Overview Active Service

Stalking and targeted harassment represent a growing threat to high-profile individuals, executives, NGO personnel, and their families — both in domestic and international operating environments. HTMA provides discreet, professional counter-stalking services that identify, assess and neutralise stalking threats before they escalate.

Our consultants combine intelligence tradecraft, surveillance expertise, and legal coordination to deliver end-to-end protection against persistent, targeted threat actors.

Core Value
Early identification and intelligence-led intervention are the most effective tools against stalking. HTMA's approach is proactive, discreet, and tailored to the individual threat environment.

Types of Stalking Threat Landscape

Stalking and targeted harassment take many forms. Understanding the nature of the threat is the first step in effective mitigation.

  1. Physical Surveillance Stalking

    Persistent physical monitoring of a target's movements, routines and locations by an individual or group.

  2. Cyber Stalking

    Online harassment, tracking of digital footprint, and exploitation of social media and location data.

  3. Corporate Stalking

    Targeted harassment of executives or staff by disgruntled former employees, competitors, or activist groups.

  4. Proxy Stalking

    Use of third parties, including unwitting contacts, to gather information on or harass the target.

  5. Fixated Threat Actors

    Individuals with an obsessive focus on a specific person, often requiring specialist threat assessment and management.

Our Approach Methodology

HTMA's counter-stalking methodology is built on intelligence-led threat assessment, supported by discreet surveillance and close coordination with legal and law enforcement channels where appropriate. Every engagement is handled with absolute confidentiality.

  1. Threat Assessment

    Detailed profiling of the suspected stalker, their motivation, capability and likely escalation trajectory.

  2. Digital Footprint Review

    Audit of the client's online exposure and identification of data points being exploited by the threat actor.

  3. Counter-Surveillance

    Deployment of trained operatives to detect, document and disrupt surveillance activity.

  4. Protective Intelligence

    Ongoing monitoring of the threat actor to provide early warning of escalation.

  5. Legal Coordination

    Preparation of evidence packages for law enforcement and legal proceedings, and coordination with specialist legal advisors.

Capabilities What We Offer

Threat Actor Profiling Counter-Surveillance Digital Footprint Analysis Protective Intelligence Evidence Documentation Legal Coordination Route Security Residence Security Review Family Protection Planning Online Harassment Mitigation

Get in Touch

Request a Consultation

Use the form below to get in touch.