Barrett is the world leader in long-range, large-caliber, precision rifle design and manufacturing. A case officer is someone who handles a foreign asset by giving them collection requirements and ensuring their safety. The separation did not fit real world requirements which was finally recognized in the aftermath of the failed Iran rescue. One such organization, the Red Brigades, composed of far-left communist-leaning extremists, kidnapped U.S. Brigadier General James Dozier. As such, the activities and specifics of Gray Fox are not widely made available. to FOG, SOG, SAD, SMU, ISA, and, FID, the focus of which is the ISA through 2015. Delta Force and SEAL Team 6 operators on the loose? With the expansion, the FOG has renamed the ISA and officially established as a unit on January 29th, 1981. Subscribe to Military.com and receive customized updates delivered straight to your inbox. Under the guiding hand of JSOC, the ISA operated alongside other JSOC and CIA elements, under the codename Gray Fox. Operatives tradecraft for avoiding detection is impeccable. It was provided with a cover name, Tactical Concept Activity, and would never be acknowledged by the Pentagon. Some of the more well-documented operations of the ISA shed light on the general nature of the ISAs overall operations. The Activity grew out of the need for specialized intel support for US Special Operations that was highlighted by the failed US attempt to rescue American hostages from Iran in 1980. Intelligence picked up reports that the two, along with other Sudanese officials were the targets of Libyan-sponsored terrorist assassinations. Gray Fox was formed in 1980 in response to the infamous failed rescue attempt of American hostages under Operation Eagle Claw in the Tehran embassy. When government officials found out, they were horrified, they seemed to have a rogue agency within its ranks. The U.S. Army's Intelligence Support Activity is arguably the most secretive unit out of the five tier one units in the United States Military. The ISAs execution of SIGINT monitoring was so successful that the month-long operation was extended to three years. As they soundly slept in the reverie of their grand plan, the Sandman and the Tooth Fairy happened by and found the car unlocked. The Activity's primary role is to gather actionable intelligence in order to pave the way for special operations undertook by units such as Delta Force (known as 'operational preparation of the battlespace'). A simultaneous raid on the targets was to be made. Under the US Central Intelligence Agency's National Clandestine Service, there is a Special Activities Division to operate without apparent national identification for plausible deniability. Operatives infiltrated internet cafes in Baghdad and conducted flyover operations in aircraft filled with signal interception gear. The training processes of other military groups however grant general insight into the selection and training of the ISA. They also noted the specific funding line and agreed to manage it as a priority classified line absent committee discussion. The US wanted a team to covertly survey the situation on the ground and provide officials with a survey of the US embassy. Members of FOG infiltrated Nicaragua using false passports. It built a reputation for daring, flexibility and a degree of lawlessness. The forms of intelligence gathered by the Activity include: The Activity is thought to made up of around 300 operators and is under the command of JSOC (Joint Special Operations Command). Retired Army Col. Paris Davis stood in the White House as President Biden draped the Medal of Honor around his neck, nearly Chief Special Warfare Operator Michael T. Ernst died following a "military freefall training accident" on Feb. 19 in Marana Lt. Col. Collin Charlie Christopherson, the commander of the 1st Special Operations Maintenance Squadron, was arrested How much do you know about the morale machine that's been deploying with U.S. troops since WWII? Gen Meyer, Gen Vaught (DAMO-OD), and LTC Jim Longhofer (DAMO-ODSO), traveled to Langley and met with the new Director and his operational elements director. Since 2003, t. Highly recommended. This page was last edited on 1 April 2008, at 06:57. What does one actually do with such persons? Join our mailing list to stay in the loop for free! It was the type of mission ISA was designed for, but no agents were sent in. Based on photos of ISA operatives and reasonable assumption, they are most likely to carry: For a unit like ISA, firearms are not its primary weapons. ISA focuses on gathering human intelligence based on contact with field agents, and signals intelligence (intercepted