OMEGA, CIA/JSOC (Joint Special Operations Command) “Hunter-Killer Teams” and “Targeted Killings (4 articles)

I. What is Task Force Orange in the army?

Wilson Nicole 07/25/2021

What is Task Force Orange In the Army?

Table of Contents

What is Task Force Orange in the army?
Is Task Force 88 real?
What does the ISA do?
What is Orange Group military?
What does omega mean in military?
Who makes JSOC?

What is Task Force Orange in the army?

The unit is often referred to within JSOC as Task Force Orange. Originally subordinated to the US Army Intelligence and Security Command (INSCOM), it is one of the least known intelligence components of the United States military, tasked with collecting actionable intelligence during or prior to JSOC missions.
Is Task Force 88 real?

Task Force 88 is an American special operations unit formed since 11 September 2001, of which little is publicly known. It is described as a “hunter-killer team” with its core made up of Delta Force, 75th Ranger Regiment Rangers, members of the USAF 24th Special Tactics Squadron, and Navy DEVGRU operators.

Are Omega ops real?

OMEGA is a Joint CIA-JSOC unit of “Hunter/Killer Teams.” It’s essentially a combination of the best of the best in military operations and intelligence, with the CIA providing targeting intelligence, and JSOC (Joint Special Operations Command) providing Special Ops soldiers to do the heavy lifting.
What does the ISA do?

The ISA specializes in gathering human intelligence, signals intelligence and combat. Their unique abilities are called upon when other special operations forces have not been able to complete their mission due to a gap in intelligence.

What is Orange Group military?

When The Activity provides its people to a joint special operations task force, it’s known as “Orange.” When its case officers, some of them women, recruit sources and sneak into countries to operationally prepare the battlefield, it is known by whatever nickname is given to the mission.

What did Task Force Black do?

According to journalist Sean Rayment for the Telegraph, TF Black removed or killed 3,500 terrorists in Baghdad prior to 2008. Rayment wrote that these killings “reduced bombings in Baghdad from about 150 a month to just two.”
What does omega mean in military?

OMEGA: the end

Joint Task Force OMEGA was named after omega Greek letter meaning “the end” in allusion to the possible end of the armed conflict.

Who makes JSOC?

JSOC’s core includes the Army’s Delta Force, the Navy’s SEAL Team 6, the Air Force’s 24th Special Tactics Squadron, and the Army’s 160th Special Operations Aviation Regiment and 75th Ranger Regiment. The lethality of JSOC was demonstrated in the December 2001 mountain battle at Tora Bora.

II. Hunter-Killer Teams: Attacking Enemy Safe Havens (by Joseph D. Celeski, JSOU Report 10-1; pdf from Joint Special Operations University, 2010)

Hunter-Killer Teams: Attacking Enemy Safe Havens (2010 pdf from Joint Special Operations University)

Joint Special Operations University and the Strategic Studies Department

The Joint Special Operations University (JSOU) provides its publications to contribute toward expanding the body of knowledge about joint special operations. JSOU publications advance the insights and recommendations of national security professionals and the Special Operations Forces (SOF) students and leaders for consideration by the SOF community and defense leadership.

JSOU is the educational component of the United States Special Operations Command (USSOCOM), MacDill Air Force Base, Florida. The JSOU mission is to educate SOF executive, senior, and intermediate leaders and selected other national and international security decision makers, both military and civilian, through teaching, outreach, and research in the science and art of joint special operations. JSOU provides education to the men and women of SOF and to those who enable the SOF mission in a joint and interagency environment.

JSOU conducts research through its Strategic Studies Department where effort centers upon the USSOCOM and United States SOF missions: USSOCOM mission. USSOCOM provides fully capable and enabled SOF to defend the nation’s interests in an environment characterized by irregular warfare.

USSOF mission. USSOF conducts special operations to prepare the operational environment, prevent crisis, and respond with speed, aggression, and lethality to achieve tactical through strategic effect. The Strategic Studies Department also provides teaching and curriculum support to Professional Military Education institutions—the staff colleges and war colleges. It advances SOF strategic influence by its interaction in academic, interagency, and United States military communities.

The JSOU portal is https://jsoupublic.socom.mil.

III. SOFREP-The Legality of Joint CIA/JSOC Renditions and Targeted Killings

June 25, 2015

The Legality of Joint CIA/JSOC Renditions and Targeted KillingsLucas H 7 Comments Black Ops & Intel

The NYT article about SEAL Team 6 a few weeks ago sparked yet another media frenzy on the military’s accountability and their involvement in shadow wars around the globe. For obvious reasons, writing about sexy spy missions or covert military operations behind enemy lines always attracts a lot of attention. However, just as Frumentarius suggested in his recent article, don’t believe everything you read, and especially not if almost all of these sexy stories happen to come from the same group of authors.

