and Personal Violence) Act 2007, s 13: Stalking or intimidation with intent to cause fear of physical or mental harm.
- Victoria — Crimes Act 1958, s 21A: Stalking, defined broadly to include following, contacting, publishing material, and conducting surveillance.
- Queensland — Criminal Code Act 1899, s 359B: Unlawful stalking, including conduct directed at a person or their family that would cause apprehension or fear.
- Western Australia — Criminal Code Act Compilation Act 1913, s 338D-338E: Stalking with intent to intimidate or an expectation that the conduct would intimidate.
Apprehended Violence Orders (AVOs) and intervention orders. In addition to criminal charges, victims can apply for civil protection orders that prohibit the stalker from contacting or approaching them. These orders go by different names across jurisdictions — Apprehended Violence Orders in NSW, Intervention Orders in Victoria, Domestic Violence Orders in Queensland — but serve the same protective function. While a protection order does not physically prevent a stalker from approaching, it creates a legal mechanism for immediate arrest if the order is breached, and it establishes a clear legal record of the victim's fear and the stalker's behaviour.
The protection team's role. In Australia, close protection operators are not law enforcement officers and do not have powers of arrest beyond the citizen's arrest provisions available to any member of the public. The team's role is to deter the stalker through visible or covert presence, detect and document stalking behaviour, protect the principal from physical harm, and support law enforcement by providing evidence and intelligence. The protection team should maintain a cooperative relationship with the investigating police officers, sharing information freely and coordinating response plans.
Legal Frameworks — United States
In the United States, stalking is criminalised at both the federal and state level. Every state has anti-stalking legislation, though definitions, penalties, and enforcement approaches vary significantly.
Federal law. The federal stalking statute (18 U.S.C. § 2261A) criminalises stalking that involves crossing state lines, using interstate facilities (including the internet and telephone), or entering or leaving Indian country. This federal jurisdiction is particularly relevant for cases involving cyberstalking or stalkers who follow the principal across state boundaries.
State law. State stalking laws generally define stalking as a pattern of conduct directed at a specific person that would cause a reasonable person to feel fear. Many states have enhanced penalties for stalking that violates a protective order, involves a weapon, or targets a minor. Some states — notably California — have developed sophisticated stalking statutes and specialised threat assessment teams within law enforcement that can be valuable resources for protection teams.
Restraining orders. Civil protection orders (variously called restraining orders, orders of protection, or no-contact orders) are available in every state and serve a similar function to Australian AVOs. In the US context, violations of restraining orders can result in immediate arrest and criminal charges, and many jurisdictions have dedicated domestic violence and stalking units that prioritise enforcement of these orders.
Cross-jurisdictional challenges. For principals who travel between states or internationally, the patchwork of stalking laws creates coordination challenges. A restraining order issued in one state is enforceable in other states under the full faith and credit provisions of federal law, but practical enforcement depends on local law enforcement awareness of the order. The protection team should carry copies of any active protection orders and ensure that local law enforcement at every destination is briefed on the stalking situation.
Protective Strategies
The protective response to stalking is a layered strategy that addresses the principal's physical security, digital security, and psychological wellbeing.
Physical security measures. The foundation is hardening the principal's daily environment — residence, workplace, vehicle, and regular routes. This includes upgrading residential security (locks, CCTV, alarm systems, perimeter lighting), varying daily routines to prevent predictability, establishing safe rooms within the residence and workplace, and ensuring that the principal's vehicle is always secure and accessible. The protection team may increase its visible presence during periods of elevated risk, and additional operators may be deployed to cover the principal's family members if the stalker has shown interest in them.
Counter-surveillance. Stalkers frequently conduct surveillance of the principal before approaching or escalating. A counter-surveillance capability — operators trained to detect and document surveillance — can identify the stalker's pattern of activity, provide evidence for law enforcement, and inform the protection team's operational planning. Counter-surveillance is a specialist skill that requires training beyond standard close protection courses, and teams should invest in this capability for any sustained stalking case.
Digital security. Modern stalking frequently has a digital dimension — monitoring the principal's social media, sending harassing emails or messages, tracking the principal's location through compromised devices, or publishing private information online (doxxing). The protection team should coordinate a digital security audit that examines the principal's online presence, social media privacy settings, device security (checking for spyware or tracking apps), email security, and the digital hygiene of household staff and family members whose accounts could be exploited to reach the principal.
