intelligence support activity direct action

Covert operations are shrouded in plausible deniability. So there they were sitting in our Tactical Operations Center in Bosnia waiting to be integrated into our PIFWC hunting operations. The CIA was leading extraordinary rendition operations in Somalia in conjunction with the ISA and the help of local warlords. This extra length concealed the main eavesdropping antennas, while others could be lowered from the belly while in flight. INSCOM's functional brigades and groups may provide general support, general support reinforcing, or direct sup-port to theaters through intelligence reach, or they may be The US recognized the usefulness of this unit and began surveying embassies across the world. However, the CIA couldnt provide these answers so Delta turned to the FOG. Highly detailed knowledge of an infiltration location is also key. The exact makeup of ISAs force structure is hard to determine. Every component of the US military was involved in the Invasion of Afghanistan, including the ISA. A Congressional hearing was held, and the media revealed the existence of a 'classified military intelligence unit'. The ISA differs from its brother and sister task forces in that it is not primarily a combat-oriented team, excelling in HUMINT and SIGINT operations that allow it to provide extremely valuable intelligence to other military elements. Lets just settle on Gray Fox for now, as these operators fill in the gray area between Title 50 intelligence gathering and Title 10 unconventional warfare operations. The unit was raised in 1979 as the Foreign Operating Group (FOG), who was created to overthrow the Nicaraguan dictator Anastasio Somoza. They also noted the specific funding line and agreed to manage it as a priority classified line absent committee discussion. (Source) Sending agents that not only act, but look like the people of the country they seek to infiltrate makes for an even more effective cover. Things became more complicated though, as the airplane took on more terrorists and weapons on one of its hops to Beirut, and Algerian authorities refused Delta permission to mount a rescue on their soil. It was Delta Forces first mission and a horrific failure. (Source). non-covert action intelligence activityoften a collection programto be of such sensitivity that 1 Oral notifications shall be followed by a written notification. (Source) This allowed the forces involved in the surrounding Shahikot Valley to be more informed of enemy movements and positions. Before it operated under the name ISA, the group was referred to as the Field Operations Group (FOG). It later took on other roles like SIGINT as battlefield requirements changed over time. Law and the killing of a Russian propagandist: Some Q & A BY CHARLIE DUNLAP, J.D. The ISA has gone by many name: Intelligence Support Activity or Mission Support Activity, and nicknamed The Activity, Task Force Orange . They were so adept that observers commented they could literally pluck information from the air, speaking not only to the revolutionary use of SIGINT but also the skill of the ISA. Then, Delta and SEAL Team 6 operators would make their way into the city in small groups and wait at safe-houses until the time was right. Tools like radios, computers and lockpicks are much more crucial to the success of its missions. Additionally, these operative can remotely turn on a cellphone thats been turned off, which allows them to hear everything going on near it. To operatorsnot so much. Both were doing the same thing in Colombia, except Centra Spike was doing a better job, at a much lower cost. Me, I dont like to be on the delivery end of harsh criticism; however, I do find that whole situation with the mandarins to be just ever so slightly south of sensational, and fairly fundamentally novice! Delta Force and SEAL Team 6 operators on the loose? })(); Intelligence Support Activity provides US special forces with intelligence gatherers, man hunters, assassins and deep penetration agents. (Source) Operatives must not look out of placeor easily recognizable. The ISA initially had only support activity and HUMINT gathering functions. A key driver for the meeting was the recognition that quality operational intelligence was virtually non-existent. As with any clandestine unit, only so much can be known about any of the JSOC special mission units. On the one occasion where he accompanied DSCOPS representatives to the Hill for a closed classified session regarding FOG activities, he voiced his concern regarding management, where the Committee Chairman, in plain, but polite language, told him that the Committee was satisfied with the arrangements. Dozier was taken hostage and mistreated, with the Red Brigades viewing him as an ideological foe that needed to be made an example of. They set up protection for the president and installed a security system. Talk about close target recce. Thats pretty frickin ballsy. Two people with a lockpick kit and a camera. All information and multimedia on Specwar.info comes from a wide number of sources. ISA members are often multilingual. However, through OSINT collection we know that there are three primary squadrons: Sometimes referred to as HUMINT or Ground squadron, Operations Squadron functions as ISAs HUMINT collection squadron. And with that our boss, the Cantor, doled out a mission for a two-man team of mandarins. It was agreed that FOG would be a Joint organization and roles and tasks were developed for eachalways mindful of the Title 10/50 issues. It is not certain that ISA operators were on the scene at the moment of his capture, but the operational intelligence provided was critical to the success of the operation. Mission. Grey Dynamics is a Private Intelligence firm based out of London with analysts, researchers, and investigators worldwide. Direct action differs from conventional offensive actions in the level of physical and political risk, operational techniques, and the degree of discriminate and precise use of force to achieve specific objectives."