Related Posts

OMEGA: The Joint CIA-JSOC Hunter/Killer Teams
The No-Longer-Secret History of SEAL Team 6
Intelligence Support Activity, JSOC’s Most Secretive Unit
JSOC, Hostage Rescue Track Record
JSOC Covert Ops in the Philippines?

Having said that, Jack’s recent article on the Omega Program, and especially the points made in the comments section, led me to write this piece on the legitimacy of such joint programs, bringing forward a discrepancy between the limitations imposed on the civilian intelligence community ( CIA) and the lack thereof in its military counterpart (JSOC).

To fully comprehend the restrictions imposed on the U.S. government for conducting such deniable actions, a clear understanding of covert operations is required. Unlike clandestine operations, which are sponsored or conducted by government departments in such a way as to assure secrecy or concealment, covert action is defined as an activity or activities to influence political, economic, or military conditions abroad, where it is intended that the role of the sponsoring government will not be apparent or acknowledged publicly.

Clearly, the integral part of covert actions is the plausible deniability factor. Understandably, due to the secrecy surrounding such activities, covert operations often “involve things like front organizations, disinformation, deception, counterfeit documents, cover-ups, high-tech gadgets, and conspiracies galore” (O’Connor, Covert Action). It makes sense therefore that there are far more stringent legal restrictions for covert actions compared to clandestine actions.

Traditional military activities

According to the 1991 Intelligence Authorization Act (IAA), which was implemented as a result of scandals and abuses of covert activities during the Reagan administration, there are two central requirements for covert actions to be authorized. First, the president must state in a written finding that the action is necessary to support identifiable foreign policy objectives of the United States and is important to the national security of the United States, and second, the congressional intelligence committee must be fully and currently informed of all covert actions.

As long as those two parameters were fulfilled, both the CIA and military special operations units were eligible to conduct covert activities. However, the IAA also states that “traditional …military activities or routine support to such activities” (U.S. Congress, IAA 1991, §413b(a)-(b)) are not categorized as covert actions and would therefore waive a presidential finding and congressional approval. While the IAA itself does not define ‘traditional military activities,’ according to the conference committee report, the phrase is meant to include actions “preceding and related to hostilities which are either anticipated…to involve U.S. military forces, or where such hostilities involving the United States military forces are on-going” (Kibbe, The Rise of Shadow Warriors).

This means that, during wartime, covert operations by military personnel are legally permitted without a presidential finding or congressional notification. However, among U.S. decision makers, the problem lies in the interpretation of the word ‘anticipated,’ which led Pentagon officials to believe that they have been empowered to conduct covert activities ‘years in advance’ of any overt U.S. military involvement.

Critics charged that after 9/11, “the Bush administration was shifting ever more covert activity from the CIA to the military in a deliberate strategy to exploit the ‘traditional military activities’ loophole and evade congressional oversight” (Kibbe, Conducting Shadow Wars, p381). This was demonstrated by Rumsfeld’s determination “to make sure that special operations forces could obtain the authority for both deployment and the use of lethal force in minutes and hours, not days and weeks” (Smith, Killer Elite, p235). In addition, the DoD assumed the position that the United States was in active war against terrorism, and therefore concluded that any military activity “meets the ‘traditional military activities’ exception to the covert action definition – meaning that any actions taken in pursuit of it need not be justified by a presidential finding and Congress need not be informed about them” (Kibbe, The Rise of Shadow Warriors).

However, critics of Rumsfeld’s intentions insisted that because military personnel engaged in international armed conflict must adhere to the international laws of war in the Geneva Convention, only the CIA has the legislative support to conduct covert actions due to their relative freedom from such international constraints. Some even suggested “the use of formal military force to conduct a covert military operation amounts to an act of war in terms of international law” (McAndrew, Wrangling in the Shadows, p158). They claimed that “unaffiliated, intentional concealment of military personnel among the civilian population blurs the line between civilians and combatants” (p158) which would classify as an unlawful activity.

Post 9/11, it became evident that pre-9/11, a gap existed between “DoD’s capability for [covert] operations and its authority under the United States Code” (Shultz, Showstoppers). This drastically changed after 9/11 because the CIA had “a far more limited ability to mount snatch operations in a hostile environment” (Smith, Killer Elite, p213), they conducted joint operations with military special operations teams to deploy to northern Afghanistan, establish a network of friendly Afghan sources, and help “Afghans rid their own country of a foreign menace” (Tenet, At the Center of the Storm, p315).

