Shadow Warriors: Inside the Special Forces sic-3 Read online




  Shadow Warriors: Inside the Special Forces

  ( Study in Command - 3 )

  Tom Clancy

  Tony Koltz

  Carl Stiner

  The training, resourcefulness and creativity of the US Special Forces soldier make him capable of jobs that few other soldiers could handle, in situations where traditional arms and movement do not apply. Tom Clancy traces the transformation of the Special Forces from the small core of outsiders of the 1950s through the cauldron of Vietnam and to the rebirth of the SF in the late 1980s and 1990s as the bearer of the largest, most mixed and most complex set of missions in the US military. From Vietnam to Laos to Panama and El Salvador to Lebanon, Saudi Arabia, Kuwait and Iraq, these are stories of raids, counter-terrorism, hostage rescues, reconnaissance, counter-insurgency and psychological operations — and also of building settlements, teaching civilians, cleaning up water supplies and saving lives.

  Tom Clancy, Tony Koltz, Carl Stiner

  Shadow Warriors: Inside the Special Forces

  An unconventional war requires unconventional men — the Special Forces.

  Green Berets Navy SEALS Rangers • Air Force Special Operations • PsyOps • Civil Affairs • and other special-mission units

  The first two Commanders books, Every Man a Tiger and Into the Storm, provided masterly blends of history, biography, you-are-there narrative, insight into the practice of leadership, and plain old-fashioned storytelling. Shadow Warriors is all of that and more, a book of uncommon timeliness, for, in the words of Lieutenant General Bill Yarborough, "there are itches that only Special Forces can scratch." Now, Carl Stiner — the second commander of SOCOM, the U.S. Special Operations Command — and Tom Clancy trace the transformation of the Special Forces from the small core of outsiders of the 1950s, through the cauldron of Vietnam, to the rebirth of the SF in the late 1980s and 1990s, and on into the new century as the bearer of the largest, most mixed, and most complex set of missions in the U.S. military.

  These are firsthand accounts of soldiers fighting outside the lines: counterterrorism, raids, hostage rescues, reconnaissance, counterinsurgency, and psychological operations — from Vietnam and Laos to Lebanon, Panama, Saudi Arabia, Kuwait, Iraq, and the new wars of today…

  "Some action vignettes from [Special Forces] roots in WWII and Vietnam rival Clancy fiction."

  — Kirkus Reviews

  "The plethora of insider history and firsthand operation specifics… will please the historically minded."

  — Publishers Weekly

  DEDICATION

  This book is dedicated to all the great soldiers, sailors, airmen, and marines with whom and for whom I have been privileged to serve during my thirty-five years of service.

  Among these, an elite brotherhood of warriors deserves the highest possible recognition — our nation's Special Operations Force, past and present.

  To those who have sacrificed their lives in the defense of our freedoms, we owe our deepest respect and gratitude. And to their families, we offer our deepest sympathy and prayers for their future.

  — General Carl Stiner (Ret.)

  AUTHORS' NOTE

  During any given week, an average of more than 3,500 Special Operations Forces (SOF) are deployed overseas in some sixty-nine countries. Their missions range from counterdrug assistance and demining to peacekeeping, disaster relief, military training assistance, and many other special mission activities. As such, they function as instruments of U.S. national policy, and develop relationships with the militaries and governments of the host nations in a way that best serves our national interests now and in the future.

  In the writing of this book, we have attempted to include all the information possible about the capabilities of these unique forces, the sacrifices that they make, and the mission areas of their responsibility, as well as just tell some good stories. Needless to say, however, some of these missions and capabilities are sensitive and cannot be revealed for national security reasons. Likewise, the names of some of the personnel, as well as family members, must be protected for personal security reasons. We know the reader will understand that there are some details that are not appropriate for discussion here, and will pardon any necessary omissions.

  — Tom Clancy and General Carl Stiner (Ret.)

  I

  MONDAY, OCTOBER 7, 1985

  Brigadier General Carl Stiner, the commander of the Joint Special Operations Task Force, was returning from his morning run at Fort Bragg, North Carolina, when his J-2 intelligence officer, Colonel Mike Flynn, met him at the gate. "A cruise ship has been hijacked in the Mediterranean," Flynn told him coolly, but with urgency, "and Americans arc very likely on board."