Third-party coordination. Effective stalking response requires coordination across multiple parties: the protection team, law enforcement, legal counsel, the threat assessment professional, the principal's workplace security, and potentially the principal's therapist or counsellor. Regular case conferences — where all parties share information and align on strategy — prevent the fragmented response that allows stalkers to exploit gaps between organisations.
Communication strategy. One of the most important early decisions is whether and how to communicate with the stalker. Research consistently shows that inconsistent responses — ignoring most contact but occasionally responding — are the worst approach, as they reinforce the stalker's behaviour through intermittent reinforcement. The recommended approach for most stalker types is a single, clear, unambiguous communication (typically through a lawyer) that all contact is unwanted, followed by complete non-engagement. Any deviation from this — responding to a particularly threatening message, attempting to reason with the stalker, or using intermediaries to negotiate — typically extends and escalates the stalking campaign.
Technology Tools for Stalking Cases
Technology plays a dual role in stalking cases — it is both a tool used by stalkers and a resource for the protection team.
Incident documentation platforms. As discussed above, centralised incident documentation is critical. A platform that allows operators to log incidents from mobile devices in real time, attach photographs and recordings, tag incidents by type and severity, and generate chronological reports for law enforcement and legal proceedings is far more effective than manual logs or scattered email records. EP-CP's incident reporting capabilities are designed for this kind of sustained, evidence-intensive operation.
OSINT and social media monitoring. Open-source intelligence tools can monitor the stalker's publicly visible online activity, track the creation of new accounts that may be used for anonymous contact, and identify networks of associates who may be assisting the stalker. Social media monitoring should be conducted systematically — daily checks of identified accounts, keyword alerts for the principal's name, and periodic searches for new accounts that match the stalker's known digital patterns.
Counter-surveillance technology. Technical surveillance countermeasures (TSCM) — electronic sweeps of the principal's residence, vehicle, and office for listening devices, cameras, and GPS trackers — should be conducted at the outset of any stalking case and periodically thereafter. Consumer-grade tracking devices are inexpensive and widely available, and a determined stalker can plant them with minimal technical skill.
Communication monitoring. With the principal's consent and within legal boundaries, monitoring incoming communications (emails, phone calls, social media messages) for stalking-related content provides real-time intelligence on the stalker's behaviour and emotional state. Automated tools can flag messages containing threatening language, and the threat assessment professional can analyse communication patterns for signs of escalation.
Geofencing and location alerts. If the stalker is known and their vehicle identified, some jurisdictions allow licence plate recognition technology or geofencing alerts to notify the protection team when the stalker enters a defined area around the principal's residence or workplace. The legal permissibility of these tools varies by jurisdiction, and their use should be coordinated with law enforcement and legal counsel.
Supporting the Principal
Stalking has profound psychological effects on victims — anxiety, hypervigilance, sleep disruption, depression, and a pervasive sense of loss of control. The protection team is not a substitute for professional psychological support, but team members should understand the psychological impact of stalking on their client and adapt their approach accordingly.
This means communicating clearly and calmly about the security situation without minimising or catastrophising the threat. It means giving the principal agency in security decisions where possible — people who feel stalked feel powerless, and involving them in their own protection restores some sense of control. It means being patient with a client whose fear may manifest as irritability, indecisiveness, or resistance to security measures. And it means recognising when the principal needs professional psychological support and recommending it without judgement.
Conclusion
Stalking cases demand a sophisticated, sustained, and multidisciplinary response from close protection teams. The threat is not a single event but an evolving pattern of behaviour that requires continuous assessment, meticulous documentation, and coordination across security, legal, law enforcement, and mental health professionals. Operators who develop expertise in stalking response — understanding the threat assessment frameworks, the legal mechanisms available, and the protective strategies that evidence supports — position themselves to provide one of the most meaningful services in the protection profession: restoring a person's sense of safety in their own life.
About EP-CP
EP-CP (Executive Protection & Close Protection) is the command platform for security operations in Australia and the USA. Learn more or get early access.