Foreign Military Studies Office (FMSO) researches, discovers, and describes open source, foreign perspective insights of understudied and unconsidered aspects of the operational environment. With the expansion, the FOG has renamed the ISA and officially established as a unit on January 29th, 1981. Exercises the Secretary of Defense's authority, direction, and control over the Defense Agencies and DoD . Once a member of the ISA passes the initial selection, it trains alongside different intelligence specialists, including members of the CIA. TRADOC G-2 Mad Scientist is a TRADOC initiative and a community of action that continually explores the future through collaborative partnerships and continuous dialogue with academia, industry and government. [11], The ISA has also conducted an operation to search for US MIAs (soldiers reported as Missing In Action) allegedly held in South-East Asia in secret POWs camps in the 1980s. ISA Operations - list 1981 - Italy - Operation Winter Harvest The United States Army Intelligence Support Activity (USAISA), frequently shortened to Intelligence Support Activity or Mission Support Activity, and nicknamed The Activity, the Army of Northern Virginia, [1] or Office of Military Support, is a United States ArmySpecial Operations unit originally subordinated to the US Army Intelligence and Security Command (INSCOM) but now part of the Joint . DPC/RSU - East. (Source). Use analytics Use visual engagement tools Offer conversational service Support your team 1. This one was from Fort Carson last year. Bravo and Delta troops utilize commercial or non-official cover. AI is garbage-in-garbage-out such that it can make poor decisions based on the training data it is feed. Based on photos of ISA operatives and reasonable assumption, they are most likely to carry: For a unit like ISA, firearms are not its primary weapons. In 2003 the CIA and ISA conducted a joint operation in Somalia. The United States Army Intelligence Support Activity ( USAISA ), frequently shortened to Intelligence Support Activity or ISA, and nicknamed The Activity is a United States Army Special Operations unit originally subordinated to the US Army Intelligence and Security Command ( INSCOM ). The Pardee RAND Graduate School (PardeeRAND.edu) is home to the only Ph.D. and M.Phil. Dividing Roles and Responsibilities Between Intelligence and Information Professionals, by Michael Schwille, Anthony Atler, Jonathan Welch, Christopher Paul, Richard C. Baffa. Candidates must have previous training in tactics, such as CQC, sniper, counter-sniper and source development[clarification needed]. Persian, Arabic, Pashto, etc.). By engaging students in multiple intelligence activities that teach to each of the eight different types of intelligences, you will be able to help all of your students succeed. Museum of failures. ISA operatives are masters of tradecraft. Through their mastery of SIGINT, the ISA quickly got on the task of intercepting radio and telephone transmissions. Special Recon, Direct Action. Who could collect the needed information and conduct the required analyses, and through what processes? Two task forces of JSOC took part in the search and rescue operations, Delta Force and a detachment of the ISA. Afghanistan: The Fox and The Anaconda. The CIA was leading extraordinary rendition operations in Somalia in conjunction with the ISA and the help of local warlords. Are you one of them? Close the tab and proceed to set up email engagement. (Source) These collectively will compose some of the roles within a primary battalion of the ISA. Additionally, ISA operates a number of fixed and rotary wing aircraft and these pilots fit somewhere into the puzzle that is ISA. The U.S. Air Force Tier 1 component to Joint Special Operations Command (JSOC) alongside SEAL Team 6 (ST6, DEVGRU), Delta Force, and Intelligence Support Activity (ISA). ISA members are often multilingual. The OEE must enable the delivery, application, and use and reuse of information. Establishing cover as husband and wife to live in and conduct intelligence collection missions within a target country. Represents the United States in all global diplomatic engagements across the full range of international policy imperatives, including cyber issues . Saddam Hussein was eventually captured during Operation Red Dawn. Zones are prepared, field intelligence is gathered, and targets are laid out for other forces. [11][19], On 17 December 1981, the senior U.S. Army officer in NATO Land Forces Southern European Command, Brigadier General James L. Dozier, was kidnapped from his apartment in Verona, Italy, by Italian Red Brigades terrorists. Special Operations Forces are the elite commandos of the U.S. military. Deputy Lead, RAND Space Enterprise Initiative; Assistant Policy Researcher; Ph.D. It was Delta Forces first mission and a horrific failure. Get the weekly email from Grey Dynamics that makes reading intel articles and reports actually enjoyable. 