communications) to support Delta Force and DEVGRU operations. >Develops and . Everyone in the unit is on on the Department of the Armys Special Roster, which means they dont exist. For obvious reasons, the unit doesnt exactly publicize their makeup. The forms of intelligence gathered by the Activity include: The Activity is thought to made up of around 300 operators and is under the command of JSOC (Joint Special Operations Command). Direct action (DA) is a term used in the context of military special operations for small-scale raids, ambushes, sabotage or similar actions. (Source) This indicates that members of the primary four battalions who are combat specialists will have a wide range of skills, and therefore a high range of weapons they utilize. The unit was raised in 1979 as the Foreign Operating Group (FOG), who was created to overthrow the Nicaraguan dictator Anastasio Somoza. One selection exercise involved dropping a candidate off in the desert without food, water or means of communication. They marked secret infiltration routes and bases American forces could use if they were ever sent into the country. The Intelligence Support Activity (ISA), the 1st Capabilities Integration Group (Airborne), or simply The Activity is a component of the US Army and acts as a dedicated intelligence group for SOCOM. An ISA technician with a SATCOM was provided for the operation to aid in the tracking. Little is known about the organization or its activities, but it is clear that they serve as a military intelligence unit and have partaken in numerous missions around the globe. Parsing one from the other can be quite difficult and largely determined by the location and nature of the target. Few special operations forces are clad in as much secrecy as the Intelligence Support Activity. ISA was asked to form an Algerian-based plan and a Beirut-based one for rescue. "Gray Fox's low-profile eavesdropping planes also fly without military markings. Initially, the raid appeared to be a bust until a Delta operator kicked some debris on exfil. The force is supposedly around 250-275 operators, who excel in intelligence gathering, languages and electronic surveillance. Upon return to the Pentagon, he re-assigned the ACSI POC out of FOG-related issues. Russia and Ukraine battle daily in the sky. ISA operators would infiltrate either Beirut or Algiers on commercial flights to avoid tipping off the terrorists or the authorities. The operation, code-named Great Falcon, made a deal with the Iraqi government for a T-72, in exchange for 175mm cannons. Once a member of the ISA passes the initial selection, it trains alongside different intelligence specialists, including members of the CIA. All Rights Reserved. 8 years' rapidly progressive experience with US Army and a DoD Contractor 4 years in direct support of conventional intelligence units 3 deployments in support of a SOF Task Force. They began forming their own plan for storming the airplane and liberating the hostages. Killer Elite Plus, they wouldnt have to load the car back up again the next day what a grand and magnanimous plan that proved to be. This intelligence then triangulated the possible location of Dozier. They also have direct action elements within their battalions, alongside specialists in HUMINT and SIGINT. Check, chief! and she yanked the gat our of my hand. In one particular situation, Delta and Torn Victor agents supposedly donned French uniforms (Pale is in the French sector of the UN zone) and traveled to Pale hoping to conduct closer surveillance of his whereabouts. The order never came; a secret arms-for-hostages deal was cut by the American government. 'https://ssl' : 'http://www') + '.google-analytics.com/ga.js'; As a result, ISA was almost disbanded, but Army officials succeeded in ensuring its survival, albeit on a much tighter leash. However, the CIA couldnt provide these answers so Delta turned to the FOG. Moscow Should Prepare For Probable US Nuclear Aggression: Reports Russian Military Journal, Destroying American Monster Abrams: Pro-Russian Group Release A How-To Video, Dr. Mary E. Walker: The First AND Only Female Medal Of Honor Recipient, Bakhmut on the Brink of Falling to Russian Troops, Decorated Navy SEAL Died in HALO Training Accident, Adam Brown: A SEALs Life of Courage and Redemption, Complete List: Ticonderoga-class Missile Cruisers To Retire By 2027, Nuclear Close Calls That Nearly Caused World War III, Russian Sausage Millionaire and Putin Critic Falls to His Death in India, Deadly Russian Rifle Brigade Wiped Out During War in Ukraine. Once inside, Centra Spike agents would plug in laptops into the airplane's power and could simultaneously track four frequencies. Within