[1]. The TRADOC DCS, G-2 develops, describes, and delivers the OE in order to support the Army's preparations to fight and win the nation's wars. Operatives infiltrated internet cafes in Baghdad and conducted flyover operations in aircraft filled with signal interception gear. What was needed was a SOF unit devoted to intelligence gathering and preparing the battlespace for other SOF operators. "Today, the ISA operates under the code name Gray Fox. Intelligence Support Activity - Role The Activity's primary role is to gather actionable intelligence in order to pave the way for special operations undertook by units such as Delta Force (known as 'operational preparation of the battlespace'). The Activity grew out of the need for specialized intel support for US Special Operations that was highlighted by the failed US attempt to rescue American hostages from Iran in 1980. Failed Clandestine operations, usually result in some form of USG explanation. Nowadays the ISA focuses on the preparation of the battlespace for military operations across the globe. The rescue force was forced to launch with sketchy data forcing a worst-case force list. A case officer is someone who handles a foreign asset by giving them collection requirements and ensuring their safety. They marked secret infiltration routes and bases American forces could use if they were ever sent into the country. In line with their proficiency in infiltration, they had an array of passports, credit cards and falsified documents to allow easy movement between territories. The exact breakdown of this squadron isnt known, however it is a reasonable assumption that its divided into troops based on the specific mission, such as airborne SIGINT or ground SIGINT. When conducting more integrated operations with other parts of the military, the skill of intelligence support comes into play. Based on photos of ISA operatives and reasonable assumption, they are most likely to carry: For a unit like ISA, firearms are not its primary weapons. And now somebody SOMEBODY knows that somebody is recording all the cars turning down that specific road. Title 10 is the broad statute regarding what DOD is authorized to do. "When the first rescue attempt of the hostages in Iran failed, a second attempt, code-named Honey Badger, immediately started. Originally referred to as Task Force Orange, other names have included Centra Spike, Torn Victor and Gray Fox. to FOG, SOG, SAD, SMU, ISA, and, FID, the focus of which is the ISA through 2015. Special Operations Forces are the elite commandos of the U.S. military. Since 2003, t. With it, they had a unit of military spies able to covertly infiltrate a country and provide hands-on, critical intelligence, as well as to raise logistical support for counter-terrorist commandos in case of a crisis. The breakdown of this squadron isnt known either but it likely contains logistical support for the two operational squadrons. "In May 1982, Deputy Secretary of Defense Frank Charles Carlucci III called the ISA 'uncoordinated and uncontrolled.' The forms of intelligence gathered by the Activity include: HUMINT (HUMan INTellgence) Parsing one from the other can be quite difficult and largely determined by the location and nature of the target. If successful, the candidate would then continue training within ISA in such skills as parachuting, survival, weapons and intelligence gathering. The whole force drove north as planned, putting Kay and me upfront to clear ahead and report back to the assault force. Clothing worn by locals, even in specific areas. Now, shes a third-term Virginia congresswoman. (Source) Training involves different espionage and intelligence methods that allow ISA members to carry out their essential HUMINT operations. Infiltration relies much less on stealthy engagement, and much more on subtlety and effective tradecraft. Delta was finally given the go-ahead and flew to Sicily and Cyprus along with Task Force 160 and Seaspray helicopters, thus ending the need for ISA's help. The most important thing to know is that intelligence drives "direct action" operations. "The ISA's origins are in the Foreign Operating Group (FOG), whose origin in turn is in the 1979 overthrow of Nicaraguan dictator Anastasio Somoza. These operatives were responsible for helping take down insurgent networks in Iraq. During these operations, the ISA operated alongside other combat groups, providing them with signals intelligence support and field intelligence, including HUMINT. Intelligence Support Activity > Service branch: Army > Also known as: Gray Fox, ISA, USISA, The Activity . It was provided with a cover name, Tactical Concept Activity, and would never be acknowledged by the Pentagon. (Source) Once the safe house was located, using a mixture of SIGINT, GEOINT and HUMINT, a raid was initiated. Under the