It built a reputation for daring, flexibility and a degree of lawlessness. The unit is provided with the best equipment money can buy and it is known it maintained a fleet of aircraft at Baltimore-Washington International Airport. Upon return to the Pentagon, he re-assigned the ACSI POC out of FOG-related issues. The unit's history, the politics that have shaped it and the operations it has carried out are recounted in great and fascinating detail. The ISA specializes in gathering human intelligence, signals intelligence and combat. By Almighty God and with honor, However, his several interventions and temporary blockage of many initiatives, showed that his primary intent was to arrest the development and contain the capability. Delta Force and SEAL Team Six were scrambled in preparation to liberate the hostages if needed, as the airplane hopped back and forth from Beirut to Algiers. Part of a Delta-DEVGRU task force, ISA provided intelligence on the whereabouts of Bosnian Serb war crimes suspects. Fort Belvoir, North Virginia, United States. The cover of these operatives is typically much harder to develop since it requires a reason to be in and out of the target country on a frequent basis, and to have inauspicious ties to the target country. Key was the requirement to develop a competent counter resolution force. Direct action differs from conventional offensive actions in the level of physical and political risk, operational techniques, and the degree of discriminate and precise use of force to achieve specific objectives."[1].
"In 1982, ISA SIGINT specialists took part in Operation Queens Hunter, a Seaspray operation in the skies above El Salvador, Honduras and Nicaragua. (Source). Geo, take a mandarin with you, the Cantor directed without looking at me. Known as the Confederate Air Force, a joke refencing their title, the Army of Northern Virginia. Sadly, the team's evaluation did not serve to upgrade American security standards, and a truck bomb exploded from within 40 feet of the embassy entrance later that year. They began forming their own plan for storming the airplane and liberating the hostages. Check, chief! and she yanked the gat our of my hand. (Source) The US military sought to carry out intelligence operations without the direct need of US intelligence agencies. Some of ISA's most recent deployments was in 1993 in Somalia. The Headquarters element of ISA is located in Fort Belvoir, VA but the squadrons and supporting elements are scattered across the Maryland/D.C./Virginia area. They are called upon to perform the toughest duties in the armed forces, and their actions directly affect the protection of America's freedom. (Source). It is tasked to collect actionable intelligence in advance of missions by other US special operations forces . When operatives are in less restrictive environments they can often be seen carrying weapons used by locals, most often in the form of AKs. (Source) Operatives must not look out of placeor easily recognizable. Lets just settle on Gray Fox for now, as these operators fill in the gray area between Title 50 intelligence gathering and Title 10 unconventional warfare operations. Funding was to be a joint undertaking. Candidates then are put through a battery of assessment and selection courses as well as background checks and psychological testing. Understanding all the following is necessary for successful infiltration: (Source). Originally referred to as Task Force Orange, other names have included Centra Spike, Torn Victor and Gray Fox. All Rights Reserved. The next morning arrived, but the moping mandarins came empty-handed: Ok, give me a rundown on the entire operation starting from when you arrived at the install site..
