Shadow Warriors: Inside the Special Forces Read online




  Table of Contents

  Title Page

  Copyright Page

  Dedication

  I - MONDAY, OCTOBER 7, 1985

  II - PIONEERS

  III - WARRIORS’ WARRIOR

  IV - COUNTRY CARL

  V - FEW ARE CALLED, FEWER ARE CHOSEN

  VI - VIETNAM

  VII - BETWEEN THE WARS

  VIII - THE LEBANON TRAGEDY

  IX - THE ACHILLE LAURO STRIKE

  X - PANAMA: OPERATION BLUE SPOON

  XI - PANAMA: OPERATION JUST CAUSE

  XII - SHADOWS IN THE STORM

  XIII - BULLDOG AND HIS PACK: AN INCIDENT IM THE WAR

  XIV - THE FACE OF THE FUTURE

  XV - TUESDAY, SEPTEMBER 11, 2001

  APPENDIX I: - THE UNITED STATES SPECIAL OPERATIONS COMMAND: A BRIEF HISTORY

  APPENDIX II: - LEADERSHIP

  Acknowledgements

  BIBLIOGRAPHY

  INDEX

  An unconventional war requires unconventional men—the Special Forces.

  Green Berets Navy SEALS • Rangers •

  Air Force Special Operations • PsyOps • Civil Affairs •

  and other special-mission units

  The first two Commanders books, Every Man a Tiger and Into the Storm, provided masterly blends of history, biography, you-are-there narrative, insight into the practice of leadership, and plain old-fashioned storytelling. Shadow Warriors is all of that and more, a book of uncommon timeliness, for, in the words of Lieutenant General Bill Yarborough, “there are itches that only Special Forces can scratch.”

  Now, Carl Stiner—the second commander of SOCOM, the U.S. Special Operations Command—and Tom Clancy trace the transformation of the Special Forces from the small core of outsiders of the 1950s, through the cauldron of Vietnam, to the rebirth of the SF in the late 1980s and 1990s, and on into the new century as the bearer of the largest, most mixed, and most complex set of missions in the U.S. military.

  These are firsthand accounts of soldiers fighting outside the lines: counterterrorism, raids, hostage rescues, reconnaissance, counterinsurgency, and psychological operations—from Vietnam and Laos to Lebanon, Panama, Saudi Arabia, Kuwait, Iraq, and the new wars of today...

  “Some action vignettes from [Special Forces] roots in WWII and Vietnam rival Clancy fiction.”—Kirkus Reviews

  “The plethora of insider history and firsthand operation specifics... will please the historically minded.”—Publishers Weekly

  NOVELS BY TOM CLANCY

  The Hunt for Red October

  Red Storm Rising

  Patriot Games

  The Cardinal of the Kremlin

  Clear and Present Danger

  The Sum of All Fears

  Without Remorse

  Debt of Honor

  Executive Orders

  Rainbow Six

  The Bear and the Dragon

  Red Rabbit

  The Teeth of the Tiger

  SSN: Strategies of Submarine Warfare

  NONFICTION

  Submarine: A Guided Tour Inside a Nuclear Warship

  Armored Cav: A Guided Tour of an Armored Cavalry Regiment

  Fighter Wing: A Guided Tour of an Air Force Combat Wing

  Marine: A Guided Tour of a Marine Expeditionary Unit

  Airborne: A Guided Tour of an Airborne Task Force

  Carrier: A Guided Tour of an Aircraft Carrier

  Special Forces: A Guided Tour of U.S. Army Special Forces

  Into the Storm: A Study in Command

  (written with General Fred Franks, Jr., Ret., and Tony Koltz)

  Every Man a Tiger

  (written with General Charles Horner, Ret., and Tony Koltz)

  Shadow Warriors: Inside the Special Forces

  (written with General Carl Stiner, Ret., and Tony Koltz)

  Battle Ready

  (written with General Tony Zinni, Ret., and Tony Koltz)

