Counter-Surveillance and Evidence Gathering in Stalking Cases

The recent sentencing of Karl Chads for stalking and attempting to assault a woman in Watford highlights how quickly harassment can escalate from unwanted contact to serious physical danger. In this case, the offender broke into the victim’s home, demonstrating how digital intimidation can develop into direct invasion.
Once a stalker has identified a victim’s location, it is rarely their only method of monitoring. Many use hidden cameras, listening devices or GPS trackers to collect information and track movement. These tools are easily available and often go unnoticed until significant harm has already been done.
At Conflict International, we see this pattern frequently. Our Technical Surveillance Counter Measures (TSCM) services are designed to identify and remove these hidden threats, providing a crucial line of defence that traditional security measures often overlook.
Closing the Protection Gap
According to the Crime Survey for England and Wales, around 1.5 million adults experienced stalking in the year ending March 2024. However, only 129,000 incidents were recorded by police. This gap between experience and reporting reflects a wider issue: the time between the first signs of harassment and formal intervention can be dangerously long.
Police resources are limited, and investigative action often depends on the collection of sufficient evidence. During that waiting period, victims are left exposed. This is where private intelligence and counter-surveillance services play an essential role.
Conflict International’s work bridges this gap by gathering verifiable evidence and implementing protective measures before the situation escalates further. Our approach provides both safety and the documentation required to support legal proceedings when law enforcement becomes involved.
How Professional Counter-Surveillance Protects Clients
Our investigations are structured to identify, document, and disrupt stalking activity at every stage.
1. Confirming the Threat
Early signs of stalking—messages, calls, or online contact—should be taken seriously. Our investigators confirm the source of unwanted communication, assess behavioural patterns, and establish whether the activity indicates fixation or deliberate targeting. Turning assumptions into evidence is the first step towards effective protection.
2. Identifying Intrusion
When behaviour progresses to physical approaches, unwanted gifts, or attempts to enter private property, we investigate how personal details were obtained and where security may have been compromised. This may involve discreet surveillance to record stalking activity or data tracing to determine how information was accessed.
3. Building a Case for Action
Every incident is documented to evidential standards. This includes communications, movements, threats, and any form of intrusion. The resulting portfolio provides a clear, chronological record that can support legal teams and accelerate police involvement.
Neutralising Hidden Threats
The use of covert devices is now a common feature in serious stalking cases. Counter-surveillance sweeps are a vital measure in removing this risk.
Conflict International’s TSCM specialists use advanced detection technology to locate and neutralise electronic devices designed to monitor or record without consent. This process typically includes:
- Electronic Sweeps: Comprehensive examinations of properties, vehicles, and workspaces for concealed transmitters, microphones, and hidden cameras.
- GPS Tracker Detection: Inspection of vehicles and personal belongings for unauthorised tracking devices.
- Digital Security Audits: Assessment of smart devices and networks to ensure they have not been compromised.
- Forensic Handling: Secure collection and preservation of recovered devices for use in legal proceedings.
Removing these devices restores privacy and cuts off a stalker’s access to real-time information. It also provides tangible proof of intrusion, strengthening both police investigations and protective orders.
Evolving Risks in a Connected World
Modern stalking rarely occurs in isolation. Offenders now combine online harassment, identity misuse, and physical tracking into a single, sustained campaign. Affordable surveillance technology, available through mainstream online retailers, has made this behaviour easier to carry out and harder to detect.
Recent cases, such as those involving Matthew Hardy and Farah Damji, illustrate how offenders use both digital and physical surveillance to intimidate and control their victims. These examples underline the importance of professional investigation and counter-surveillance in addressing complex, technology-enabled threats.
Acting Before Escalation
Stalking is dynamic and often unpredictable. Waiting for clear evidence of criminal activity can allow a situation to deteriorate quickly. Proactive counter-surveillance and investigation provide an early line of defence, offering reassurance and control when it is most needed.
Conflict International delivers discreet, evidence-based support for individuals and organisations facing targeted threats. Our integrated investigative and TSCM services help clients take immediate, practical steps to restore safety and protect privacy.
For confidential assistance or to arrange a counter-surveillance sweep, contact Conflict International.