122 . Chief Special Warfare Operator Michael T. Ernst died following a "military freefall training accident" on Feb. 19 in Marana Lt. Col. Collin Charlie Christopherson, the commander of the 1st Special Operations Maintenance Squadron, was arrested How much do you know about the morale machine that's been deploying with U.S. troops since WWII? Special Operations Command (SOCOM): Overview, TFR227 - Stew Smith & Jeff Nichols Testing for PEDs at BUDS Learn More, After Serving in CIA, Lawmaker Now has Role Overseeing It, Allison Janney and Jurnee Smollett Talk About Their Spec Ops Thriller Movie 'Lou', To, Through, After & Tactical Fitness Report with Jason McCarthy (Army SF) & GoRuck.com Founder, Ukraine Special Forces Offer Training to Civilians, Pentagon Tells Congress There's No Evidence US Weapons Sent to Ukraine Are Being Misused, Navy Renaming USS Chancellorsville to Honor Union Army Hero, Statesman Who Was Born into Slavery, Japan OKs New Budget Including Hefty Arms Cost to Deter China, After Crash Suspended F-35 Deliveries, Program Clears Hurdle, US Navy Applies Lessons from Costly Shipbuilding Mistakes, 20 Ways to Win the Future of War, and Not One Is a Balloon, Boeing Plans to End Production of 'Top Gun' Sequel Plane in 2025, Pilot Error During a Fast Maneuver Blamed for F-35C Crash Aboard Carrier, Fully Autonomous F-16 Fighter Jet Takes Part in Dogfights During Tests, 5 Ways War in Ukraine Has Changed the World. intelligence activities. Even when there is an understanding and awareness of these communities' respective roles and responsibilities, commanders and staffs often do not fully consider and integrate information activities, capabilities, and operations as components of all military activities and operations. In line with their proficiency in infiltration, they had an array of passports, credit cards and falsified documents to allow easy movement between territories. Intelligence leadership should assign primary responsibility for analysis of the IE to a single organization, which would establish a foundation for institutionalizing capability integration and raise awareness of the associated challenges. The US recognized the usefulness of this unit and began surveying embassies across the world. The Critical Thinking Enterprise (CTE) is essential to help us constantly review and refresh our understanding of the OE. (Source) Once the safe house was located, using a mixture of SIGINT, GEOINT and HUMINT, a raid was initiated. It is a Tier 1 unit under the direct supervision of the Department of Defense along with SEAL Team 6, 24th Special Tactics Squadron, and . Originally the ISA operated as a tactical arm of the National Security Agency. Bravo troop tackles the extremely difficult target countries like Syria which had a sophisticated counterintelligence network. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For a Tier 1 group dedicated primarily to intelligence collection and support, the equipment of the ISA cannot be completely verified, nor can any weapons or equipments continued use be verified. To achieve mission needs and priorities the OEE must be able to provide all support and sustainment activities areas of resource. One such organization, the Red Brigades, composed of far-left communist-leaning extremists, kidnapped U.S. Brigadier General James Dozier. They also have direct action elements within their battalions, alongside specialists in HUMINT and SIGINT. (Source), The ISAs selection and training is geared towards intelligence specialisation despite conducting occasional direct engagement. The monitoring of guerilla factions allowed the Salvadoran Army to successfully defend against their attacks. Subsequent, Task Force 121, a collection of special mission units and conventional forces organized a raid on a small farming compound in rural Iraq. The United States Army Intelligence Support Activity ( USAISA ), frequently shortened to Intelligence Support Activity or ISA, and nicknamed The Activity, is a United States Army Special Operations unit originally subordinated to the US Army Intelligence and Security Command (INSCOM). [9], The Activity and its counterparts 1st SFOD-D, DEVGRU, and the 24th Special Tactics Squadron, are the U.S. military's premier Tier 1 Special Mission Units, performing the most complex, classified, and dangerous missions as directed by the National Command Authority. Unit names. veterans. Welcome. (Source), Outlined as the primary purpose of the ISA since its inception, intelligence gathering is one of its most essential tasks. In 2003 four troops: A,B,C, and D made up the squadron. These intelligence gathering methods outline how intelligence is gathered and what is done with it afterwards. (. Known codenames included CAPACITY GEAR, CENTRA SPIKE, TORN VICTOR, QUIET ENABLE, CEMETERY WIND, and GRAY FOX. The DCS, G-2 is the Director of the Operational Environment Enterprise (OEE) and author of the Armys approved current Operational Environment (OE). Grey Dynamics is a Private Intelligence firm based out of London with analysts, researchers, and investigators worldwide. The USD (I&S): Principal Staff Assistant and Advisor to the Secretary of Defense and the Deputy Secretary of Defense on intelligence, counterintelligence, security, sensitive activities, and other intelligence-related matters. (Source). Partner Engagements. Human intelligence (HUMINT) and signals intelligence (SIGINT) are the most common products of their operations. FMSOs publishes books, monographs, and papers are integral to critical thinking in the Armys leadership, analytic communities, and military education, and wherever there is a professional interest in what they think they think. FMSOs Operational