In addition to signing a “Memorandum of Notification, effectively removing any barrier to the assassination of Bin Laden” (Smith, Killer Elite, p216), the administration approved the Authorization for Use of Military Force (AUMF) Senate Joint Resolution 23. The resolution authorized the President “to use all necessary and appropriate force against those nations, organizations, or persons he determines planned, authorized, committed, or aided the terrorist attacks that occurred on September 11, 2001, or harbored such organizations or persons, in order to prevent any future acts of international terrorism against the United States by such nations, organizations or persons” (U.S. Congress, AUMF, §2(a)).

Rumsfeld thereafter “increased the authority of SOCOM from a purely ‘supporting command,’ which can only contribute to other combatant commands’ missions, into a ‘supported command,’ which plan and execute its own independent operations” (McAndrew, Wrangling in the Shadows, p157). This in turn reduced the amount of consideration, oversight and accountability given to operations conducted by special operations forces. In addition, while looking for “a unit that could actually carry out the manhunts [Rumsfeld] was demanding, a secret Pentagon report singled out the Intelligence Support Activity (ISA) as having the potential, if nurtured, to fight the kind of war the Secretary envisages fighting” (Smith, Killer Elite, p234).

Shortly thereafter, the Activity was moved out of army intelligence and was placed under direct control of JSOC. However, given that the joint resolution’s authorization to use force is too vague, administration critics have argued that it does not meet the criteria of either a declaration of war or of ‘traditional military activities.’ The problem herein lies with the fact that the legislation that governs covert actions have been written with the Cold War in mind and were therefore not intended for the current threat environment of global terrorism. Even so, most, “on Capitol Hill, and in the general public, would no doubt argue that in the fight against terrorism, the U.S. government should be able to use every tool it has without worrying about presidential findings or congressional notification” (Kibbe, The Rise of Shadow Warriors).

Oversight, OPBs and SAPsHowever, according to experts, “whether covert operations are receiving the appropriate oversight becomes an even more complex issue when one considers the question of which congressional committee(s) should be doing the oversight” (Kibbe, Conducting Shadow Wars, p382). Although the House and Senate Intelligence Committees are legally responsible to establish what covert operations entail, because of the Pentagons interpretation of ‘traditional military activities,’ it tends to send its funding requests directly to the Armed Services Committee.

And even if the House and Senate Intelligence Committees would somehow get involved in the process of sponsoring covert activities, because the intelligence budget is a part of the defense budget, it gives the Armed Service Committee financial power over them. In addition, by labeling various covert activities as ‘Operational Preparation of the Battlespace’ (OPB), the DoD reduces them to ‘traditional military activities’ and therefore avoids these activities from being administered and supervised by the intelligence committees.

While some politicians on Capitol Hill expressed concern that the, “DoD has shown a propensity to apply the [OPB] label where the slightest nexus of a theoretical, distant military operation might one day exist” (House of Representatives, Intelligence Authorization Act for Fiscal Year 2010, p49), the administration has various other tools at their disposal to keep such actions away from public scrutiny and congressional oversight. They can, for example, authorize certain covert activities under Special Access Programs (SAPs). These are security protocols used to classify certain operations beyond top secret.

The laws in effect of governing congressional oversight of SAPs state that the Secretary of Defense must submit an annual report on SAPs listing a brief description including each program’s major milestones, the annual cost of each program, and the estimated cost of each program for the future. In addition to acknowledged SAPs, there are unacknowledged SAPs, for which any requirement to include certain information in a report can be waived by the Secretary of Defense if the inclusion of such information suggests that the report would adversely affect the national security.

This restricts access to such information to literally a hand full of people in the administration. Ultimately, “Rumsfeld found a way to head off any arguments within the military, persuading Bush to sign National Security Presidential Directive 38, which authorized US special operations troops to ‘find and finish’ terrorist targets. Under US law, if not international law, that presidential finding made any extra judicial killings carried out by the JSOC special mission units legal” (Smith, Killer Elite, p268).

Loophole or Illegal?It becomes clear that there are certain discrepancies between what old legislation about covert operations and shadow wars permit, and how these regulations have been interpreted today with an entirely different threat environment. Prior to the September 11 attacks, the CIA was the leading agency in matters of covert political action and deniable paramilitary operation.