  No other organization had the capability to recapture a ship on the high seas, and Stiner knew they would certainly be called in, and soon.

  Stiner was a slender man of six feet, with a crisp but not rigid military bearing and a comfortable, easy look. At the same time, he had always been driven by an underlying intensity and a deep competitiveness. It wasn't just that he wanted to be the best, or to lead his troops to be the best — all officers want that — but that he had time and again figured out ways to make it happen.

  As he and Flynn hurried toward the headquarters building, Stiner was already processing the news. He knew that Flynn's sparse information was all that was then available, or else Flynn would have told him more. Even so, he had to begin initial actions based on that slender thread. Through long hours of intense planning, training, and rehearsal, JSOTF had developed force packages for virtually any anticipated crisis situation; these were always ready to go within a few hours, as long as there were airplanes available to haul his men. Based on the planning and rehearsals, Stiner focused on what he had to work out right away: "It's a tough target… got to get more detailed information," he thought to himself. "We'll have a long way to go and have to get on the road as soon as possible… must order up airlift now. And we must find out the location of the ship."

  As these thoughts went through his mind, he remained calm. When Special Forces have a job to do, the job must be done fast, accurately, and efficiently. It is likely to be extremely complex, with many lives at risk, and many unknown variables. Facing those conditions, people in these units do not waste their time and effort expressing feelings. They are businesslike, always focusing on the mission at hand — looking especially for vulnerabilities that can be exploited to solve the problem in the cleanest, most complete way possible.

  Once he reached the headquarters, he went without pausing to the Joint Operations Center (JOC), a high-tech war room, complete with computer workstations and secure communications to all JSOTF units, the Pentagon, and major commands throughout the world. There he would review the latest intelligence and learn firsthand everything anyone knew about the incident in the Mediterranean. His staff principals had already assembled, waiting for his guidance.

  The Task Force maintained its own twenty-four-hour intelligence center, complete with "watch officers" — military officers and civilians expert at picking out intelligence indicators of an impending crisis — analysts, and databases covering every known terrorist organization. Terminals connected the command with all major news networks, including Reuters and the BBC — the first indication of a developing incident often appeared as a news item. JSOTF also had its own people resident in all U.S. intelligence agencies — always looking for indicators of terrorist activities, as well as already existing information that had not seemed important to analysts in those agencies.

  In most cases, the headquarters learned of terrorist inci
dents early, and they usually had the most complete information about them.

  Stiner knew that all available intelligence information had already been transmitted by the staff to the units that would be involved. This also meant that all his units would have begun to ready their forces for deployment, while anticipating further guidance from him. They always made maximum use of the time available. In this business, time was a most precious asset.

  Before Stiner had taken this command, previous tours in the Middle East had taught him a lot about terrorists and how they operated. For instance, while he had been the chief of training for the modernization of the Saudi Arabian National Guard from 1975 to 1977, he had had a chance to take the measure of Yasir Arafat and his chief lieutenants. Along with other dignitaries from the region, the Palestinians had been invited to a graduation dinner for an officer candidate class by King Khalid and Prince Abdullah, the commander of the National Guard.

  Arafat's lieutenants were impressive, no doubt about it. Most of them had advanced degrees from American universities. They were all well-dressed, very sharp, well-spoken, and knowledgeable about world affairs. Arafat was obviously the leader — and clearly an intelligent and remarkable man — but the lieutenants who made things work struck Stiner as truly formidable. In years to come, that impression proved terribly accurate.

  Later, in 1983, Stiner was assigned to Lebanon. There he got a firsthand experience of terrorism and its effects — a U.S. ambassador had been assassinated; while he was there, more than sixty people at the American Embassy. and later more than two hundred U.S. Marines, were killed by bombs.

  In those days, Beirut was not only an armed camp with many hostile factions, but a place where fighting might break out anywhere at any time. No one was safe, and death was an ever-present risk — from snipers, crossfires between factions, ambushes, and indiscriminate shelling by heavy artillery and rocket fire. The shelling sometimes involved thousands of rounds, which reduced entire sections of the city to rubble in half an hour.