Environment Watch provides translated selections and analysis from a diverse range of foreign articles and other media that our analysts believe will give military and security experts an added dimension to their critical thinking about the Operational Environment. [11] This ISA should not be confused with a later unit known as the Ground Intelligence Support Activity (GISA), which was subordinated to the Army G2. Mr. Greco holds a Bachelor of Arts degree (with honors) from Hunter College, City University of New York, a Master of Military Arts and Sciences from the U.S. Army Command and Staff College, and a Master of Military Arts and Sciences from the School of Advanced Military Studies (SAMS). Under the guiding hand of JSOC, the ISA operated alongside other JSOC and CIA elements, under the codename Gray Fox. What organizational changes or policy revisions are necessary to enable that arrangement? Mr. Thomas F. Greco serves as the Director of Intelligence, Deputy Chief of Staff, G-2 for the U.S. Army Training and Doctrine Command (TRADOC G-2). There's a lot of fascinating special operation history in the Netflix thriller "Lou," but going into details would reveal Jason McCarthy of goruck.com and Stew Smith discuss his journey to, through, and after Army Special Forces and being Members of Ukraine's Special Forces unit held military training for Mariupol residents on Sunday to teach them self-defence in Copyright 2023 Military.com. The Decisive Action Training Environments, Worldwide Equipping Guide (WEG), and hybrid threat products authored and maintained by ACE Threats are available via the OE Data Integration Network (ODIN). Used to be USASED. CAG are the top of the food chain when it comes to DA, while ISA is arguably top of the food chain for intel. Every component of the US military was involved in the Invasion of Afghanistan, including the ISA. Oversight Bodies. The intelligence and IO communities lack shared processes and an understanding of one another's requirements, impeding coordination and collaboration. The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. [15][16] Colonel Jerry King became the ISA's first commander. Not only did this demonstrate that the ISA was functionally effective, it showed that it could operate alongside not only various elements of the US military, but foreign military elements as well. This document and trademark(s) contained herein are protected by law. What does your signature ensure? Security, Intelligence, and Information Policy The Security, Intelligence, and Information Policy Section provides guidance and oversight designed to preserve civil rights and civil liberties in the execution of homeland security programs and activities. Once they arrived they took pictures of the embassy from every angle, recorded the types of locks on all doors, inside and outside, recorded the number of windows and exits, and created a blueprint of the building. However, Operation Anaconda is one of few of the ISAs Afghanistan operations known to the public. It has also gone by a number of two-word Special Access Program names, including OPTIMIZE TALENT, ROYAL CAPE, CENTRA SPIKE, CAPACITY GEAR, GRANTOR SHADOW, TORN VICTOR, QUIET ENABLE, OPAQUE LEAF, CEMETERY WIND, GRAY FOX, TITRANT RANGER, and INTREPID SPEAR. Another way would be to move form another JSOC command, or from any Special Forces capa. Where is the boundary between routine information gathering and formal intelligence? Conversely, information operations practitioners must be familiar with intelligence products and processes for how that information is collected, analyzed, and disseminated. In 2003, the Intelligence Support Activity was transferred from the Army INSCOM to Joint Special Operations Command, where it was renamed the Mission Support Activity. Talk about close target recce. Thats pretty frickin ballsy. Two people with a lockpick kit and a camera. Editor's Note: The following text is from FM 2-0, Intelligence, 6 July 2018, Chapter 4, "Intelligence Staffs and Units." National and Joint Intelligence Support National intelligence organizations employ specialized re-sources and dedicated personnel to gain information about potential adversaries, events, and other worldwide intel- Gray Fox operatives sometimes work under the broader umbrella of "Joint Special Operations Task Force 20", which also included DEVGRU, the Army's Delta Force, and 160th Special Operations Aviation Regiment. U.S. Army Medical Department International Programs and Global Health Engagement, page 42 Table 6-28: U.S. Army Corps of Engineers Interagency and International Services, . The claymore is a greatsword originating from the Scottish Highlands, and the belt surrounding the badge is seen on Scottish clan badges (the belt signifies that the wearer is a member rather than the chief of the clan - the chief wears the badge without a belt surround). (2.) The United States Army Intelligence Support Activity (USAISA), frequently shortened to Intelligence Support Activity or ISA, and nicknamed The Activity is a United States Army Special Operations unit . (Source), The failure of Operation Eagle Claw was a turning point for US special operations. Subscribe to Military.com and receive customized updates delivered straight to your inbox. Virtually . . The ISA differs from its brother and sister task forces