guiding hand of JSOC, the ISA operated alongside other JSOC and CIA elements, under the codename Gray Fox. The strategists decided the best option would be to send an ISA team in to provide accurate intelligence on the situation, and to prepare to secure landing zones for a Delta rescue force. What is the difference between the Seasonal Tactical Fitness Periodization programs recently developed vs. previous years? FORT SHAFTER, Hawaii -- Leaders from the U.S. Army Intelligence and Security Command (INSCOM) G-6/Ground Intelligence Support Activity (GISA) and the U.S. Army Corps of Engineers (ACoE) Honolulu . The vast majority of the ISAs operations in Afghanistan are still classified. But the poor Cantor had to suffer through the mandarin menace sure enough. The selection process and training for special operations groups are secret. These operatives have a cover in the commercial sector, typically as an international businessperson. However, our personal favorite is a toss-up between Cemetery Wind and Gray Fox. (Source). "In 1984, political instability swept through the Seychelles, a group of islands off the coast of Africa. The unit's history, the politics that have shaped it and the operations it has carried out are recounted in great and fascinating detail. by Michael Smith Within these battalions, there is a cyber ops teams, technology ops teams and mission support teams. But, ISA also sponsored a private rescue mission by Vietnam War veteran Bo Gritz, providing him with thousands of dollars worth of communications equipment, cameras, along with plane tickets and intelligence photos. On December 2, 1993, with help from Centra Spike and a mobile Colombian surveillance team, Escobar's hideout was pinpointed, and Colombian police moved in. Operators from the unit entered Nicaragua using false passports, and proceeded to photograph the embassy from every angle, record the types of locks on all doors, inside and outside, record the number of exits and windows, and finally drew up the internal layout of the building. The cyber operations team extends into other offsets of intelligence gathering, including OSINT, cyber threat intelligence and cyber warfare. Intelligence picked up reports that the two, along with other Sudanese officials were the targets of Libyan-sponsored terrorist assassinations. Understanding all the following is necessary for successful infiltration: (Source). Intelligence Support Activity The Army's most obscure special-ops unit is the roughly 300-strong Intelligence Support Activity, formed in 1981, which has gone by various codenames over the years. This extends beyond knowledge of things like general location, language and culture. The unit would be immediately deployed to any country where a terrorist act against the United States had taken place, and would start providing critical intelligence, as well as setting up landing zones and infiltration routes for the counter-terrorist force. "Known as the Intelligence Support Activity, or ISA, when it was established in 1981, this unit fought in drug wars and counter-terror operations from the Middle East to South America. Intelligence Support Activity provides US special forces with intelligence gatherers, man hunters, assassins and deep penetration agents. Colonel Jerry King retained his position as the head of the group, now 100-strong and headquartered in a nondescript building in Arlington, Virginia. According to The Secret War by William M. Arkin, published in the Los Angeles Times on October 27, 2002, "The Army created a highly compartmentalized organization that could collect clandestine intelligence independent of the rest of the U.S. intelligence community and follow through with covert military action. With the expansion, the FOG has renamed the ISA and officially established as a unit on January 29th, 1981. 25: More Chinese Ferry Tales: China's Use of Civilian Shipping in Military Activities, 2021-2022, Hospital Ships: A Vital Asset for SOUTHCOM and South American Navies, The Goshen Massacre and the Specter of Cartel Spillover Into the US, Dangerous Alliances: Russias Strategic Inroads in Latin America, Year Ahead Emerging Technologies and the Collection of Battlefield Evidence, How Does Matter Matter In International Conflict and Security? It built a reputation for daring, flexibility and a degree of lawlessness. Samuel is a King's College graduate with an MA in War Studies. A vehicle on time and on target rolled through the barricade. . Does the army's intelligence support activity also do direct action? The ISA agent was ordered to stop the recording, an order to which he complied. Get the weekly email from Grey Dynamics that makes reading intel articles and reports actually enjoyable. One problem that plagued the first attempt was the lack of valuable intelligence. As such discussing their capabilities is frowned upon. The examples and perspective in this article, Learn how and when to remove this template message, "Joint Publication 1-02 Department of Defense Dictionary of Military and Associated Terms", United States Army Special Operations Command, https://en.wikipedia.org/w/index.php?title=Direct_action_(military)&oldid=1081847487, This page was last edited on 10 April 2022, at 01:40. by Michael Smith US Army Special Forces | It was the type of mission ISA was designed for, but no agents were sent in. Officials developed a contingency plan for the new situation: ISA operators were to infiltrate