Working alongside SEASPRAY, a specialized aviation unit that would later form a part of Delta Force, the ISA would conduct aerial SIGINT operations to assist the Salvadoran Army against guerrillas. (Source) Sending agents that not only act, but look like the people of the country they seek to infiltrate makes for an even more effective cover. Candidates pulled from computer records, or by word of mouth were required to pass a tough selection course, physical and psychological tests. Grey Dynamics is a Private Intelligence firm based out of London with analysts, researchers, and investigators worldwide. The following article on the Intelligence Support Activity was copied from Specwarnet.net online. Once they arrived they took pictures of the embassy from every angle, recorded the types of locks on all doors, inside and outside, recorded the number of windows and exits, and created a blueprint of the building. "In late 1981, ISA agents were involved in the attempt to acquire a Soviet T-72 tank, which had obsessed intelligence analysts. Declassified documents on the Intelligence Support Activity (ISA) ". The ISAs execution of SIGINT monitoring was so successful that the month-long operation was extended to three years. Afghanistan: The Fox and The Anaconda. This is a potentially significant compromise. the Cantor lamented in earnest. to FOG, SOG, SAD, SMU, ISA, and, FID, the focus of which is the ISA through 2015. All information and multimedia on Specwar.info comes from a wide number of sources. Before it operated under the name ISA, the group was referred to as the Field Operations Group (FOG). The other half flew to Cyprus to join the rest of the rescue force. Then, Delta and SEAL Team 6 operators would make their way into the city in small groups and wait at safe-houses until the time was right. THANK YOU FOR SUPPORTING VETERAN JOURNALISM - JOIN SOFREP+ Get the weekly email from Grey Dynamics that makes reading intel articles and reports actually enjoyable. The Elite Within the Elite: A Guide to U.S. Special Forces The OSS was a direct action "group" that was directly involved in sabotage, infiltration, combat and even assassination. The Pentagon's Spies: Military Human Intelligence (HUMINT) Activities The negotiations were going so well that Iraq decided to throw in a Mil Mi-24 Hind D helicopter and a MiG-25 fighter-interceptor. The Cantor finally said something, and he said it very very loudly when the mandarins lost control of some weapons and encrypted radios. ISA has been known to utlizes signal skimmers to pick up enemy radio transmissions and zero in on their location. Cowan traveled the Lebanese countryside pinpointing the locations of Syrian anti-aircraft emplacements. What was needed was a SOF unit devoted to intelligence gathering and preparing the battlespace for other SOF operators. Operationally, the ISA is a dedicated intelligence group, doing the intelligence leg work for special operations groups. _gaq.push(['_setDomainName', '.specwar.info']);
ISA agents even managed to obtain Lebanese license plates, which would allow Delta to be parachuted in with their own cars, then 'legitimized' with the plates. Once inside, Centra Spike agents would plug in laptops into the airplane's power and could simultaneously track four frequencies. But if the copyright owners want to get in touch to have them immediately removed from this site then please contact our webmaster. 75th Rangers Working for CIA : Military - reddit The operation was codenamed Amber Star, and was a joint US-British-French-Dutch effort to apprehend the suspects. According to The Secret War by William M. Arkin, published in the Los Angeles Times on October 27, 2002, "The Army created a highly compartmentalized organization that could collect clandestine intelligence independent of the rest of the U.S. intelligence community and follow through with covert military action. As previously mentioned, its members cross train with the CIA, Americas most comprehensive civilian intelligence agency. The planners in DAMO-ODSO were acutely aware of the different legal authorities contained in Title 10 and Title 50 statutes.
Royal Cape, Granite Rock and Powder Keg were some, Centra Spike and Torn Victor being other possible cover names. In addition to covert operations, it provides the war on terrorism with the kind of so-called 'close-in' signals monitoring -- including the interception of cell phone conversations -- that helped bring down Colombian drug lord Pablo Escobar. The examples and perspective in this article, Learn how and when to remove this template message, "Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms", United States Army Special Operations Command, https://en.wikipedia.org/w/index.php?title=Direct_action_(military)&oldid=1081847487, This page was last edited on 10 April 2022, at 01:40. What is the difference between the Seasonal Tactical Fitness Periodization programs recently developed vs. previous years? International Security in Sub-Saharan Africa: An Interview with Dr. Niamh Gaynor, Transnistria and Russian Tensions: Moldova 12-month Forecast, Terrorist Threat in Senegal: A 12-month Forecast, Terrorist Threat in Guinea: A 12-Month Forecast, 7.3. The intelligence gathering part was named "Buckeye" and consisted of CIA, NSA and Torn Victor operatives. For the four main battalions, numbering in total over 300 operators, there are different roles members could fall into.