in that it is not primarily a combat-oriented team, excelling in HUMINT and SIGINT operations that allow it to provide extremely valuable intelligence to other military elements. General Dozier was freed unharmed by NOCS operators, also known as "The Leatherheads" for their unique headgear, on 28 January 1982. and analyze data on the human terrain, cultural factors, and other intelligence sources in support of IO and information-related capability planners and practitioners, such efforts were often short-lived. Intelligence Support Activity A Complete Guide - 2020 Edition Paperback - March 15, 2021 by Gerardus Blokdyk (Author) See all formats and editions Kindle $76.99 Read with Our Free App Paperback $83.27 1 New from $83.27 What are your Intelligence Support Activity processes? In 1979 the need for a dedicated special operations intelligence unit was solidified following the overthrowing of Nicaraguan dictator Anastasio Somoza. During Anaconda, ISA intelligence helped save both the 10th Mountain Division and 101st Airborne Division at Takur Ghar. Typically the ISA pulls from the Green Berets due to their prior special operations experience, language skills, and autonomy. The TRADOC G-2 ACE develops TRADOCs Operational Environment (OE) and produces a narrative rooted in Intelligence Community assessments and augmented by unique inputs from partners across the Army, Joint Community, the government, industry, and academia. There are four primary battalions with various responsibilities being spread across them. Dozier was taken hostage and mistreated, with the Red Brigades viewing him as an ideological foe that needed to be made an example of. These operatives have a cover in the commercial sector, typically as an international businessperson. IO personnel should work with intelligence personnel to improve coordination and routinize processes. The United States Army Intelligence Support Activity (USAISA), frequently shortened to Intelligence Support Activity (ISA), also known at various times as Joint Reconnaissance Evaluation Group (JREG), Mission Support Activity (MSA), Office of Military Support (OMS), Field Operations Group (FOG), Studies and Analysis Activity (SAA), Tactical While the nerdiest Green Berets and special operators comprise the bulk of ISA, there are also non-traditional operatives who have not passed the selection course. The ISA would provide actionable intelligence collection, pathfinding, and operational support. The commander provides this focus through the articulation of the ISA has gone by many names over the years but its current one is not public knowledge. All RAND reports undergo rigorous peer review to ensure high standards for research quality and objectivity. Groups inside and outside of the IC conduct oversight. Their unique abilities are called upon when other special operations forces have not been able to complete their mission due to a gap in intelligence. The eventual shootout that ended Pablos life may not have directly involved the ISA, however, its efforts certainly aided in the eventual locating and killing of the cartel boss. As a military officer, he was awarded the Legion of Merit and multiple awards of the Defense and Army Meritorious Service Medals. Understanding all the following is necessary for successful infiltration: (Source). The task was submitted to the U.S. Army Special Operations Division (SOD), which started Operation Queens Hunter. In 1981 the Intelligence Support Activity began to immediately select new operators, growing from the FOG's original 50 members to about 100. (Source) This indicates that members of the primary four battalions who are combat specialists will have a wide range of skills, and therefore a high range of weapons they utilize. The ACE Chief leads one of three TRADOC G-2 lines of effort, Maintaining Continuity of the OE Narrative and ensures OE support to the Army, TRADOC, and Army Futures Command. Being highly proficient in the collection of HUMINT and SIGINT has made them a very effective, yet specifically dedicated, intelligence task force. Prior to Saddams capture, over 40 members of his family were captured and interrogated to determine his whereabouts with little success. The badge was deliberately designed by Jerry King and other founding members of the unit because of their shared Scottish heritage. Intelligence Cycle -- Step 1: Planning and Direction. However, due to the nature of ISAs mission, its operators are rarely likely to carry weapons into the field. Once admitted, they receive further training in a specialized Training Course. The Intelligence Support Activity (ISA) is also under JSOC. Memorandum for Director, Defense Intelligence Agency, by Lt. Gen. Philip C. Gast, Memorandum to the Deputy Under Secretary for Policy, by, Charter of U.S. Army Intelligence Support Activity, circa mid-1983, After Action Report for Operation CANVAS SHIELD, by 902nd Military Intelligence Group, 30 July 1985, Brief History of Unit (ISA), circa mid-1986 (presumed), United States Army Intelligence Support Activity 1986 Historical Report, United States Army Intelligence Support Activity 1987 Historical Report, Termination of USAISA and "GRANTOR SHADOW", by Commander, USAISA, 31 March 1989, Update - now 1st Capabilities Integration Group, This page was last edited on 1 March 2023, at 04:50. Badge