  CREATED BY TOM CLANCY

  Tom Clancy’s Splinter Cell

  Tom Clancy’s Splinter Cell: Operation Barracuda

  Tom Clancy’s Splinter Cell: Checkmate

  CREATED BY TOM CLANCY AND STEVE PIECZENIK

  Tom Clancy’s Op-Center

  Tom Clancy’s Op-Center: Mirror Image

  Tom Clancy’s Op-Center: Games of State

  Tom Clancy’s Op-Center: Acts of War

  Tom Clancy’s Op-Center: Balance of Power

  Tom Clancy’s Op-Center: State of Siege

  Tom Clancy’s Op-Center: Divide and Conquer

  Tom Clancy’s Op-Center: Line of Control

  Tom Clancy’s Op-Center: Mission of Honor

  Tom Clancy’s Op-Center: Sea of Fire

  Tom Clancy’s Op-Center: Call to Treason

  Tom Clancy’s Op-Center: War of Eagles

  Tom Clancy’s Net Force

  Tom Clancy’s Net Force: Hidden Agendas

  Tom Clancy’s Net Force: Night Moves

  Tom Clancy’s Net Force: Breaking Point

  Tom Clancy’s Net Force: Point of Impact

  Tom Clancy’s Net Force: CyberNation

  Tom Clancy’s Net Force: State of War

  Tom Clancy’s Net Force: Changing of the Guard

  Tom Clancy’s Net Force: Springboard

  Tom Clancy’s Net Force: The Archimedes Effect

  CREATED BY TOM CLANCY AND MARTIN GREENBERG

  Tom Clancy’s Power Plays: Politika

  Tom Clancy’s Power Plays: ruthless. com

  Tom Clancy’s Power Plays: Shadow Watch

  Tom Clancy’s Power Plays: Bio-Strike

  Tom Clancy’s Power Plays: Cold War

  Tom Clancy’s Power Plays: Cutting Edge

  Tom Clancy’s Power Plays: Zero Hour

  Tom Clancy’s Power Plays: Wild Card

  Most Berkley Books are available at special quantity discounts for bulk purchases for sales promotions, premiums, fund-raising, or educational use. Special books, or book excerpts, can also be created to fit specific needs.

  For details, write: Special Markets, The Berkley Publishing Group, 375 Hudson Street, New York, New York 10014.

  A Berkley Book

  Published by The Berkley Publishing Group

  A division of Penguin Putnam Inc.

  375 Hudson Street

  New York, New York 10014

  Copyright © 2002 by C. P. Commanders, Inc.

  Passage from Best Laid Plans by David C. Martin and John Walcott,

  copyright © 1988 by David C. Martin and John Walcott. .

  Chapter II based in part on Hazardous Duty: An American Soldier in

  the Twentieth Century, by General John K. Singlaub, U.S. Army (Ret.)

  with Malcolm McConnell. Copyright © 1991, used with permission.

  All rights reserved.

  This book, or parts thereof, may not be reproduced in any form

  without permission. The scanning, uploading, and distribution of

  this book via the Internet or via any other means without the

  permission of the publisher is illegal and punishable by law. Please

  purchase only authorized electronic editions, and do not participate in

  or encourage electronic piracy of copyrighted materials. Your support

  of the author’s rights is appreciated.

  BERKLEY and the “B” design are trademarks belonging to Penguin

  Putnam Inc.

  Clancy, Tom, 1947

  Shadow warriors: inside the Special Forces / Tom Clancy, with Carl

  Stiner.

  p. cm.

  Includes bibliographical references.

  eISBN : 978-1-436-24570-8

  1. Special force
s (Military science)—United States. 2. U.S. Special

  Operations Command. 3. Low-intensity conflicts (Military science).

  4. United States. Army. Special Forces. I. Stiner, Carl. II. Title.

  UA34.S64 C58 2002

  356’.16—dc21

  2001058914

  http://us.penguingroup.com

  DEDICATION

  This book is dedicated to all the great soldiers, sailors, airmen, and marines with whom and for whom I have been privileged to serve during my thirty-five years of service.

  Among these, an elite brotherhood of warriors deserves the highest possible recognition—our nation’s Special Operations Force, past and present.

  To those who have sacrificed their lives in the defense of our freedoms, we owe our deepest respect and gratitude. And to their families, we offer our deepest sympathy and prayers for their future.

  —General Carl Stiner (Ret.)

