Within these battalions, there is a cyber ops teams, technology ops teams and mission support teams. The ISA comprises 5 primary elements: administration, training, SIGINT, HUMINT and direct action. The FOG was able to clandestinely enter Tehran and gather the required intelligence. Special Operations Forces: The unit was raised in 1979 as the Foreign Operating Group (FOG), who was created to overthrow the Nicaraguan dictator Anastasio Somoza. Italian forces conducted the raid itself; rescuing Dozier and returning him to the US without a single casualty. To lawyers, this is a distinction with a difference. (Source). Bravo troop tackles the extremely difficult target countries like Syria which had a sophisticated counterintelligence network. All Rights Reserved. International Security in Sub-Saharan Africa: An Interview with Dr. Niamh Gaynor, Transnistria and Russian Tensions: Moldova 12-month Forecast, Terrorist Threat in Senegal: A 12-month Forecast, Terrorist Threat in Guinea: A 12-Month Forecast, 7.3. ISA operatives often work in disguise and undercover. The forms of intelligence gathered by the Activity include: HUMINT (HUMan INTellgence) The unit exists in an altered form today, but it is an example as to how the USG can effectively mix Title 10 and 50 rules to achieve a common end and how conventional bureaucracies can stifle needed imaginative resolutions. FOG became permanent and renamed ISA on March 3, 1981. Once a member of the ISA passes the initial selection, it trains alongside different intelligence specialists, including members of the CIA. Title 10 is the broad statute regarding what DOD is authorized to do. What does one actually do with such persons? [2] Unconventional warfare, special reconnaissance and direct action roles have merged throughout the decades and are typically performed primarily by the same units. Boss Cantor seemed satisfied with how the mandarins gathered the necessary hardware for the mission and then marched smartly out the door. Few special operations forces are clad in as much secrecy as the Intelligence Support Activity. "Also in 1989, ISA was rumoured to have taken part in the hunt for the richest drug trafficker in the world, Pablo Escobar, operating under the code-name Centra Spike. ISA operators would infiltrate either Beirut or Algiers on commercial flights to avoid tipping off the terrorists or the authorities. How do you guys block?, I dont know how you guys operate. Its scope is quite large, and it often works in support of JSOC, SOCOM and even other intelligence agencies. Zones are prepared, field intelligence is gathered, and targets are laid out for other forces. Featured Book: US Air Force Pararescue | Wickham did transfer authority to the ACSI with predictable and less than beneficial results. Army did likewise through DAMO-ODSO. ISA intelligence specialists, K9 units, security experts and demolition experts were sent to the country undercover as military advisers. Cake duty! Had the force been aware of the actual hostage location and situation, the force could have continued past Desert One and probably succeeded. Intelligence Support Activity provides US special forces with intelligence gatherers, man hunters, assassins and deep penetration agents. The unit's history, the politics that have shaped it and the operations it has carried out are recounted in great and fascinating detail. The direct action element reportedly trains with Delta Force and DEVGRU to maintain their skills. If they would have been caught, they were done. SMU operator (on ISA breaking into an Al-Qaeda safehouse), Additionally, HUMINT operatives working deep undercover will sometimes work in male-female teams. Special Boat Service (SBS) |, Camouflage patterns: COL Nightingale is a retired Army Colonel who served two tours in Vietnam with Airborne and Ranger (American and Vietnamese) units. (Source), Under the operational codename Centra Spike, the Intelligence Support Activity operated alongside CIA and local police elements to track down Escobar. ISA agents even managed to obtain Lebanese license plates, which would allow Delta to be parachuted in with their own cars, then 'legitimized' with the plates. Join our mailing list to stay in the loop for free! (Source) These collectively will compose some of the roles within a primary battalion of the ISA. It is common for the appearance and demeanour of an agent to be the key to their success as an infiltrator. ISA focuses on gathering human intelligence based on contact with field agents, and signals intelligence (intercepted communications) to support Delta Force and DEVGRU operations. "In 1982, ISA SIGINT specialists took part in Operation Queens Hunter, a Seaspray operation in the skies above El Salvador, Honduras and Nicaragua. Political bickering stalled the deployment of the agents, and finally, the operation was approved. These operatives have a cover in the commercial sector, typically as an international businessperson. This is especially useful in countries where men and women socializing is frowned upon outside of the family. The vast majority of the ISAs operations in Afghanistan are still classified. Landing zones were established, Lebanese militias contacted for help, and plans formulated for a commando force. The FOG was re-named the Intelligence Support Activity (ISA), and given an initial budget of $7 million. This time around, travel through the city was a very dangerous endeavour, with roadblocks everywhere. Both were doing the same thing in Colombia, except Centra Spike was doing a better job, at a much lower cost. Units in Sarajevo tracked Karadzic electronically, while other agents were on the ground in Pale, Karadzic's home. Special Operations Forces are the elite commandos of the U.S. military. They also provided protection for numerous Arabian princes, and established good contacts while down there. The third known squadron is the Mission Support Squadron. Upon return to the Pentagon, he re-assigned the ACSI POC out of FOG-related issues. The web portal tool will maintain a repository of all INSCOM and non -INSCOM To operatorsnot so much. a Title 10 operation or a Title 50 operation. 