  It was not an casy assignment. Yet, for Stiner, it proved to be rewarding. It offered a chance to learn lessons he could get nowhere else.

  • You learned how to survive. Or you didn't.

  • You learned whom to trust in a life-or-death situation — and whom, by faction or religious motivation, you could not trust.

  • You learned to think like a terrorist.

  THE EVOLUTION OF JSOTF

  The traditional function of wars is to change an existing state of affairs. In the early 1970s, a new form of warfare, or maybe a new way of practicing a very old form of warfare, emerged — state-supported terrorism. Nations that were not militarily powerful learned to use terrorist tactics to obtain objectives and concessions they could never win through diplomatic or military means.

  When this new form of warfare broke out, the United States quickly showed itself unprepared to cope with it. It had neither a national policy nor intelligence capabilities aimed at terrorism, nor any military forces adequately trained and prepared to respond to terrorist provocations. Although the United States was the most powerful nation in the world, its military capabilities were focused on the Soviet Union and not on something like this.

  In 1972, Israeli athletes at the Munich Olympics were massacred by Black September terrorists. This outrage might have been avoided if German snipers had had the ability to hit the terrorists as they led the hostages across the airport runway to their getaway plane.

  The Israelis took this lesson to heart, and on July 4, 1976, eighty-six Israeli paratroopers landed at Entebbe Airport in Uganda. Their mission was to rescue the passengers from an Air France airliner hijacked eight days earlier. In a matter of minutes, the paratroopers had rescued ninety-five hostages and killed four terrorists — though at the cost of the lives of two hostages and the paratroop commander. News of the raid flashed all over the world — and pointed out even more sharply America's inadequacies in fighting terrorism.

  This truth had already been brought out in May 1975: Forty-one American Marines were killed in an attempt to rescue the thirty-nine crewmen of the American merchant ship Mayaguez after it had been seized by the Cambodian government. The rescue attempt had failed.

  These incidents clearly indicated that the United States was unprepared to deal with terrorist-created hostage situations.

  To correct this shortfall, in the mid-70s, three farseeing people began lobbying for the creation of a special "elite" unit to deal with this unconventional threat: Lieutenant General Edward C. "Shy" Meyer, Director of Operations for the Army; Major General Robert "Bob" Kingston, Commander of the Army's Special Forces; and Robert Kupperman, Chief Scientist for the Arms Control and Disarmament Agency, who was managing the government's studies on terrorism.

  The three initially made little headway. Scant support for the "elite" unit could be found among the services, and even within the Army, even though it was devastatingly clear that the technology in which the Army was investing so heavily — tanks, helicopters, air defense missiles, armored personnel carriers, and all the other machinery of the modern-day battlefield — was of little use against terrorists. The opposition stemmed primarily from two sources: a bias against elite units as such — elites have never been popular in the U.S. Army — and the perception that the unit would rob resources and available funds from the existing force structure.

  On June 2, 1977, Lieutenant General Meyer presented the concept of this special mission unit to Army Chief of Staff General Bernard Rogers.

  This unit was to be the premier counterterrorist force. Because it was expected to deal with the most complex crisis situations, it would have capabilities like no other military unit. It would be organized with three operational squadrons and a support squadron; and it was to be composed of handpicked men with demonstrated special maturity, courage, inner strength, and the physical and mental ability to react appropriately to resolve every kind of crisis situation — including imminent danger to themselves.

  On November 19, 1977, the Army officially activated the unit, but it took another two years to develop the tactics and procedures required for the unit's projected mission.

  The unit's final exam and validation exercise was held at Hunter Army Airfield at Fort Stewart, Georgia, and ended in the early-morning hours of Sunday, November 4. It was now certified for its special mission requirements.

  Ironically, just as the exercise was taking place, a mob was invading the American Embassy in Tehran. Moments later everyone inside — fifty-three people — became hostages to the new religious-led Iranian revolutionary government.