  AUTHORS’ NOTE

  During any given week, an average of more than 3,500 Special Operations Forces (SOF) are deployed overseas in some sixty-nine countries. Their missions range from counterdrug assistance and demining to peacekeeping, disaster relief, military training assistance, and many other special mission activities. As such, they function as instruments of U.S. national policy, and develop relationships with the militaries and governments of the host nations in a way that best serves our national interests now and in the future.

  In the writing of this book, we have attempted to include all the information possible about the capabilities of these unique forces, the sacrifices that they make, and the mission areas of their responsibility, as well as just tell some good stories. Needless to say, however, some of these missions and capabilities are sensitive and cannot be revealed for national security reasons. Likewise, the names of some of the personnel, as well as family members, must be protected for personal security reasons. We know the reader will understand that there are some details that are not appropriate for discussion here, and will pardon any necessary omissions.

  —Tom Clancy and General Carl Stiner (Ret.)

  I

  MONDAY, OCTOBER 7, 1985

  Brigadier General Carl Stiner, the commander of the Joint Special Operations Task Force, was returning from his morning run at Fort Bragg, North Carolina, when his J-2 intelligence officer, Colonel Mike Flynn, met him at the gate. “A cruise ship has been hijacked in the Mediterranean,” Flynn told him coolly, but with urgency, “and Americans arc very likely on board.”

  No other organization had the capability to recapture a ship on the high seas, and Stiner knew they would certainly be called in, and soon.

  Stiner was a slender man of six feet, with a crisp but not rigid military bearing and a comfortable, easy look. At the same time, he had always been driven by an underlying intensity and a deep competitiveness. It wasn’t just that he wanted to be the best, or to lead his troops to be the best—all officers want that—but that he had time and again figured out ways to make it happen.

  As he and Flynn hurried toward the headquarters building, Stiner was already processing the news. He knew that Flynn’s sparse information was all that was then available, or else Flynn would have told him more. Even so, he had to begin initial actions based on that slender thread. Through long hours of intense planning, training, and rehearsal, JSOTF had developed force packages for virtually any anticipated crisis situation; these were always ready to go within a few hours, as long as there were airplanes available to haul his men. Based on the planning and rehearsals, Stiner focused on what he had to work out right away: “It’s a tough target... got to get more detailed information,” he thought to himself. “We’ll have a long way to go and have to get on the road as soon as possible... must order up airlift now. And we must find out the location of the ship.”

  As these thoughts went through his mind, he remained calm. When Special Forces have a job to do, the job must be done fast, accurately, and efficiently. It is likely to be extremely complex, with many lives at risk, and many unknown variables. Facing those conditions, people in these units do not waste their time and effort expressing feelings. They are businesslike, always focusing on the mission at hand—looking especially for vulnerabilities that can be exploited to solve the problem in the cleanest, most complete way possible.

  Once he reached the headquarters, he went without pausing to the Joint Operations Center (JOC), a high-tech war room, complete with computer workstations and secure communications to all JSOTF units, the Pentagon, and major commands throughout the world. There he would review the latest intelligence and learn firsthand everything anyone knew about the incident in the Mediterranean. His staff principals had already assembled, waiting for his guidance.

  The Task Force maintained its own twenty-four-hour intelligence center, complete with “watch officers”—military officers and civilians expert at picking out intelligence indicators of an impending crisis—analysts, and databases covering every known terrorist organization. Terminals connected the command with all major news networks, including Reuters and the BBC—the first indication of a developing incident often appeared as a news item. JSOTF also had its own people resident in all U.S. intelligence agencies—always looking for indicators of terrorist activities, as well as already existing information that had not seemed important to analysts in those agencies.

  In most cases, the headquarters learned of terrorist incidents early, and they usually had the most complete information about them.

  Stiner knew that all available intelligence information had already been transmitted by the staff to the units that would be involved. This also meant that all his units would have begun to ready their forces for deployment, while anticipating further guidance from him. They always made maximum use of the time available. In this business, time was a most precious asset.

  BEFORE Stiner had taken this command, previous tours in the Middle East had taught him a lot about terrorists and how they operated. For instance, while he had been the chief of training for the modernization of the Saudi Arabian National Guard from 1975 to 1977, he had had a chance to take the measure of Yasir Arafat and his chief lieutenants. Along with other dignitaries from the region, the Palestinians had been invited to a graduation dinner for an officer candidate class by King Khalid and Prince Abdullah, the commander of the National Guard.