However, while assessments produced by the CIA were customarily intended for the long term, the introduction of terrorist atrocities against the western world prompted the Agency to reorganize itself and try to adapt to the new threat environment. Strategic intelligence on a national level was largely substituted for tactical, real-time intelligence. Nonetheless, senior officials in U.S. administration believed that, “the CIA was unable, or unwilling, to provide the military with the information it needed to effectively challenge stateless terrorism” (Hersch, The Coming Wars), and instead established, “JSOC as the lead agency in the counterterrorism battle” (Kibbe, Conducting Shadow Wars, p379).

To delineate and legalize such covert DoD activities, the Bush and Obama administrations have approved and implemented various resolutions and programs, and restructured the military’s Special Operations Command, allowing JSOC to operate faster, with less oversight, and on a global scale. Today, the executive branch and its top Tier military forces are, “enhancing [their] global network of special operations forces to support … interagency [activities] and international partners in order to gain expanded situational awareness of emerging threats and opportunities” (Turse, The rise of the military’s secret military).

This article has at least somewhat established that, within U.S. law, JSOCs limited accountability issues often times allows its units to operate faster and more efficient than their civilian counterpart. With the realization that, “intelligence has never been more important in world politics than…at the opening of the twenty-first century” (Scott & Jackson, Understanding Intelligence in the Twenty-First Century, p.xi), intelligence officials have tried to combine the two competing government branches in an effort that would maximize the advantages and minimize the risks and constraints of each group. However, because the legal restrictions for conducting deniable intelligence activities by the CIA have not changed, meaning that there still has to be a presidential finding and congressional notification, “using the military for such operations is – at least under one interpretation of the law – much easier than using the CIA” (Kibbe, The Rise of Shadow Warriors).

Sources:

George Tenet, At the Center of the Storm: My Years at the CIA, New York, HarperCollins, 2007.
House of Representatives, 111th Congress, Report 111-186 accompanying H.R. 2701, Intelligence Authorization Act for Fiscal Year 2010, Washington, Government Printing Office, 2009
Jennifer D. Kibbe, Conducting Shadow Wars, Journal of National Security Law & Policy, 5:2, 2012.
Jennifer D. Kibbe, Covert Action and the Pentagon, Intelligence and National Security, 22:1, 2007.
Jennifer D. Kibbe, The Rise of Shadow Warriors, Foreign Affairs, 2004.
John G. Heidenrich, The Intelligence Community’s Neglect of Strategic Intelligence, The State of Strategic Intelligence, CSI Publication, 51:2, 2007.
L.V. Scott & P.D. Jackson, Understanding Intelligence in the Twenty-First Century, London, Routledge, 2004.
Michael McAndrew, Wrangling in the Shadows: The Use of United States Special Forces in Covert Military Operations in the War on Terror, Boston College International and Comparative Law Review, 29:1, 2006.
Michael Smith, Killer Elite: Inside America’s most secret special forces, London, Orion Books Ltd, 2011.
Nick Turse, The rise of the military’s secret military, Salon.com, 2014.
Richard Shultz, Showstoppers, The Weekly Standard, 9:19, 2004.
Seymour Hersch, The Coming Wars, The New Yorker, January 2005 Issue.
Special Access Programs: Congressional Oversight [as amended by the U. Government Printing Office, Title 10 U.S.C. §119a(1)-(2), 2011].
Special Access Programs: Congressional Oversight, 119e(1).
Spencer Ackerman, How the Pentagon’s Top Killers Became (Unaccountable) Spies, Danger Room, 2012.
Thomas H. Kean (Chair), The 9/11 Commission Report, National Commission on Terrorist Attacks Upon the United States, Washington, 2004.
Thomas O’Connor, Covert Action and Targeted Killing, [Blog] drtomoconnor, available at: http://www.drtomoconnor.com/3030/3030lect05a.htm.
U.S. Congress, Authorisation for Use of Military Force, Public Law 107-40, 115 Stat. 224, §2(a).
U.S. Congress, Intelligence Authorisation Act of 1991, §413b(a)-(b).

About the Author

Lucas H enjoys a birds eye view of the European SOF community and maintains close links to his provenance as a neutral assaulter on a Swiss SF team while tending a herd of cows on a remote alpine meadow. Besides preserving his prowess as a weapons sergeant and mobility troop instructor, Lucas enjoys attending live re-enactments of Liechtenstein’s participation to the Third War of Italian Unification. With a cloak and dagger advanced degree from an undetermined university, the 6-year veteran continues to serve the community with a one man program offering conjugal visits to women’s prisons all over the country. Lucas is currently traveling the world in search of new adventures that tie in with his love for the SOF community – suggestions are always welcome.