These intelligence gathering methods outline how intelligence is gathered and what is done with it afterwards. Codename: Gray Fox - Sicarius Prior to Saddams capture, over 40 members of his family were captured and interrogated to determine his whereabouts with little success. Special Recon, Direct Action. by Michael Smith Meyer was incensed at the lack of CIA interest/dedication/support to the rescue task and believed that was a major factor in the failure. Officially formed in 1980 as FOG then transitioning to the USAISA from 1981 to 1989, this unit now operates under changing names like Capacity Gear or Quiet Enable. ISA recommended covert deployment of its operatives to both airports to secure landing zones and infiltration routes. The ISA agent was ordered to stop the recording, an order to which he complied. The vast majority of their operations are clouded not just in shadow, but in complete darkness.
But what if I dont need signal intercept and intelligence gathering support for my mission?, Look, Geo theyre here, theyre queer, and theyd like so say hello just deal with it because theyre not going away. The ISA's HUMINT collectors gather information from human sources via coercion and interrogation depending on the asset. During the war on terror it was responsible for hunting hunting high value persons. The Department of Defense in 1965 outlined its need to be more involved with collecting intelligence, supported by Robert McNamara. Additionally, ISA operates a number of fixed and rotary wing aircraft and these pilots fit somewhere into the puzzle that is ISA. The breakdown of this squadron isnt known either but it likely contains logistical support for the two operational squadrons. 8 years' rapidly progressive experience with US Army and a DoD Contractor 4 years in direct support of conventional intelligence units 3 deployments in support of a SOF Task Force. As they soundly slept in the reverie of their grand plan, the Sandman and the Tooth Fairy happened by and found the car unlocked. The whole force drove north as planned, putting Kay and me upfront to clear ahead and report back to the assault force. One of their major tasks was to create 'pathfinders'. At one point during the Global War on Terror, ISA along with a component from the Airforce and Delta began to build a fleet of ISR aircraft. US News & World Report 7/6/98 - "Hunting war criminals: The first account of secret U.S. missions in Bosnia" by Richard J. Newman, https://www.sourcewatch.org/index.php?title=Intelligence_Support_Activity&oldid=305336, Creative Commons Attribution-NonCommercial-ShareAlike. Almost simultaneously, another truck bomb exploded in the French barracks, killing 56. The mission criteria were pretty simple: we would fail our mission if we missed reporting the generals car, or if we allowed someone to get around our blocking position and into the ambush site. There was a chain barricade that the Serbian police (MUPs) used to block access to a side road that junctioned with highway M4. This Intelligence Support Activity All-Inclusive Self-Assessment enables You to be that person. Reconnaissance overflights revealed a possible location where POWs, still believed to be held by the Vietnamese early in the year. However, due to the nature of ISAs mission, its operators are rarely likely to carry weapons into the field. Green Berets are considered unique from other special operators for various reasons, most . Its budget would be carefully concealed so that it never made a paper trail, and only a dozen officials would know the names and locations of all of ISA's agents and safehouses. More technical training on SIGINT, such as transmission and signals interpretation is also a component of the training. A Congressional hearing was held, and the media revealed the existence of a 'classified military intelligence unit'. "During the 1983 American invasion of Grenada, special forces units were plagued by lack of useful and up-to-date intelligence. Centra Spike was withdrawn in 1993 for a temporary assignment in Somalia to aid US special forces there, but resumed the hunt later in the year. Units in Sarajevo tracked Karadzic electronically, while other agents were on the ground in Pale, Karadzic's home. Under the guiding hand of JSOC, the ISA operated alongside other JSOC and CIA elements, under the codename Gray Fox. A declassified document provides background information about the Intelligence Support Activity (ISA ), a little known intelligence gathering unit that collects tactical intel for Joint Special Operations Command (JSOC) and other Special Operations units. ISA members conducted extensive interviews with Special Forces members in the country, Lebanese Army and CIA and embassy officials. The SEALs, SAS, and SBS added additional capabilities over time, responding to the needs of modern conflict.