  Arafat’s lieutenants were impressive, no doubt about it. Most of them had advanced degrees from American universities. They were all well-dressed, very sharp, well-spoken, and knowledgeable about world affairs. Arafat was obviously the leader—and clearly an intelligent and remarkable man—but the lieutenants who made things work struck Stiner as truly formidable. In years to come, that impression proved terribly accurate.

  Later, in 1983, Stiner was assigned to Lebanon. There he got a firsthand experience of terrorism and its effects—a U.S. ambassador had been assassinated; while he was there, more than sixty people at the American Embassy. and later more than two hundred U.S. Marines, were killed by bombs.

  In those days, Beirut was not only an armed camp with many hostile factions, but a place where fighting might break out anywhere at any time. No one was safe, and death was an ever-present risk—from snipers, crossfires between factions, ambushes, and indiscriminate shelling by heavy artillery and rocket fire. The shelling sometimes involved thousands of rounds, which reduced entire sections of the city to rubble in half an hour.

  It was not an casy assignment. Yet, for Stiner, it proved to be rewarding. It offered a chance to learn lessons he could get nowhere else.

  You learned how to survive. Or you didn’t.

  You learned whom to trust in a life-or-death situation—and whom, by faction or religious motivation, you could not trust.

  You learned to think like a terrorist.

  THE EVOLUTION OF JSOTF

  The traditional function of wars is to change an existing state of affairs. In the early 1970s, a new form of warfare, or maybe a new way of practicing a very old for
m of warfare, emerged—state-supported terrorism. Nations that were not militarily powerful learned to use terrorist tactics to obtain objectives and concessions they could never win through diplomatic or military means.

  When this new form of warfare broke out, the United States quickly showed itself unprepared to cope with it. It had neither a national policy nor intelligence capabilities aimed at terrorism, nor any military forces adequately trained and prepared to respond to terrorist provocations. Although the United States was the most powerful nation in the world, its military capabilities were focused on the Soviet Union and not on something like this.

  In 1972, Israeli athletes at the Munich Olympics were massacred by Black September terrorists. This outrage might have been avoided if German snipers had had the ability to hit the terrorists as they led the hostages across the airport runway to their getaway plane.

  The Israelis took this lesson to heart, and on July 4, 1976, eighty-six Israeli paratroopers landed at Entebbe Airport in Uganda. Their mission was to rescue the passengers from an Air France airliner hijacked eight days earlier. In a matter of minutes, the paratroopers had rescued ninety-five hostages and killed four terrorists—though at the cost of the lives of two hostages and the paratroop commander. News of the raid flashed all over the world—and pointed out even more sharply America’s inadequacies in fighting terrorism.

  This truth had already been brought out in May 1975: Forty-one American Marines were killed in an attempt to rescue the thirty-nine crewmen of the American merchant ship Mayaguez after it had been seized by the Cambodian government. The rescue attempt had failed.

 