the city and confirm the locations of the hostages, as well as make contact with the Lebanese Christian militia. The US Department of Defense has defined direct action as "Short-duration strikes and other small-scale offensive actions conducted as a special operation in hostile, denied, or politically sensitive environments and which employ specialized military capabilities to seize, destroy, capture, exploit, recover, or damage designated targets. Boss Cantor seemed satisfied with how the mandarins gathered the necessary hardware for the mission and then marched smartly out the door. Had the force been aware of the actual hostage location and situation, the force could have continued past Desert One and probably succeeded. "Known as the Intelligence Support Activity, or ISA, when it was established in 1981, this unit fought in drug wars and counter-terror operations from the Middle East to South America. HUMINT-related activities at the Department of Defense and Defense Intelligence Agency level, subsequent to the disestablishment of the DHS, included continued issuance of DoD directives or instructions governing elements of HUMINT operations - including those concerning human source validation ( Document 44 ), creation of the since (Source). Both sides would work together on developing the intel, and then a decision would be made regarding a specific operational tasking to avoid statutory conflict. The mandarins had inexplicably turned and ran south back to our home base leaving no rear guard for the main body. The Birth of the Field Operations Group (Later Intelligence Support Activity / Secret Army of Northern Virginia), Part 1 of 3 - Rangers and TF160/SOAR to Follow. (Source). According to The Secret War by William M. Arkin, published in the Los Angeles Times on October 27, 2002, "The Army created a highly compartmentalized organization that could collect clandestine intelligence independent of the rest of the U.S. intelligence community and follow through with covert military action. Copyright 2023 | Site by 3C Web Services, by Rice University's Baker Institute for Public Policy, by Global Initiative Against Transnational Organized Crime, by Center for International Maritime Security (CIMSEC), by Strategic Perspectives 41, National Defense University, by Geneva Academy of International Humanitarian Law and Human Rights, by C/O Futures Terrorism Research Note Series, by PKSOI (Peacekeepimh and Stability Operations Institute), by Headquarters Department of the Army / Headquarters Marine Corps, Tactics and Operations Group, Deterring the Next Invasion: Applying the Accumulation of Events Theory to Cyberspace, TThe next big threat to AI might already be lurking on the web, Migrant Caravans: A Deep Dive Into Mass Migration through Mexico and the Effects of Immigration Policy, Managing Risk for Special Operations Forces in Large-Scale Combat Operations, The grey zone: Russia's military, mercenary and criminal engagement in Africa, Deadly Rio de Janeiro: Armed Violence and the Civilian Burden, North Koreas Political Warfare Strategy Has Failed: ROK U.S. Alliance Needs A Superior Strategy. The JTF was largely dependent upon the CIA to provide the vital confirming HUMINT as to the hostage location. By continuing to use this site you consent to our use of cookies. Known as the Confederate Air Force, a joke refencing their title, the Army of Northern Virginia. These intelligence gathering methods outline how intelligence is gathered and what is done with it afterwards. Cake duty! The Invasion of Iraq was an extremely complex time for the US military with units scattered across the country conducting a wide variety of missions. (Source). These missions include finding Colombian drug lord Pablo Escobar, locating Army Gen. James Dozier when he was kidnapped by the Red Brigade in 1981 and taking out observation points in Afghanistan to protect friendly forces in the area. During the 1990's the unit was known as Capacity Gear. A top-secret 'Army electronic surveillance team', was sent to aid the Colombians in August of 1989, as a part of Operation Heavy Shadow. The decision was made to deploy another ISA unit. Wickham did transfer authority to the ACSI with predictable and less than beneficial results. "In and around Afghanistan, Gray Fox was part of a secret sphere that included the CIA's paramilitary Special Activities Division and the Pentagon's Joint Special Operations Command. " Featured Book: However, his several interventions and temporary blockage of many initiatives, showed that his primary intent was to arrest the development and contain the capability. US Navy SEALs | The training processes of other military groups however grant general insight into the selection and training of the ISA. Intelligence Support Activity The Army's most obscure special-ops unit is the roughly 300-strong Intelligence Support Activity, formed in 1981, which has gone by various codenames over. See Intelligence Collection Directive (ICD) 112, . 