(Source). One such organization, the Red Brigades, composed of far-left communist-leaning extremists, kidnapped U.S. Brigadier General James Dozier. Copyright 2023 | Site by 3C Web Services, by Rice University's Baker Institute for Public Policy, by Global Initiative Against Transnational Organized Crime, by Center for International Maritime Security (CIMSEC), by Strategic Perspectives 41, National Defense University, by Geneva Academy of International Humanitarian Law and Human Rights, by C/O Futures Terrorism Research Note Series, by PKSOI (Peacekeepimh and Stability Operations Institute), by Headquarters Department of the Army / Headquarters Marine Corps, Tactics and Operations Group, Deterring the Next Invasion: Applying the Accumulation of Events Theory to Cyberspace, TThe next big threat to AI might already be lurking on the web, Migrant Caravans: A Deep Dive Into Mass Migration through Mexico and the Effects of Immigration Policy, Managing Risk for Special Operations Forces in Large-Scale Combat Operations, The grey zone: Russia's military, mercenary and criminal engagement in Africa, Deadly Rio de Janeiro: Armed Violence and the Civilian Burden, North Koreas Political Warfare Strategy Has Failed: ROK U.S. Alliance Needs A Superior Strategy. The unit is organized into several elements. ". Access to that road saved a considerable amount of travel time for support for an ongoing mission. However, the CIA couldnt provide these answers so Delta turned to the FOG. During these operations, the ISA operated alongside other combat groups, providing them with signals intelligence support and field intelligence, including HUMINT. The CIA was leading extraordinary rendition operations in Somalia in conjunction with the ISA and the help of local warlords. Well, ok we arrived at just around 1630hrs and the mandarin began. When hostages were taken in the Tehran embassy in 1980, it became clear that FOG needed to become a larger group with more resources. This has been more visible in their operations in Afghanistan, Operation Winter Harvest and Operation Queens Hunter. (Source), The tactics and techniques of the ISA are some of the most unique among all the JSOC special operations groups. The ISA initially had only support activity and HUMINT gathering functions. Under the umbrella group of Joint Special Operations Task Force 20, the Intelligence Support Activity helped track down and locate Saddam Hussein. They marked secret infiltration routes and bases American forces could use if they were ever sent into the country. It has since changed names several times to avoid media publicity, having been alternately known as the Tactical Concept Activity, the Tactical Coordination Detachment, the Tactical Support Team, and the Studies and Analysis Activity (SAA), among other designations. Some solid intelligence gleaning prompted the community into action to capture PIFWC Serbian General S. Kladanj on his scheduled move out of Serbia proper into the Republic of Serbia. Since 2003, t. US Army Intelligence Support Activity (ISA) | Specwar.info The plan involved flying feet above the turbulent Mediterranean Sea, at night, through hostile airspace. Support Veteran Journalism . Working closely with Special Forces and the CIA, Gray Fox also places operatives inside hostile territory.