    Changing of the Guard Read onlineChanging of the GuardClear and Present Danger Read onlineClear and Present DangerHounds of Rome Read onlineHounds of RomeBreaking Point Read onlineBreaking PointTom Clancy's Jack Ryan Books 7-12 Read onlineTom Clancy's Jack Ryan Books 7-12Full Force and Effect Read onlineFull Force and EffectThe Archimedes Effect Read onlineThe Archimedes EffectCombat Ops Read onlineCombat OpsInto the Storm: On the Ground in Iraq Read onlineInto the Storm: On the Ground in IraqUnder Fire Read onlineUnder FirePoint of Impact Read onlinePoint of ImpactRed Rabbit Read onlineRed RabbitRainbow Six Read onlineRainbow SixThe Hunt for Red October Read onlineThe Hunt for Red OctoberThe Teeth of the Tiger Read onlineThe Teeth of the TigerConviction (2009) Read onlineConviction (2009)Battle Ready Read onlineBattle ReadyPatriot Games Read onlinePatriot GamesThe Sum of All Fears Read onlineThe Sum of All FearsFallout (2007) Read onlineFallout (2007)Red Storm Rising Read onlineRed Storm RisingThe Cardinal of the Kremlin Read onlineThe Cardinal of the KremlinExecutive Orders Read onlineExecutive OrdersLincoln, the unknown Read onlineLincoln, the unknownThreat Vector Read onlineThreat VectorThe Hunted Read onlineThe HuntedShadow Warriors: Inside the Special Forces Read onlineShadow Warriors: Inside the Special ForcesEnd Game Read onlineEnd GameSpecial Forces: A Guided Tour of U.S. Army Special Forces Read onlineSpecial Forces: A Guided Tour of U.S. Army Special ForcesLocked On Read onlineLocked OnLine of Sight Read onlineLine of SightTom Clancy Enemy Contact - Mike Maden Read onlineTom Clancy Enemy Contact - Mike MadenFighter Wing: A Guided Tour of an Air Force Combat Wing Read onlineFighter Wing: A Guided Tour of an Air Force Combat WingSpringboard Read onlineSpringboardLine of Sight - Mike Maden Read onlineLine of Sight - Mike MadenEndWar Read onlineEndWarDead or Alive Read onlineDead or AliveTom Clancy Support and Defend Read onlineTom Clancy Support and DefendCheckmate Read onlineCheckmateCommand Authority Read onlineCommand AuthorityCarrier: A Guided Tour of an Aircraft Carrier Read onlineCarrier: A Guided Tour of an Aircraft CarrierBlacklist Aftermath Read onlineBlacklist AftermathMarine: A Guided Tour of a Marine Expeditionary Unit Read onlineMarine: A Guided Tour of a Marine Expeditionary UnitCommander-In-Chief Read onlineCommander-In-ChiefArmored Cav: A Guided Tour of an Armored Cavalry Regiment Read onlineArmored Cav: A Guided Tour of an Armored Cavalry RegimentTom Clancy's Jack Ryan Books 1-6 Read onlineTom Clancy's Jack Ryan Books 1-6The Ultimate Escape Read onlineThe Ultimate EscapeAirborne: A Guided Tour of an Airborne Task Force Read onlineAirborne: A Guided Tour of an Airborne Task ForceDebt of Honor Read onlineDebt of HonorCyberspy Read onlineCyberspyPoint of Contact Read onlinePoint of ContactOperation Barracuda (2005) Read onlineOperation Barracuda (2005)Choke Point Read onlineChoke PointPower and Empire Read onlinePower and EmpireEvery Man a Tiger: The Gulf War Air Campaign Read onlineEvery Man a Tiger: The Gulf War Air CampaignEndgame (1998) Read onlineEndgame (1998)EndWar: The Missing Read onlineEndWar: The MissingSplinter Cell (2004) Read onlineSplinter Cell (2004)The Great Race Read onlineThe Great RaceTrue Faith and Allegiance Read onlineTrue Faith and AllegianceDeathworld Read onlineDeathworldGhost Recon (2008) Read onlineGhost Recon (2008)Duel Identity Read onlineDuel IdentityLine of Control o-8 Read onlineLine of Control o-8The Hunt for Red October jr-3 Read onlineThe Hunt for Red October jr-3Hidden Agendas nf-2 Read onlineHidden Agendas nf-2Acts of War oc-4 Read onlineActs of War oc-4Ruthless.Com pp-2 Read onlineRuthless.Com pp-2Night Moves Read onlineNight MovesThe Hounds of Rome - Mystery of a Fugitive Priest Read onlineThe Hounds of Rome - Mystery of