Threat Intelligence·February 2026·17 min read

Nation-State Targeting of Politically Exposed Persons

An intelligence briefing on the methods employed by nation-state actors to surveil, compromise, and exploit politically exposed persons and their extended networks.

Executive Summary

Politically exposed persons face a threat landscape fundamentally different from that of other high-net-worth individuals. Nation-state intelligence services deploy capabilities far exceeding those of criminal threat actors, including zero-day exploits, advanced persistent threats, human intelligence operations, and sophisticated signals intelligence collection. This briefing examines the current methods employed by state-sponsored actors to target PEPs and provides defensive recommendations calibrated to this elevated threat level.

Threat Actor Profiles

Our analysis identifies four primary categories of nation-state interest in PEPs. Intelligence collection operations seeking to understand political decision-making processes and personal vulnerabilities that could enable coercion. Economic espionage targeting PEPs with access to sovereign wealth decisions or major infrastructure projects. Influence operations designed to manipulate PEPs' policy positions through compromising information or manufactured leverage. And counter-intelligence operations targeting PEPs suspected of facilitating intelligence activities on behalf of allied nations.

Technical Capabilities

Nation-state actors possess technical capabilities that render many standard security measures insufficient. Commercial-grade encrypted communications can be compromised through endpoint exploitation rather than cryptographic attacks. Mobile device security can be circumvented through zero-click exploits targeting messaging applications. Physical proximity operations — including hotel room entry, device interdiction during travel, and TEMPEST-style emanations collection — remain viable even against technically sophisticated targets. The distinction between a nation-state threat and a criminal threat lies not primarily in sophistication but in persistence, patience, and willingness to invest disproportionate resources.

Defensive Posture

Defending against nation-state targeting requires a fundamentally different security posture than protecting against criminal threats. Communications security must assume that endpoint devices are potentially compromised, leading to operational security practices borrowed from intelligence tradecraft. Physical security must account for sophisticated surveillance and close-access operations. Digital hygiene must be maintained to an extraordinary standard, with regular device replacement, compartmentalised communication channels, and strict information handling protocols. Most critically, PEPs must understand that their extended network — family, staff, advisors — represents the most likely avenue of indirect compromise.

Key Findings

Critical Intelligence

  • Zero-click mobile exploits remain the primary technical vector for PEP targeting
  • Extended network compromise (family, staff) preferred over direct targeting in 64% of cases
  • Hotel room entry and device interdiction remain active nation-state techniques
  • Commercial encrypted messaging provides insufficient protection against state actors
  • Average duration of undetected surveillance operation: 14 months

Recommendations

Actionable Guidance

01

Implement intelligence-grade operational security for all sensitive communications

02

Replace mobile devices on a regular rotation schedule

03

Conduct counter-surveillance assessments before and during sensitive travel

04

Extend security awareness and protocols to all family members and close staff

05

Engage specialist counter-intelligence advisory for high-sensitivity situations

Want the full picture?

Our complete intelligence archive and bespoke briefings are available exclusively to retained clients.