Gray Fox was formed in 1980 in response to the infamous failed rescue attempt of American hostages under Operation Eagle Claw in the Tehran embassy. The SIGINT group of the ISA gathered signal intelligence via aircraft, that was then passed on to NSA analysts. The unit is organized into several elements. The separation did not fit real world requirements which was finally recognized in the aftermath of the failed Iran rescue. Initially, the raid appeared to be a bust until a Delta operator kicked some debris on exfil. On the ground, these operatives can use a directional antenna programmed to pick up a specific cellphones signal, even if it was turned off, providing Delta Force with a target building to raid. But the poor Cantor had to suffer through the mandarin menace sure enough. ISA has gone by many names over the years but its current one is not public knowledge. Through their mastery of SIGINT, the ISA quickly got on the task of intercepting radio and telephone transmissions. Delta troop is tasked with countries that are a softer target for infiltration such as the Philippines or Morocco. Each chapter of the book brings a new chapter of the Activity's operations like Lebanon, where its efforts to rescue US hostages was stymied by its own government or Bosnia where it hunted down war criminals. Enterprise Scalable Data Center Groundbreaking Ceremony ISA: Soldier Spies of the Intelligence Support Activity During the operations training course, candidates are taught infiltration techniques, advanced air operations, offensive and off-road driving, personal defensive measures and communications. They require units with combinations of trained specialized personnel, equipment, and tactics that exceed the routine capabilities of conventional military forces. So where are the pilots? America's Most Elite Special Forces - msn.com Meyer was determined that no future SOF OP with Army forces would be conducted absent credible quality CIA/DOD/NSA and Army intelligence. Moscow Should Prepare For Probable US Nuclear Aggression: Reports Russian Military Journal, Destroying American Monster Abrams: Pro-Russian Group Release A How-To Video, Dr. Mary E. Walker: The First AND Only Female Medal Of Honor Recipient, Bakhmut on the Brink of Falling to Russian Troops, Decorated Navy SEAL Died in HALO Training Accident, Adam Brown: A SEALs Life of Courage and Redemption, Complete List: Ticonderoga-class Missile Cruisers To Retire By 2027, Nuclear Close Calls That Nearly Caused World War III, Russian Sausage Millionaire and Putin Critic Falls to His Death in India, Deadly Russian Rifle Brigade Wiped Out During War in Ukraine. Killer Elite The forms of intelligence gathered by the Activity include: The Activity is thought to made up of around 300 operators and is under the command of JSOC (Joint Special Operations Command). A case officer is someone who handles a foreign asset by giving them collection requirements and ensuring their safety. To lawyers, this is a distinction with a difference. The ISA also has likely integrated other new intelligence fields into its scope. The monitoring of guerilla factions allowed the Salvadoran Army to successfully defend against their attacks. and other specialized capabilities to support Army, joint, unified action partners, and the U.S. intelligence commu-nity. Every modern military relies on intelligence, and the US military is a voracious consumer of intelligence, from both an analytical and functional standpoint. How do you guys block?, I dont know how you guys operate. While the nerdiest Green Berets and special operators comprise the bulk of ISA, there are also non-traditional operatives who have not passed the selection course. Now, shes a third-term Virginia congresswoman. The Cantor sent me out as usual to throw the lock, wait for our operational vehicle to pass, then shut it again. A DOD lawyer was assigned to the development planning, and Col Jerry King (MG Vaught's Chief of Staff for the Iran JTF) became the first head of the FOG. The DCS, G-2 is the Director of the Operational Environment Enterprise (OEE) and author of the Army's approved current Operational Environment (OE). Intelligence Support Activity - Role The Activity's primary role is to gather actionable intelligence in order to pave the way for special operations undertook by units such as Delta Force (known as 'operational preparation of the battlespace'). find out more Bickering between the CIA and JSOC further complicated matters. Intelligence Support Activity | Military Wiki | Fandom Key to the concept was that there would be a single in-house element (FOG) that either side could use e.g. Killing Pablo by Mark Bowden Escobar was shot as he was trying to escape from the roof of his house. Special Operations (SO) encompass the use of small units in direct or indirect military actions focused on strategic or operational objectives.
