Explore Enterprise Risk Management Services

Crisis24

Article

Real-Time Intelligence Meets Real-World Operations: Stories from the Field

9 JUL 2025

/

4 min read



Crisis24 - Private Strategic Group - PP

A Q&A with Ryan Martin, Vice President of Operations, Crisis24 Private Strategic Group

When intelligence feeds operations in real time, threats can often be anticipated and neutralized before they materialize. In this Q&A, Ryan Martin, Vice President of Operations for Crisis24’s Private Strategic Group, shares a few stories from the field to show how a proactive, adaptive security posture plays out in the real world – and transforms client outcomes when it matters most. 

Q&A

Q. Can you walk us through a moment when timely intelligence reshaped the outcome of a potentially dangerous situation – one that might have escalated without early insight?

A. A few years ago, during multi-thousand-person protests in Manhattan, one of our principals – this was an individual who enjoyed long, unscheduled walks through the city – was able to set out without disruption, thanks to constant coordination between the protective intelligence team and the agents on the ground. 

As protest routes shifted and tensions escalated, our analysts monitored developments in real time, tracking the location of the principal and their protective detail as they moved through the city. When the team began to approach street closures or areas of heightened unrest, intelligence analysts provided advance warning via radio, steering them around potential flashpoints. Rather than having to stop and check a phone or navigate unfamiliar disruptions on their own, the agents received clear, real-time direction, allowing them to maintain both discretion and focus on the principal.

The walk continued uninterrupted. The principal remained unaware of how close they had come to potential danger. This kind of seamless, silent coordination – intelligence actively guiding operations – demonstrates the power of an integrated model. It’s not only about reacting once a threat becomes visible; it’s about staying far enough ahead that it never materializes.

 

Q. Can you describe a time when real-time intelligence gave the operations team a crucial head start, turning what could have been a high-risk situation into a well-executed response?

A. At a high-profile wedding set in a secluded but scenic location, our protective intelligence analysts flagged an unusual spike in helicopter bookings: nearly every aircraft within a 50-mile radius had been rented out. This raised an immediate red flag, and soon the cause became clear: paparazzi were mobilizing to capture unauthorized aerial footage of the event.

The intelligence was quickly relayed to the protective team on the ground, who briefed the principals. Despite the increased threat to their privacy, the couple was set on holding the ceremony outdoors and asked the team to avoid activating the contingency plan – a covered tent –unless absolutely necessary. Rather than forcing a change, our intelligence analysts went to work, monitoring helicopter flight paths and estimating fuel loads by make and model. This allowed the team to predict how long each aircraft could remain in the air. With that insight, the operations team and event planners were able to identify a short window when air traffic would be minimal. The ceremony was precisely timed to that quiet moment.

Guests were unaware of any disruption, and the event proceeded smoothly, followed by a swift, discreet transition indoors before helicopters returned. Without that level of real-time coordination between aerial intelligence and on-site operations, the couple’s most important day would likely have been compromised.

 

Q. Have you seen a case where digital intelligence revealed a threat—something that required an immediate operational response to protect a client or their family?

A. Ahead of a high-profile keynote speech by one of our principals, our cyber intelligence team picked up early chatter across social platforms. A loosely organized activist group was discussing plans to disrupt the event; not with violence, but with enough coordination to raise concern. Their goal was visibility for their cause, but their approach risked reputational fallout for our principal and general event disruption.

That intelligence was quickly relayed to the protective team on the ground. Working in tandem with local law enforcement, the team expanded coverage and revised the entry and exit strategy for the principal. The principal was also briefed and given options: delay the speech, adjust public exposure, or proceed as planned with enhanced precautions.

Ultimately, the event moved forward without incident, but with full situational awareness and contingency measures in place. What could have been a public embarrassment, or worse, was neutralized by the rapid coordination between cyber analysts and the security team on-site.
It’s a reminder that in today’s world, threats don’t always come from physical proximity. They often start in the digital domain, and when detected early, they give protective teams the time and space to act with confidence.

 

Q. Have you ever uncovered a vulnerability a client didn’t know existed, or a threat stemming from within their own network?

A. Absolutely, and it happens more often than many would think. One case stands out. During a routine technical surveillance countermeasures (TSCM) sweep at a principal’s residence, our team discovered what looked like a standard mobile device charger. But inside, it contained embedded hardware linked to Chinese malware. The device had been purchased by a family office staff member through a third-party seller on Amazon. This seemingly harmless action could have created an open door to the residence’s digital ecosystem. If this had gone unnoticed, the consequences could have been serious.

This incident prompted an immediate review of purchasing protocols and a round of digital security awareness training for household staff. It also reinforced a broader truth: the most significant vulnerabilities often come not from adversaries with direct access to the principals, but from small, everyday exposures introduced by trusted insiders such as staff, family members, or even guests. It was a clear example of how technical intelligence, paired with operational readiness, can surface hidden risks before they become active threats.


Learn more about leveraging our industry-leading regional and subject matter experts for intelligence and crisis response that helps your organization stay ahead of risks to your people and operations.   

PROFOUND
PEACE OF MIND, 
IT SUITS YOU

Submit a preliminary application to learn more about  the full benefits of membership.