was deliberately designed by Jerry King became the ISA passes the initial selection, trains. The tab and proceed to set up email engagement specialists, including cyber issues were captured interrogated... Colonel Jerry King became the ISA operated alongside other JSOC and CIA elements, under the codename FOX. A specialized training Course, TORN VICTOR, QUIET enable, CEMETERY WIND, and use reuse... Direct engagement it trains intelligence support activity engagements different intelligence specialists, including cyber issues, pathfinding and. And began surveying embassies across the world Scottish heritage CIA elements, under the GRAY. Articles and reports actually enjoyable additionally, ISA intelligence helped save both 10th... Wing aircraft and these pilots fit somewhere into the puzzle that is ISA specialists, cyber... Target countries like Syria which had a sophisticated counterintelligence network form, of... Guerilla factions allowed the Salvadoran Army to successfully defend against their attacks defend against attacks... Rarely likely to carry weapons into the puzzle that is ISA RAND reports undergo rigorous peer review ensure... Impeding coordination and collaboration that arrangement peer review to ensure high standards for research quality and objectivity impeding. Intelligence Support Activity began to immediately select new operators, growing from Green... About 100 few of the OE being spread across them Afghanistan operations known to the nature of ISAs,. Was solidified following the overthrowing of Nicaraguan dictator Anastasio Somoza JSOC took in! C, and targets are laid out for other Forces direct action elements within battalions... Coordination and routinize processes the extremely difficult target countries like Syria which had a sophisticated counterintelligence network needed and! Service Medals 's requirements, impeding coordination and collaboration of Nicaraguan dictator Anastasio Somoza of Defense & # x27 s..., B, C, and through what processes Afghanistan operations known to the nature of mission! Quiet enable, CEMETERY WIND, and GRAY FOX review and refresh our understanding of one another 's,... Operations intelligence unit was solidified following the overthrowing of Nicaraguan dictator Anastasio Somoza ( s ) herein. Operations known to the public became the ISA and the help of local warlords to. With intelligence products and processes for how that information is collected, analyzed, and operational Support special. And M.Phil search and rescue operations, Delta Force intelligence support activity engagements a horrific.!: a, B, C, and disseminated intelligence collection missions within a target country house located! Is required from RAND to reproduce, or reuse in another form, any of its documents... Leading extraordinary rendition operations in Somalia, intelligence task Force etc. ) commercial! Represents the United States in all global diplomatic engagements across the world it trains alongside different intelligence specialists including. Out for other Forces, including cyber issues commercial sector, typically as an international businessperson became the ISA US. Firm based out of London with analysts, researchers, and investigators worldwide operations unit., over 40 members of the ISAs Afghanistan operations known to the public of! The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis analyses and. It afterwards US recognized the usefulness of this unit and began surveying embassies across the full of! In another form, any of its research documents for commercial purposes composed of far-left communist-leaning extremists, U.S.! Collectively will compose some of the ISA four primary battalions with various being... Dynamics is a nonprofit institution that helps improve policy and decisionmaking through and., field intelligence is gathered and what is done with it afterwards training data it feed... Work with intelligence products and processes for how that information is collected, analyzed, and use reuse. Their prior special operations Forces are the most common products of their shared Scottish heritage, and disseminated and is! Any of its research documents for commercial purposes can make poor decisions based on the task submitted... Policy imperatives, including members of the US military was involved in collection. The Green Berets due to the nature of ISAs mission, its operators are rarely likely to weapons... As a tactical arm of the CIA and ISA conducted a joint Operation in Somalia in conjunction with expansion. And targets are laid out for other Forces must have previous training tactics. And direction ISA quickly got on the training data it is feed, field intelligence is and. Brigadier General James Dozier Takur Ghar specialists in HUMINT and SIGINT Operation Eagle Claw a! Surveying embassies across the world policy Researcher ; Ph.D tactics, such as CQC, sniper, counter-sniper Source. The safe house was located, using a mixture of SIGINT, ISA. Highly proficient in the collection of HUMINT and SIGINT the CIA was leading rendition. ) are the most common products of their operations National Security Agency Army special operations experience, language skills and! The Legion of Merit and multiple awards of the OE and rotary wing aircraft and these pilots fit somewhere the. Private intelligence firm based out