these battalions, there is a cyber ops teams, technology ops teams and mission support teams. Deployed together with a small Delta Force contingent, Centra Spike flew over Colombia in their airplanes and continued to track Escobar. Its scope is quite large, and it often works in support of JSOC, SOCOM and even other intelligence agencies. Dozier was taken hostage and mistreated, with the Red Brigades viewing him as an ideological foe that needed to be made an example of. On October 23, 1983, a truck bomb slammed into the US Marine barracks in Beirut, killing 241 Americans, and injuring scores more. If some elements (especially photos) were originally yours please consider Specwar.info to host for free. The CIA proved unable to provide the critical intelligence Delta Force needed, such as the number of guards, the type of weapons they were using and what kinds of locks were on the doors. Most ISA trainees are from Army Special Forces, meaning many have skills in CQC, sniping, counter-sniping and general tactical engagements. Grey Dynamics is a Private Intelligence firm based out of London with analysts, researchers, and investigators worldwide. By the time though, the situation had begun to subside. The "Pakistani cook" piece, delivered as Delta boarded the aircraft, was viewed as an implausible source though subsequent inquiry revealed that the crucial info was available much earlier, but intentionally not shared for several reasons. Most officials disliked the unit's head, Jerry King, and thus, JSOC did not send the unit in. The ISA is perhaps the most major outlier doctrinally from its other, better known, counterparts within JSOC and SOCOM as a whole. How do you guys block?, I dont know how you guys operate. (Source). Under Operation Winter Harvest, a small team of Delta Force technicians was dispatched to Italy to provide assistance with the search for Dozier. US Army intelligence defines HUMINT as including: The sources of this information can come from enemy combatants, including regular armed forces, and civilian sources. Im telling you, they are packed parachutes for you; all you have to do is jump they dont need any training or preparation they can do it all!. Both the CSA and the Director understood that each offered something the other did not and that together, a much better response capability could be generateda point that POTUS emphasized through the National Security Council to both. US Navy SEALs | Human intelligence (HUMINT) and signals intelligence (SIGINT) are the most common products of their operations. There was a task I did for the Cantor routinely and at a moments notice. It built a reputation for daring, flexibility and a degree of lawlessness. Operation Anaconda highlights how vital of a role the ISA plays in the battlespace. It is known that the unit has changed its codename over the years. Additionally, ISA recruits from other branches of the US military and potentially elsewhere in the intelligence community. This is how we block. Lets just settle on Gray Fox for now, as these operators fill in the gray area between Title 50 intelligence gathering and Title 10 unconventional warfare operations. The rescue force was forced to launch with sketchy data forcing a worst-case force list. It's a Special Mission Unit and conducts highly classified operations. _gaq.push(['_trackPageview']); Some of ISA's most recent deployments was in 1993 in Somalia. The cyber operations team extends into other offsets of intelligence gathering, including OSINT, cyber threat intelligence and cyber warfare. A critical component of clandestine activity is the ability to infiltrate enemy territory ahead of more formal military action. These are primarily preparation intelligence and tactical/ strategic intelligence for active operations. FOG was developed because of a perceived need for greater intelligence-gathering capabilities for the U.S. military. var ga = document.createElement('script'); ga.type = 'text/javascript'; ga.async = true; The ISA agent was ordered to stop the recording, an order to which he complied. People know ISA mostly for its involvement in Operation Anaconda. The rapidly deteriorating situation in the country prompted the United States to create a small Special Forces unit with the purpose of surveying the US embassy. The ISA comprises 5 primary elements: administration, training, SIGINT, HUMINT and direct action. This time around, travel through the city was a very dangerous endeavour, with roadblocks everywhere. ISA agents even managed to obtain Lebanese license plates, which would allow Delta to be parachuted in with their own cars, then 'legitimized' with the plates. Both Army and the Agency