11.". The operation went smooth up until the force rolled away. Smith's book lifts the lid of secrecy on the Activity, one of America's least well known Special Ops units. Read Next: Delta Force and SEAL Team 6 operators on the loose? I pulled out a pick and tension bar and handed them to him. ISA operators were said to be so skilled that they could tell whether a tank needed a tune-up from background noise of transmissions. Box 378 Red Hook, New York 12571 United States. Additionally, conceal meant can be a factor in weapon selection too. ". This site uses cookies. Both the CSA and the Director understood that each offered something the other did not and that together, a much better response capability could be generateda point that POTUS emphasized through the National Security Council to both. The agents prepared contingency plans for a commando force to enter Beirut clandestinely, and to strike at Hizbollah and Syrian targets. Prior to Saddams capture, over 40 members of his family were captured and interrogated to determine his whereabouts with little success. Since its inception, the Activity has been providing invaluable intelligence and support to many United States operations. I delivered the unemotional skinny to the Cantor who neither commented nor looked up from his work. With robust designs and vintage classic style, discover the heritage of military timepieces today! Its worth noting that Bravo troop was never compromised while conducting espionage against the Assad regime in Syria. Special Recon, Direct Action. Electronic specialists and SIGINT operators comprised part of the force. In all cases, the Congressional members voiced support. (Dominique Sumner and Peter Tomich). The operation was codenamed Amber Star, and was a joint US-British-French-Dutch effort to apprehend the suspects. Intelligence Support Activity - Role The Activity's primary role is to gather actionable intelligence in order to pave the way for special operations undertook by units such as Delta Force (known as 'operational preparation of the battlespace'). The mandarins decided they were much too tired and sleepy to unload their car to safekeep all of their sensitive items in the house with them. SIGINT operations extended to areas with overlapping guerrilla operations, such as Nicaragua, which was facing the increased foe of the Contras. Officially formed in 1980 as FOG then transitioning to the USAISA from 1981 to 1989, this unit now operates under changing names like Capacity Gear or Quiet Enable. Stew Smith and Jeff Nichols discuss the new testosterone to epitestosterone ratio (T/E) used at BUDS to deter use Abigail Spanberger spent almost a decade as a CIA operations officer. Delta Force | Hostages were dispersed around Beirut and those with Jewish sounding names were being isolated. Featured Book: Political bickering stalled the deployment of the agents, and finally, the operation was approved. Since that time the unit reports to Special Operations Command or SOCOM in Tampa Florida, United States. "Also in 1982, an ISA team was sent to Sudan to provide protection to Sudanese President Gaafar Nimeiry and his vice president. [2] Unconventional warfare, special reconnaissance and direct action roles have merged throughout the decades and are typically performed primarily by the same units. ISA was asked to develop a plan of action. They skillfully pushed the car down the dirt driveway and out onto the hardball road a-ways where they could hot-wire and start the car without being heard by the slumbering princesses in the safe house. It is tasked to collect actionable intelligence in advance of missions by other US special operations forces . He seemed equally satisfied when they reported the next morning that the clandcam was up and recording and that they would have the product with them when they returned the next morning. The cover of these operatives is typically much harder to develop since it requires a reason to be in and out of the target country on a frequent basis, and to have inauspicious ties to the target country. The Chiefs planning element determined that DOD/Army needed to create a Joint Army-CIA force that would both develop quality intelligence abroad, but also provide site support for direct action operations. Unfortunately, the hostages were dispersed throughout the country, and the chance never came for a second attempt, but the seeds were planted for the Intelligence Support Activity. Additionally, ISA gathers SIGINT primarily by intercepting enemy communications or sending an agent to physically bug a target. "Gray Fox's low-profile eavesdropping planes also fly without military markings. One of their major tasks was to create 'pathfinders'. Each of these groups achieves different specialised tasks for their assigned mission. Exactly who would execute the direct-action operations, would be determined after the intelligence determine the situational necessities. Bickering between the CIA and JSOC further complicated matters. It was a body of men and women first sent to Japan to study Ninjitzu, then on to Chinas Shao Lin Temple to study Kung Fu, then finally to Iran to study the ways of the Immortals under the former King of the Persian Empire, Xerxes the Great. action is "necessary to support identifiable foreign policy objectives of the United States, and is This is especially useful in countries where men and women socializing is frowned upon outside of the family. ISA has gone by many names over the years but its current one is not public knowledge. The vast majority of their operations are clouded not just in shadow, but in complete darkness. "When TWA Flight 847 was hijacked on June 14, 1985, America's counter-terrorist forces went on full alert.

What Is The Mass Of An Electron In Grams, St Michael's Hockey Roster, Peta Net Worth 2020, Rfactor Vhr Mod, Articles I

intelligence support activity direct action