
Frequently asked questions
What does FRYA actually do?
FRYA is a private intelligence and protective services division built exclusively for women. We deploy trained operatives — drawn from government intelligence and special operations backgrounds — into the environments where threats to your safety, reputation, assets, and relationships originate. We identify hostile intent before it matures into action, and we do it without altering the world around you. Every operation is legally governed, executed with absolute discretion, and designed to prevent harm rather than respond to it after the fact.
Who is FRYA for?
Women whose visibility, wealth, influence, or public profile creates exposure that conventional security cannot address. This includes founders, executives, public figures, women navigating high-net-worth family structures, and women whose personal circumstances — a divorce, a business dispute, a new relationship, a public role — have placed them in a position where the threats are real but invisible to the people around them.
How is FRYA different from a security firm?
Most security firms were built around a reactive model: something happens, then professionals are called to respond. Their tools are guards, cameras, and investigators. FRYA operates on a fundamentally different model — the same intelligence-driven approach used to protect heads of state. We position trained operatives within the environments where threats are conceived and developed. We gather intelligence through access, relationships, and presence. We identify intent before action. A guard at your gate cannot detect the advisor quietly repositioning against your interests, the relationship designed to extract assets, or the fabricated media being assembled to damage your reputation. An operative trained in human intelligence collection can.
What kinds of threats does FRYA address?
Stalking and escalating fixation. Romance fraud and relationship-based asset extraction. Fabricated intimate imagery and synthetic media weaponization. Coercive control disguised as romantic attention. Coordinated reputation attacks designed to look organic. Insider threats from trusted advisors, staff, or associates. Corporate espionage targeting your business interests. Extortion. Doxxing. Harassment campaigns. And the threats you suspect but cannot yet name — the ones that feel coordinated but have no visible source.
Why are the threats different for women?
Women in high-profile positions receive 27 times more abusive content online than men in equivalent roles. They are disproportionately targeted through intimate relationships, image-based abuse, and coercive control. The security industry was built around male threat models, male operatives, and male assumptions about what danger looks like. The result is a global market that systematically underserves the women who face some of the most complex, persistent, and psychologically damaging threats in the modern landscape. FRYA was built to close that gap.
What happens when I make contact?
You request a confidential briefing. A senior member of the FRYA team speaks with you — or with your legal counsel, PA, or trusted advisor if you prefer — through a secure channel. We listen. We assess. If there is a basis for engagement, we design an operational approach specific to your situation. There is no obligation. The conversation itself is protected by the same standard of discretion that governs all VORDR operations.
Can someone contact FRYA on my behalf?
Yes. Many engagements are initiated by a lawyer, family office principal, personal assistant, or trusted advisor acting on behalf of the client. We are structured to work with intermediaries and to protect the client's identity throughout the process.
Where does FRYA operate?
Worldwide. Our operational infrastructure spans multiple jurisdictions. Secure transport — aviation, maritime, and helicopter — extends protection seamlessly across borders. Our operatives deploy wherever the threat landscape requires, governed by local legal frameworks and supported by counsel in every jurisdiction of operation.
How is my privacy protected?
Your engagement, your concerns, and your identity are known only to those with a direct operational need. We do not disclose clients, engagements, or methodologies outside the operational chain of command. Every communication channel, every report, and every operational decision is designed to protect your anonymity with the same rigor applied to your safety. We leave no footprint. Your privacy is not secondary to the mission — it is the mission.
What does an engagement cost?
Engagements are structured as retainers, scaled to the scope and complexity of the threat landscape. A confidential briefing carries no obligation and no cost. Pricing is discussed directly and only after we understand your situation.