recognized the changed nature of the world and the requirements of the emerging terrorist/hostage issues. Unfortunately, the hostages were dispersed throughout the country, and the chance never came for a second attempt, but the seeds were planted for the Intelligence Support Activity. Failed Clandestine operations, usually result in some form of USG explanation. Key to the concept was that there would be a single in-house element (FOG) that either side could use e.g. The ACSI, LTG Odom, strongly objected to the authority lines for FOG and asked Meyer to switch the Army portion from DCSOPS to the ACSI. If they would have been caught, they were done. SMU operator (on ISA breaking into an Al-Qaeda safehouse), Additionally, HUMINT operatives working deep undercover will sometimes work in male-female teams. Original content is published under aCreative Commons Licenseper ourTerms of Use. The breakdown of this squadron isnt known either but it likely contains logistical support for the two operational squadrons. More technical training on SIGINT, such as transmission and signals interpretation is also a component of the training. The planners in DAMO-ODSO were acutely aware of the different legal authorities contained in Title 10 and Title 50 statutes. Copyright 2023 | Site by 3C Web Services, by Rice University's Baker Institute for Public Policy, by Global Initiative Against Transnational Organized Crime, by Center for International Maritime Security (CIMSEC), by Strategic Perspectives 41, National Defense University, by Geneva Academy of International Humanitarian Law and Human Rights, by C/O Futures Terrorism Research Note Series, by PKSOI (Peacekeepimh and Stability Operations Institute), by Headquarters Department of the Army / Headquarters Marine Corps, Tactics and Operations Group, Deterring the Next Invasion: Applying the Accumulation of Events Theory to Cyberspace, TThe next big threat to AI might already be lurking on the web, Migrant Caravans: A Deep Dive Into Mass Migration through Mexico and the Effects of Immigration Policy, Managing Risk for Special Operations Forces in Large-Scale Combat Operations, The grey zone: Russia's military, mercenary and criminal engagement in Africa, Deadly Rio de Janeiro: Armed Violence and the Civilian Burden, North Koreas Political Warfare Strategy Has Failed: ROK U.S. Alliance Needs A Superior Strategy. The Intelligence Support Activity, commonly called "The Activity" . The support provided can come in a range of different forms. Good enough, I thought. Rather than disbanding the unit, it was expanded. This extends beyond knowledge of things like general location, language and culture. Barrett products are used by civilians, sport shooters, law enforcement agencies, the United States military, and more than 75 State Department-approved countries around the world. Bravo troop tackles the extremely difficult target countries like Syria which had a sophisticated counterintelligence network. Almost simultaneously, another truck bomb exploded in the French barracks, killing 56. The forms of intelligence gathered by the Activity include: HUMINT (HUMan INTellgence) > Role: HUMINT (human intelligence), SIGINT (signals intelligence), direct action. That night, the mandarin and I stashed our car and cut through an orchard whose northwest corner gave way to the bollards and the chain barricade. The third known squadron is the Mission Support Squadron. The simple plan called for pipe-hitters to deploy from the states and set up an ambush at a blind S-curve along the generals route. A team of mandarins was tasked with blocking traffic in the same fashion on the south side of the ambush site, then with following the assault force north to provide rearguard to the convoy. It was completely hidden from view, covering its existence with a series of regularly changing code names like Centra Spike, Royal Cape, and Grey Fox. His elements were being heavily tasked, and a directed intelligence pipeline was established to FOG. Wickham did transfer authority to the ACSI with predictable and less than beneficial results. Approval was given for ISA's deployment, and operators flew to Frankfurt, where some stayed in case the airliner, now back in Beirut, flew back to Algiers. Its members often use disguises to avoid detection and if they are compromised they can quickly disappear from sight and completely change their appearance. The ISA technicians were instrumental in the tracking and capture of a number of Red Brigades terrorists, and most probably the location of the kidnapped Dozier himself. As an ancillary, but crucial action during this period, LTC Bruce Mauldin and I, with the CSAs concurrence and support, visited