The United States Army Intelligence Support Activity ( USAISA ), frequently shortened to Intelligence Support Activity or ISA, and nicknamed The Activity is a United States Army Special Operations unit originally subordinated to the US Army Intelligence and Security Command (INSCOM). The order never came; a secret arms-for-hostages deal was cut by the American government. Intelligence Support Activity | The Activity | Gray Fox geo sends. A vehicle on time and on target rolled through the barricade. })(); Intelligence Support Activity provides US special forces with intelligence gatherers, man hunters, assassins and deep penetration agents. Highly recommended. Additionally, these operative can remotely turn on a cellphone thats been turned off, which allows them to hear everything going on near it. This extends beyond knowledge of things like general location, language and culture. "Apparently, ISA's direct action element was also put on alert during the hijacking of the Italian cruise ship, Achille Lauro. "ISA was also rumoured to be operating in Bosnia in the last few years under the code-name Torn Victor. With the expansion, the FOG has renamed the ISA and officially established as a unit on January 29th, 1981. Lawyers for both Titles within the respective DOD and CIA bureaucracies, fought to preserve their interpretations of applications, to prevent one department from intruding into the territory of the other. Title 10 is the broad statute regarding what DOD is authorized to do. It's a Special Mission Unit and conducts highly classified operations. They must maintain a demeanour of trustworthiness and calmness, so any approached HUMINT sources feel safe and trusted. Bravo and Delta troops utilize commercial or non-official cover. The mandarins decided they were much too tired and sleepy to unload their car to safekeep all of their sensitive items in the house with them. Russia's Spetsnaz combines DA and SR units. Why America's Special Forces Are so Unique and Deadly Intelligence Support Activity - Wikipedia PDF National and Joint Intelligence Support - United States Army The Activity grew out of the need for specialized intel support for US Special Operations that was highlighted by the failed US attempt to rescue American hostages from Iran in 1980. Initially, Delta Force turned to the CIA for information regarding the number of guards, how they were armed and what security measures they had in place. by Michael Smith All Rights Reserved, Click to share on Facebook (Opens in new window), Click to share on Twitter (Opens in new window), Click to share on LinkedIn (Opens in new window), Click to share on Reddit (Opens in new window), Click to share on WhatsApp (Opens in new window), Click to share on Pocket (Opens in new window), Click to email a link to a friend (Opens in new window). WOAH, WOAH, WOAH! the Cantor interrupted, youre telling me you put in the camera in daylight hours, and now everyone is supposed to be surprised and sympathetic that its gone?. The survey was successful, which led defense officials to create ad hoc Special Forces units to survey US embassies in hotspots around the world. The Beechcrafts were made to appear normal from the outside, save for a wingspan six inches longer. These operatives were responsible for helping take down insurgent networks in Iraq. Operators from the unit entered Nicaragua using false passports, and proceeded to photograph the embassy from every angle, record the types of locks on all doors, inside and outside, record the number of exits and windows, and finally drew up the internal layout of the building. While Delta and DEVGRU focus on direct engagement and specialized combat tactics, the ISA conducts intelligence and espionage operations at a tactical level. Every component of the US military was involved in the Invasion of Afghanistan, including the ISA. And now somebody SOMEBODY knows that somebody is recording all the cars turning down that specific road. It was a body of men and women first sent to Japan to study Ninjitzu, then on to Chinas Shao Lin Temple to study Kung Fu, then finally to Iran to study the ways of the Immortals under the former King of the Persian Empire, Xerxes the Great. This Army Special Operations unit, goes by many names, which is indicative of the various activities, functions and environments performed by these operators. Special Air Service (SAS) |
These operatives mirror the function of CIA case officers and even go through CIA training at the Farm in Virginia. The operation went smooth up until the force rolled away. (Source) This allowed the forces involved in the surrounding Shahikot Valley to be more informed of enemy movements and positions. Members of FOG infiltrated Nicaragua using false passports. (Source). The ISA wasn't popular within JSOC. I grabbed assault rifles and ammo can from our stash in the attic of the safe house and reluctantly handed one to Kay-Kay: You keep this damned thing on safe at all times! In Evaluating Immunities before a Special Tribunal for Aggression Against Ukraine, the Type of Tribunal Matters, Chinas Ferry Tale Taiwan Invasion Plan Is A Legal Nightmare, China Maritime Report No. In effect, the ISAs exploitation of signal intelligence saved the lives of 100s of US soldiers from the 10th Mountain and 101st Airborne divisions. The selection process and training for special operations groups are secret. ga.src = ('https:' == document.location.protocol ? Both sides would work together on developing the intel, and then a decision would be made regarding a specific operational tasking to avoid statutory conflict.