a Fugitive PriestInto the Storm: On the Ground in Iraq sic-1 Read onlineInto the Storm: On the Ground in Iraq sic-1Threat Vector jrj-4 Read onlineThreat Vector jrj-4Combat Ops gr-2 Read onlineCombat Ops gr-2Virtual Vandals nfe-1 Read onlineVirtual Vandals nfe-1Runaways nfe-16 Read onlineRunaways nfe-16Marine: A Guided Tour of a Marine Expeditionary Unit tcml-4 Read onlineMarine: A Guided Tour of a Marine Expeditionary Unit tcml-4Shadow Warriors: Inside the Special Forces sic-3 Read onlineShadow Warriors: Inside the Special Forces sic-3Jack Ryan Books 1-6 Read onlineJack Ryan Books 1-6Cold Case nfe-15 Read onlineCold Case nfe-15Changing of the Guard nf-8 Read onlineChanging of the Guard nf-8Splinter Cell sc-1 Read onlineSplinter Cell sc-1Battle Ready sic-4 Read onlineBattle Ready sic-4The Bear and the Dragon jrao-11 Read onlineThe Bear and the Dragon jrao-11Fighter Wing: A Guided Tour of an Air Force Combat Wing tcml-3 Read onlineFighter Wing: A Guided Tour of an Air Force Combat Wing tcml-3Patriot Games jr-1 Read onlinePatriot Games jr-1Jack Ryan Books 7-12 Read onlineJack Ryan Books 7-12Mission of Honor o-9 Read onlineMission of Honor o-9Private Lives nfe-9 Read onlinePrivate Lives nfe-9Operation Barracuda sc-2 Read onlineOperation Barracuda sc-2Cold War pp-5 Read onlineCold War pp-5Point of Impact nf-5 Read onlinePoint of Impact nf-5Red Rabbit jr-9 Read onlineRed Rabbit jr-9The Deadliest Game nfe-2 Read onlineThe Deadliest Game nfe-2Springboard nf-9 Read onlineSpringboard nf-9Safe House nfe-10 Read onlineSafe House nfe-10EndWar e-1 Read onlineEndWar e-1Duel Identity nfe-12 Read onlineDuel Identity nfe-12Deathworld nfe-13 Read onlineDeathworld nfe-13Politika pp-1 Read onlinePolitika pp-1Rainbow Six jr-9 Read onlineRainbow Six jr-9Tom Clancy's Power Plays 1 - 4 Read onlineTom Clancy's Power Plays 1 - 4Endgame sc-6 Read onlineEndgame sc-6Executive Orders jr-7 Read onlineExecutive Orders jr-7Net Force nf-1 Read onlineNet Force nf-1Call to Treason o-11 Read onlineCall to Treason o-11Locked On jrj-3 Read onlineLocked On jrj-3Against All Enemies Read onlineAgainst All EnemiesThe Sum of All Fears jr-7 Read onlineThe Sum of All Fears jr-7Sea of Fire o-10 Read onlineSea of Fire o-10Fallout sc-4 Read onlineFallout sc-4Balance of Power o-5 Read onlineBalance of Power o-5Shadow Watch pp-3 Read onlineShadow Watch pp-3State of War nf-7 Read onlineState of War nf-7Wild Card pp-8 Read onlineWild Card pp-8Games of State o-3 Read onlineGames of State o-3Death Match nfe-18 Read onlineDeath Match nfe-18Against All Enemies mm-1 Read onlineAgainst All Enemies mm-1Every Man a Tiger: The Gulf War Air Campaign sic-2 Read onlineEvery Man a Tiger: The Gulf War Air Campaign sic-2Cybernation nf-6 Read onlineCybernation nf-6Support and Defend Read onlineSupport and DefendNight Moves nf-3 Read onlineNight Moves nf-3SSN Read onlineSSNCutting Edge pp-6 Read onlineCutting Edge pp-6The Cardinal of the Kremlin jrao-5 Read onlineThe Cardinal of the Kremlin jrao-5War of Eagles o-12 Read onlineWar of Eagles o-12Op-Center o-1 Read onlineOp-Center o-1Mirror Image o-2 Read onlineMirror Image o-2The Archimedes Effect nf-10 Read onlineThe Archimedes Effect nf-10Teeth of the Tiger jrj-1 Read onlineTeeth of the Tiger jrj-1Bio-Strike pp-4 Read onlineBio-Strike pp-4State of Siege o-6 Read onlineState of Siege o-6Debt of Honor jr-6 Read onlineDebt of Honor jr-6Zero Hour pp-7 Read onlineZero Hour pp-7Ghost Recon gr-1 Read onlineGhost Recon gr-1Command Authority jr-10 Read onlineCommand Authority jr-10Tom Clancy's Power Plays 5 - 8 Read onlineTom Clancy's Power Plays 5 - 8Checkmate sc-3 Read onlineCheckmate sc-3Breaking Point nf-4 Read onlineBreaking Point nf-4Gameprey nfe-11 Read onlineGameprey nfe-11The Hunted e-2 Read onlineThe Hunted e-2Hidden Agendas Read onlineHidden AgendasDivide and Conquer o-7 Read onlineDivide and Conquer o-7