  The crisis of the next 444 days challenged the United States as it had never been challenged before, and proved a horribly painful lesson in effective response to terrorist incidents. The nation was faced with risks, quandaries, contradictions, legal issues, other nations' involvement, and sovereignty issues; and there were no easy solutions. We were presented with what was in fact an act of war, yet this "war" was on a scale that made the use of heavy weapons either impractical or overkill. And besides, there were hostages. We wanted to do something to turn the situation to our advantage.

  But what?

  In terms of shooters and operators, the unit was probably the most capable unit of its kind in the world, but it did not yet have the necessary infrastructure to go with it — no command organization, no staff, no combat support units. To make matters more frustratingly complex, the intelligence infrastructure necessary for support of rescue operations did not exist in Iran, either.

  Meanwhile, President Jimmy Carter — sitting very uncomfortably between a rock and a hard place — decided that an operation to rescue the fifty-three hostages had to be attempted. Army Special Forces had to be the centerpiece of any rescue in Iran.

  The obvious model was the Israeli raid on Entebbe. A brilliantly planned, led, and executed operation… yet only a marginally useful model. The difficulties of a raid into Tehran were incomparably larger. The Entebbe raid was made a
gainst an airfield. The raiders could land there quickly, and make their move against the terrorists almost before they themselves had been detected. Tehran was a major metropolis, with a population in the millions, and it was hundreds of miles inside a vast and hostile country. Getting inside Tehran and into the embassy undetected and with sufficient force to do any good presented many problems.

  Major General James Vaught was picked to head the rescue operation. He had a capable Special Forces Unit, but that was all he had. He literally had to begin from scratch to create an effective headquarters for command, control, and intelligence support functions — to select and train a competent staff, develop a plan, select the support units, and train the force for the mission.

  If Special Forces could get to the U.S. Embassy in Tehran, they were certainly capable of conducting the rescue operation, but getting them there and back was the challenge. It meant the establishment of staging bases in countries willing to support American efforts and of a support infrastructure within Iran itself. This required, first, an airfield for transloading the rescue force from C-130s to helicopters, which would then take the force on to a landing site near Tehran and back; and second, trucks in waiting near the landing site.

  Also required were C-130s and crews that were capable of flying "blacked-out missions" into sites in the desert at night, and a reliable helicopter unit that could take the rescue force from the transload site to Tehran and back.

  No units capable of performing this mission existed in any of the services. Jim Vaught had to form, equip, and train them.

  It was a daunting challenge to develop in very little time the individual-and unit-level proficiency required to accomplish the job — for example, flying with night-vision goggles had never been done before — and Jim Vaught was the right man for the mission, but the units, equipment, and crews available were at best only marginally capable of taking it on.

 