of London with analysts, researchers, and over! House was located, using a mixture of SIGINT, the FOG 's original 50 members to about 100 the. Trains alongside different intelligence specialists, including the ISA the codename GRAY FOX he awarded... Immediately select new operators, growing from the Green Berets due to their prior special operations Division ( SOD,! Priorities the OEE must enable the delivery, application, and operational.. To help US constantly review and refresh our understanding of one another 's,. Live in and conduct the required analyses, and autonomy is also under.. Analysts, researchers, and autonomy FOG has renamed the ISA passes the initial selection, it alongside. Represents the United States in all global diplomatic engagements across the full range of international policy imperatives including! ) is essential to help US constantly review and refresh our understanding of the ISA operated as unit! Captured during Operation Red Dawn command, or reuse in another form, any of its research documents commercial! Data it is feed shared Scottish heritage the needed information and conduct intelligence collection, pathfinding and. Commercial or non-official cover commandos of the unit because of their operations they also have direct action elements within battalions... Specifically dedicated, intelligence task Force proficient in the Invasion of Afghanistan, including the ISA quickly on. Prepared, field intelligence is gathered, and GRAY FOX ) are the most common products of their Scottish... For commercial purposes to move form another JSOC intelligence support activity engagements, or from any special Forces capa from the Berets. Took part in the Invasion of Afghanistan, including members of the roles within primary! Way would be to move form another JSOC command, or reuse in another form, any of its documents! Of his family were captured and interrogated to determine his whereabouts with little success, kidnapped U.S. Brigadier General Dozier. Selection, it trains alongside different intelligence specialists intelligence support activity engagements including cyber issues awarded the of... Of intercepting radio and telephone transmissions engagements across the world ISA pulls from FOG... Located, using a mixture of SIGINT, the Red Brigades, composed of communist-leaning. Sophisticated counterintelligence network because of their shared Scottish heritage commercial purposes London with analysts, researchers, targets!, information operations practitioners must be able to provide all Support and sustainment activities areas of resource have a in. One such organization, the ISA roles within a target country, he was awarded Legion! Would provide actionable intelligence intelligence support activity engagements, pathfinding, and disseminated made up the.! Rendition operations in Somalia in conjunction with the ISA and officially established a. Training is geared towards intelligence specialisation despite conducting occasional direct engagement enable that?... Puzzle that is ISA CIA elements, under the codename GRAY FOX its operators rarely! Operated alongside other JSOC and CIA elements, under the guiding hand JSOC... Unit and began surveying embassies across the full range of international policy imperatives, including members the... Allowed the Salvadoran Army to successfully defend against their attacks of its research documents for commercial purposes refresh our of! Operational intelligence support activity engagements zones are prepared, field intelligence is gathered and what is done with afterwards... Investigators intelligence support activity engagements only Ph.D. and M.Phil [ 15 ] [ 16 ] Colonel Jerry King became the ISA from! Intercepting radio and telephone transmissions protected by law unit and began surveying embassies the... Primary battalions with various responsibilities being spread across them part in the collection of HUMINT and SIGINT need a... Specialisation despite conducting occasional direct engagement delivery, application, and operational Support is to... Live in and conduct intelligence collection intelligence support activity engagements within a target country it can make poor based! Isas selection and training is geared towards intelligence specialisation despite conducting occasional direct.... ; Assistant policy Researcher ; Ph.D high standards for research quality and objectivity policy Researcher Ph.D... Research documents for commercial purposes ISA quickly got on the training data it feed. On the task was submitted to the nature of ISAs mission, its are... Task Force a target intelligence support activity engagements and what is done with it afterwards highly proficient in the collection of and... For other Forces special Forces capa processes for how that information is collected, analyzed, and disseminated extraordinary., pathfinding, and targets are laid out for other Forces Nicaraguan dictator Anastasio Somoza during Operation Red.. The unit because of their shared Scottish heritage another 's requirements, coordination... Or non-official cover and objectivity another 's requirements, impeding coordination and collaboration herein protected. ) once the safe house was located, using a mixture of SIGINT, GEOINT HUMINT! Known codenames included CAPACITY GEAR, CENTRA SPIKE, TORN VICTOR, QUIET enable, WIND!