the Hill and had several closed-door sessions with appropriate committee Chairs and Ranking Members regarding the unit's establishment, roles and missions, and funding lines. Additionally, ISA operates a number of fixed and rotary wing aircraft and these pilots fit somewhere into the puzzle that is ISA. These missions include finding Colombian drug lord Pablo Escobar, locating Army Gen. James Dozier when he was kidnapped by the Red Brigade in 1981 and taking out observation points in Afghanistan to protect friendly forces in the area. The unit's history, the politics that have shaped it and the operations it has carried out are recounted in great and fascinating detail. (Source). Initially, Delta Force turned to the CIA for information regarding the number of guards, how they were armed and what security measures they had in place. As with any clandestine unit, only so much can be known about any of the JSOC special mission units. Sadly, the team's evaluation did not serve to upgrade American security standards, and a truck bomb exploded from within 40 feet of the embassy entrance later that year. find out more This site uses cookies. Join SOFREP for insider access and analysis. Alpha and Charlie troops utilize official cover to collect human intelligence. In 1989, during Operation Just Cause, the American invasion of Panama, ISA proposed to deploy a team of its intelligence agents to track Manuel Noriega, but the offer was declined. find out more Such as procuring equipment, getting funding for operations/training, and human resources functions. ISA operatives are masters of tradecraft. Additionally, conceal meant can be a factor in weapon selection too. var _gaq = _gaq || []; Then, Delta and SEAL Team 6 operators would make their way into the city in small groups and wait at safe-houses until the time was right. The Cantor finally said something, and he said it very very loudly when the mandarins lost control of some weapons and encrypted radios. The trials of the ISA in Queens Hunter were not the only time the team was tested in South America. In short order, Langley provided people, training, and a conduit to its various intelligence and planning aspects. The exact breakdown of this squadron isnt known, however it is a reasonable assumption that its divided into troops based on the specific mission, such as airborne SIGINT or ground SIGINT. Or these operatives can clone a cellphone, allowing them to send and receive communications to and from the phone from a remote locations. by Michael Smith Every component of the US military was involved in the Invasion of Afghanistan, including the ISA. The FOG was able to clandestinely enter Tehran and gather the required intelligence. The authors note that "All information used in this article has been obtained from publicly available, open source documents." Since its inception, the Activity has been providing invaluable intelligence and support to many United States operations. The mission criteria were pretty simple: we would fail our mission if we missed reporting the generals car, or if we allowed someone to get around our blocking position and into the ambush site. It was so simple that we didnt even need to create a nursery rhyme to recite to help us remember all the steps. Gaining entry into the ISA is not easy; candidates already must be part of a special operations forces group. US News & World Report describes Torn Victor as 'trained as high-risk intelligence gatherers,' a title fitting the ISA. This is a potentially significant compromise. the Cantor lamented in earnest. (Source). Access to that road saved a considerable amount of travel time for support for an ongoing mission. Meyer was incensed at the lack of CIA interest/dedication/support to the rescue task and believed that was a major factor in the failure. He looked up at me momentarily though he did not repeat himself. (. "Known as the Intelligence Support Activity, or ISA, when it was established in 1981, this unit fought in drug wars and counter-terror operations from the Middle East to South America. I could tell by her skunk-eye that she had a dagger in the pipe ready to launch, so I lightened up. Centra Spike was known to operate under several cover names, including Torn Victor, Cemetery Wind, Capacity Gear and Robin Court, and closely matched ISA's description. Tools like radios, computers and lockpicks are much more crucial to the success of its missions. The other half flew to Cyprus to join the rest of the rescue force. ISA was allegedly co-operating with Task Force Ranger, and was responsible for tracking down Somali warlord Mohammed Farah Adid, through electronic surveillance and Somalian informants.