2e Rgiment tranger de Parachutistes | It is after all, not a strictly combat-oriented role like its other Tier 1 operators. In addition to covert operations, it provides the war on terrorism with the kind of so-called 'close-in' signals monitoring -- including the interception of cell phone conversations -- that helped bring down Colombian drug lord Pablo Escobar. Highly recommended. (Source) Training involves different espionage and intelligence methods that allow ISA members to carry out their essential HUMINT operations. ISA would operate under a host of cover names to confuse anyone without the need to know. and direct action combat. "Currently, ISA is believed to be under control of JSOC, and published accounts have it organized into administration, training, SIGINT, HUMINT and direct action elements. He later commanded both the 1/75th Rangers and the 1st Ranger Training Brigade. (Source). Alpha and Charlie troops utilize official cover to collect human intelligence. Traditions (religious, political, societal). When government officials found out, they were horrified, they seemed to have a rogue agency within its ranks. "In 1981, the Central Intelligence Agency, along with a covert helicopter unit, Seaspray, was involved in the secret transport of Lebanese Christian leader Bashir Gemayel back to Beirut after a round of secret talks with the President Ronald Reagan. Unfortunately, the police were either heavily corrupted or unwilling to arrest Escobar, and the intelligence went to waste. Funding was to be a joint undertaking. While Delta and DEVGRU focus on direct engagement and specialized combat tactics, the ISA conducts intelligence and espionage operations at a tactical level. An ISA agent was secretly infiltrated into Beirut where he provided real-time intelligence on the location of the hostages. It was so simple that we didnt even need to create a nursery rhyme to recite to help us remember all the steps. The unit is organized into several elements. They are known by many names: Task Force Orange; the Intelligence Support Activity; The Activity; the Army of Northern Virginia; the Field Operations Group (FOG); the United States Army Intelligence Support Activity, or just shortened to Intelligence Support Activity (USISA). Approval was given for ISA's deployment, and operators flew to Frankfurt, where some stayed in case the airliner, now back in Beirut, flew back to Algiers. The Cantor said nothing. Additionally, conceal meant can be a factor in weapon selection too. He would be given instructions and equipment along the way, and was required to perform certain assignments, for example, setting up a SATCOM system. (. Primarily acting as enablers for JSOC special mission units. The vast majority of their operations are clouded not just in shadow, but in complete darkness. Given the nature of their operations and the close work and training they receive alongside other US special operations forces, much of their equipment is likely to mimic that of the special mission units they support and work alongside. Once admitted, candidates must pass the operations training course, which teaches infiltration techniques, advanced air operations, offensive and off-road driving, personal defensive measures and communications. . The Untold Story of Women in Special Operations, We Are Abandoning the Women of the Special Forces, SOAA Calls for Support of our Afghan Allies in The Hill, SOAA Supports Last Out: Elegy of a Green Beret. Delta Force and SEAL Team 6 operators on the loose? With it, they had a unit of military spies able to covertly infiltrate a country and provide hands-on, critical intelligence, as well as to raise logistical support for counter-terrorist commandos in case of a crisis. Ironically, the embassy in Iran was on their itinerary, but, history intervened, and it was overrun by a mob who took the larger part of the staff hostage. ISA was close to making the exchange, but the deal fell through at the last minute. US Army Intelligence Support Activity (USAISA), also known as ISA, The Activity, GREY FOX and, in recent times, the Mission Support Activity (MSA), is a top secret Army intelligence unit. })(); Intelligence Support Activity provides US special forces with intelligence gatherers, man hunters, assassins and deep penetration agents. Support Veteran Journalism . As previously mentioned, its members cross train with the CIA, Americas most comprehensive civilian intelligence agency. The Forgotten Histories of the Codification of International Humanitarian Law in Nineteenth-Century Latin America, Crafting Strategy for Irregular Warfare: A Framework for Analysis and Action (2nd Edition), South Africas organised crime climbs to Italys levels, racing past Mexico, Somalia and Libya, Opinion | The Foreign Policies of the Sinaloa Cartel and CJNG Part V: Europes Supercoke & on- the-Horizon Issues and the Middle East, Opinion | The Foreign Policies of the Sinaloa Cartel and CJNG Part IV: Europes Cocaine & Meth Markets, Airstrikes, Civilian Casualties, and the Role of JAGs in the Targeting Process, Opinion | The Foreign Policies of the Sinaloa Cartel and CJNG Part III: Africa, The cartels flexed their power in Tijuana and now the battle for influence is on, Organized Crime in Mexico and the Evolving Government Response, Armies are