    Changing of the Guard Read onlineChanging of the GuardClear and Present Danger Read onlineClear and Present DangerHounds of Rome Read onlineHounds of RomeBreaking Point Read onlineBreaking PointTom Clancy's Jack Ryan Books 7-12 Read onlineTom Clancy's Jack Ryan Books 7-12Full Force and Effect Read onlineFull Force and EffectThe Archimedes Effect Read onlineThe Archimedes EffectCombat Ops Read onlineCombat OpsInto the Storm: On the Ground in Iraq Read onlineInto the Storm: On the Ground in IraqUnder Fire Read onlineUnder FirePoint of Impact Read onlinePoint of ImpactRed Rabbit Read onlineRed RabbitRainbow Six Read onlineRainbow SixThe Hunt for Red October Read onlineThe Hunt for Red OctoberThe Teeth of the Tiger Read onlineThe Teeth of the TigerConviction (2009) Read onlineConviction (2009)Battle Ready Read onlineBattle ReadyPatriot Games Read onlinePatriot GamesThe Sum of All Fears Read onlineThe Sum of All FearsFallout (2007) Read onlineFallout (2007)Red Storm Rising Read onlineRed Storm RisingThe Cardinal of the Kremlin Read onlineThe Cardinal of the KremlinExecutive Orders Read onlineExecutive OrdersLincoln, the unknown Read onlineLincoln, the unknownThreat Vector Read onlineThreat VectorThe Hunted Read onlineThe HuntedShadow Warriors: Inside the Special Forces Read onlineShadow Warriors: Inside the Special ForcesEnd Game Read onlineEnd GameSpecial Forces: A Guided Tour of U.S. Army Special Forces Read onlineSpecial Forces: A Guided Tour of U.S. Army Special ForcesLocked On Read onlineLocked OnLine of Sight Read onlineLine of SightTom Clancy Enemy Contact - Mike Maden Read onlineTom Clancy Enemy Contact - Mike MadenFighter Wing: A Guided Tour of an Air Force Combat Wing Read onlineFighter Wing: A Guided Tour of an Air Force Combat WingSpringboard Read onlineSpringboardLine of Sight - Mike Maden Read onlineLine of Sight - Mike MadenEndWar Read onlineEndWarDead or Alive Read onlineDead or AliveTom Clancy Support and Defend Read onlineTom Clancy Support and DefendCheckmate Read onlineCheckmateCommand Authority Read onlineCommand AuthorityCarrier: A Guided Tour of an Aircraft Carrier Read onlineCarrier: A Guided Tour of an Aircraft CarrierBlacklist Aftermath Read onlineBlacklist AftermathMarine: A Guided Tour of a Marine Expeditionary Unit Read onlineMarine: A Guided Tour of a Marine Expeditionary UnitCommander-In-Chief Read onlineCommander-In-ChiefArmored Cav: A Guided Tour of an Armored Cavalry Regiment Read onlineArmored Cav: A Guided Tour of an Armored Cavalry RegimentTom Clancy's Jack Ryan Books 1-6 Read onlineTom Clancy's Jack Ryan Books 1-6The Ultimate Escape Read onlineThe Ultimate EscapeAirborne: A Guided Tour of an Airborne Task Force Read onlineAirborne: A Guided Tour of an Airborne Task ForceDebt of Honor Read onlineDebt of HonorCyberspy Read onlineCyberspyPoint of Contact Read onlinePoint of ContactOperation Barracuda (2005) Read onlineOperation Barracuda (2005)Choke Point Read onlineChoke PointPower and Empire Read onlinePower and EmpireEvery Man a Tiger: The Gulf War Air Campaign Read onlineEvery Man a Tiger: The Gulf War Air CampaignEndgame (1998) Read onlineEndgame (1998)EndWar: The Missing Read onlineEndWar: The MissingSplinter Cell (2004) Read onlineSplinter Cell (2004)The Great Race Read onlineThe Great RaceTrue Faith and Allegiance Read onlineTrue Faith and AllegianceDeathworld Read onlineDeathworldGhost Recon (2008) Read onlineGhost Recon (2008)Duel Identity Read onlineDuel IdentityLine of Control o-8 Read onlineLine of Control o-8The Hunt for Red October jr-3 Read onlineThe Hunt for Red October jr-3Hidden Agendas nf-2 Read onlineHidden Agendas nf-2Acts of War oc-4 Read onlineActs of War oc-4Ruthless.Com pp-2 Read onlineRuthless.Com pp-2Night Moves Read onlineNight MovesThe Hounds of Rome - Mystery of a Fugitive Priest Read onlineThe Hounds of Rome - Mystery of