re-learning how to fight in cities, Law and the Ayman al-Zawahiri airstrike: a dozen Qs & As, Informe alerta sobre contrabando de cigarrillo, narcotrfico y Hezbol, Iran Seeks to Increase Its Influence in Latin America, Experts Warn, International Humanitarian Law in Urban Warfare, ATP 3-06/MCTP 12-10B, Urban Operations (JUL 22), Latest Atrocities Highlight the Importance of Early Warning. During the operations training course, candidates are taught infiltration techniques, advanced air operations, offensive and off-road driving, personal defensive measures and communications. These missions include finding Colombian drug lord Pablo Escobar, locating Army Gen. James Dozier when he was kidnapped by the Red Brigade in 1981 and taking out observation points in Afghanistan to protect friendly forces in the area. Once inside, Centra Spike agents would plug in laptops into the airplane's power and could simultaneously track four frequencies. An operation was planned for their rescue, with Seaspray, Delta Force and the ISA all playing a role. US Army intelligence defines HUMINT as including: The sources of this information can come from enemy combatants, including regular armed forces, and civilian sources. October 16, 2020 They are known by many names: Task Force Orange; the Intelligence Support Activity; The Activity; the Army of Northern Virginia; the Field Operations Group (FOG); the United States Army Intelligence Support Activity, or just shortened to Intelligence Support Activity (USISA). (Source). Operatives tradecraft for avoiding detection is impeccable. My team, me and happy-trigger-fingered Kay-Kay, were to position north of the ambush site, report the approach of the Generals car, then pull our car out onto the highway to block traffic for the hot minute it took the assault force to stop Klandanjs car and scoop him up. Additionally, ISA gathers SIGINT primarily by intercepting enemy communications or sending an agent to physically bug a target. The terrain was extremely rugged, the enemy was far more entrenched than anticipated, and Murphys Law was in full effect. _gaq.push(['_setDomainName', '.specwar.info']); If some elements (especially photos) were originally yours please consider Specwar.info to host for free. Each of these groups achieves different specialised tasks for their assigned mission. The plan involved flying feet above the turbulent Mediterranean Sea, at night, through hostile airspace. Colonel Jerry King retained his position as the head of the group, now 100-strong and headquartered in a nondescript building in Arlington, Virginia. geo sends. To this point, the CIA and the DOD followed separate independent paths as defined by statutes contained in Title 10 (DOD authorities) and Title 50 (Intelligence agency authorities). Under Operation Winter Harvest, a small team of Delta Force technicians was dispatched to Italy to provide assistance with the search for Dozier. The simple plan called for pipe-hitters to deploy from the states and set up an ambush at a blind S-curve along the generals route. But what if I dont need signal intercept and intelligence gathering support for my mission?, Look, Geo theyre here, theyre queer, and theyd like so say hello just deal with it because theyre not going away. An Examination of the Importance of Mosques, El Salvador Deploys Security Forces to Contain Criminal Groups, Honduras declares war against gangs and for control of popular narrative, Complexities and conveniences in the international drug trade: the involvement of Mexican criminal actors in the EU drug market, Mexico: Declassification of the Three Armed Conflicts Involving Drug Cartels on RULAC - The Geneva Academy of International Humanitarian Law and Human Rights, Technology, Data, & The Future of Warfare: A Review Essay by James Torrence, Rinaldo Nazzaro, Leader of the Neo-Nazi Terrorist GroupThe Base: Probable Linkages to the Russian Imperial Movement (RIM), A Social Network Analysis of Mexicos Dark Network Alliance Structure, Disentangling The Digital Battlefield: How the Internet Has Changed War, "Hybrid Warriors" GROUND TRUTH ABOUT THE ORIGIN OF WAR IN UKRAINE, DEFENSE SUPPORT TO STABILIZATION (DSS) A GUIDE FOR STABILIZATION PRACTITIONERS, Byte, With, and Through: How Special Operations and Cyber Command Can Support Each Other, Ukraines drone raid on Russian naval base was tactically innovative but not revolutionary, Improvised Anti-Vehicle Land Mines (IAVMs) in Mexico: Cartel Emergent Weaponry Use, Countering Chinese Overseas Police Influence Operations, Israel Rolls Out Legion-X Drone Swarm For The Urban Battlefield, The Great Equalizer: Irregular Warfare in the City. He commanded airborne battalions in both the 509th Parachute Infantry Regiment and the 82nd Airborne Division. But if the copyright owners want to get in touch to have them immediately removed from this site then please contact our webmaster. Here, Ive got it, offered the mandarin with hand extended to my lock pick set. Its members often use disguises to avoid detection and if they are compromised they can quickly disappear from sight and completely change their appearance. World conditions in the early 1980s suggested that some capability was required to address the ambiguous conflicts of each Title authority into some form of credible operational capability. The unit would be immediately deployed to any country where a terrorist act against the United States had taken place, and would start providing critical intelligence, as well as setting up landing zones and infiltration routes for the counter-terrorist force. find out more The survey was successful, which led defense officials to create ad hoc Special Forces units to survey US embassies in hotspots around the world.