a Fugitive PriestInto the Storm: On the Ground in Iraq sic-1 Read onlineInto the Storm: On the Ground in Iraq sic-1Threat Vector jrj-4 Read onlineThreat Vector jrj-4Combat Ops gr-2 Read onlineCombat Ops gr-2Virtual Vandals nfe-1 Read onlineVirtual Vandals nfe-1Runaways nfe-16 Read onlineRunaways nfe-16Marine: A Guided Tour of a Marine Expeditionary Unit tcml-4 Read onlineMarine: A Guided Tour of a Marine Expeditionary Unit tcml-4Shadow Warriors: Inside the Special Forces sic-3 Read onlineShadow Warriors: Inside the Special Forces sic-3Jack Ryan Books 1-6 Read onlineJack Ryan Books 1-6Cold Case nfe-15 Read onlineCold Case nfe-15Changing of the Guard nf-8 Read onlineChanging of the Guard nf-8Splinter Cell sc-1 Read onlineSplinter Cell sc-1Battle Ready sic-4 Read onlineBattle Ready sic-4The Bear and the Dragon jrao-11 Read onlineThe Bear and the Dragon jrao-11Fighter Wing: A Guided Tour of an Air Force Combat Wing tcml-3 Read onlineFighter Wing: A Guided Tour of an Air Force Combat Wing tcml-3Patriot Games jr-1 Read onlinePatriot Games jr-1Jack Ryan Books 7-12 Read onlineJack Ryan Books 7-12Mission of Honor o-9 Read onlineMission of Honor o-9Private Lives nfe-9 Read onlinePrivate Lives nfe-9Operation Barracuda sc-2 Read onlineOperation Barracuda sc-2Cold War pp-5 Read onlineCold War pp-5Point of Impact nf-5 Read onlinePoint of Impact nf-5Red Rabbit jr-9 Read onlineRed Rabbit jr-9The Deadliest Game nfe-2 Read onlineThe Deadliest Game nfe-2Springboard nf-9 Read onlineSpringboard nf-9Safe House nfe-10 Read onlineSafe House nfe-10EndWar e-1 Read onlineEndWar e-1Duel Identity nfe-12 Read onlineDuel Identity nfe-12Deathworld nfe-13 Read onlineDeathworld nfe-13Politika pp-1 Read onlinePolitika pp-1Rainbow Six jr-9 Read onlineRainbow Six jr-9Tom Clancy's Power Plays 1 - 4 Read onlineTom Clancy's Power Plays 1 - 4Endgame sc-6 Read onlineEndgame sc-6Executive Orders jr-7 Read onlineExecutive Orders jr-7Net Force nf-1 Read onlineNet Force nf-1Call to Treason o-11 Read onlineCall to Treason o-11Locked On jrj-3 Read onlineLocked On jrj-3Against All Enemies Read onlineAgainst All EnemiesThe Sum of All Fears jr-7 Read onlineThe Sum of All Fears jr-7Sea of Fire o-10 Read onlineSea of Fire o-10Fallout sc-4 Read onlineFallout sc-4Balance of Power o-5 Read onlineBalance of Power o-5Shadow Watch pp-3 Read onlineShadow Watch pp-3State of War nf-7 Read onlineState of War nf-7Wild Card pp-8 Read onlineWild Card pp-8Games of State o-3 Read onlineGames of State o-3Death Match nfe-18 Read onlineDeath Match nfe-18Against All Enemies mm-1 Read onlineAgainst All Enemies mm-1Every Man a Tiger: The Gulf War Air Campaign sic-2 Read onlineEvery Man a Tiger: The Gulf War Air Campaign sic-2Cybernation nf-6 Read onlineCybernation nf-6Support and Defend Read onlineSupport and DefendNight Moves nf-3 Read onlineNight Moves nf-3SSN Read onlineSSNCutting Edge pp-6 Read onlineCutting Edge pp-6The Cardinal of the Kremlin jrao-5 Read onlineThe Cardinal of the Kremlin jrao-5War of Eagles o-12 Read onlineWar of Eagles o-12Op-Center o-1 Read onlineOp-Center o-1Mirror Image o-2 Read onlineMirror Image o-2The Archimedes Effect nf-10 Read onlineThe Archimedes Effect nf-10Teeth of the Tiger jrj-1 Read onlineTeeth of the Tiger jrj-1Bio-Strike pp-4 Read onlineBio-Strike pp-4State of Siege o-6 Read onlineState of Siege o-6Debt of Honor jr-6 Read onlineDebt of Honor jr-6Zero Hour pp-7 Read onlineZero Hour pp-7Ghost Recon gr-1 Read onlineGhost Recon gr-1Command Authority jr-10 Read onlineCommand Authority jr-10Tom Clancy's Power Plays 5 - 8 Read onlineTom Clancy's Power Plays 5 - 8Checkmate sc-3 Read onlineCheckmate sc-3Breaking Point nf-4 Read onlineBreaking Point nf-4Gameprey nfe-11 Read onlineGameprey nfe-11The Hunted e-2 Read onlineThe Hunted e-2Hidden Agendas Read onlineHidden AgendasDivide and Conquer o-7 Read onlineDivide and Conquer o-7