IV. How Joint Special Operations Command Became America’s ‘Perfect Hammer’

America’s most elite special operations units have increasingly found themselves in the spotlight. After the rescue of Captain Richard Phillips…

By Christian Beekman | Published Sep 2, 2015 9:00 AM

How Joint Special Operations Command Became America’s “Perfect Hammer”

America’s most elite special operations units have increasingly found themselves in the spotlight. After the rescue of Captain Richard Phillips from Somali pirates and Operation Neptune Spear, the Naval Special Warfare Development Group, colloquially known as DEVGRU or SEAL Team 6, became the subject of immense public interest. But many outside the military have never heard about the shadowy command that SEAL Team Six, Delta Force, and other special missions units answer to: the Joint Special Operations Command.

The best weighted vests to keep you fit for your next mission

JSOC oversees planning for joint unconventional operations, and conducts much of the “black” side of special operations. A new book, “Relentless Strike: The Secret History of Joint Special Operations Command,” from author and former Army Times journalist Sean Naylor aims to highlight JSOC’s history over the past 30 years. It also illustrates how JSOC moved to the forefront of combating insurgencies in Iraq and Afghanistan.

“Relentless Strike” isn’t the first time Naylor has covered the units under JSOC. His previous book, “Not a Good Day To Die:The Untold Story of Operation Anaconda”is a quintessential account of the March 2002 battle in Afghanistan’s Shahikot Valley, an operation that Naylor was present for as an embedded reporter. Operators from Delta Force, SEAL Team 6, and other JSOC units played a pivotal role in Anaconda, so Naylor is covering some familiar ground. Much like his previous book, Naylor explores the full breadth of the units and personnel involved. From the high-level politicking surrounding JSOC’s formation to the individual operators kicking doors in Iraq, “Relentless Strike” isn’t daunted by the scale of JSOC’s operations.

At the center of the book is the narrative of how JSOC evolved from a small organization with a highly specific counterterrorism mission to the the direct-action juggernaut it is today. The first part of “Relentless Strike” deals with JSOC’s genesis in the wake of the failed Operation Eagle Claw, the disastrous attempt to rescue American hostages held in revolutionary Iran in April 1980. Then, JSOC was mainly focused on a limited set of counterterrorism missions, like the rash of the airplane hijackings and hostage takings during the 1980s. While Delta and the rest of JSOC came close to actually getting the green light on various rescues during their two decades of operational status, their first operations successes came in support of more conventional operations in Grenada and Panama.

The book’s other narrative thrust starts here: the tendency of JSOC being handed difficult mission sets, regardless of whether JSOC was really suited for the problem; highlighting the missions given to SEAL Team 6 in Grenada in 1983, and a regular SEAL team’s airfield assault in Panama in 1989. The book also delves into some of the inauspicious details of JSOC’s birth; such as the fly-by-night antics of SEAL Team 6 founder Richard Marcinko, whose hard-drinking training regimen and unauthorized unit expenditures tainted the unit’s reputation to the point that Chairman of the Joint Chiefs Gen. Colin Powell considered disbanding the unit all together in the early 1990s.

The rest of the book is dedicated to the growth of JSOC after the Sept. 11 attacks. The command had expanded to include the the 21st Special Tactics Squadron, the Intelligence Support Activity, and several other units. JSOC personnel spearheaded both the invasions of Iraq and Afghanistan, in which they conducted some truly remarkable operations, but the the command went into overdrive when Gen. Stanley McChrystal was tapped to lead it in 2003. Mcchrystal ushered in a new era of “industrial counterterrorism”, turning JSOC from an occasional player to a direction action killing machine that was focused on breaking the back of al-Zarqawi’s Al-Qaeda in Iraq. It’s surprising how much of the book only describes the past decade of operations; Naylor describes raid after raid that demonstrates how much JSOC’s operational tempo really increased. “Relentless Strike” also covers how these increased operation needs led to an evolution of the 75th Ranger Regiment, which stepped up to cover many of the same raid targets that Delta Force and SEAL Team 6 were tasked with in Iraq and Afghanistan.

A book with such a wide scope like “Relentless Strike” could easily get bogged down in the details, but Naylor displays an excellent command of the layers of jargon and acronyms when it comes to the the rather opaque world of special operations. Given that many of the sources for “Relentless Strike” remained anonymous, Naylor is also able to provide a wide spectrum of perspectives, from the strategic musing of Pentagon officials to pointed critiques from individual operators. Without these wide-ranging viewpoints, “Relentless Strike” could not nearly be as all-encompassing as it is.

There’s been consistent public appetite for information about special operations in particular units like Delta and Team 6, and “Relentless Strike” will absolutely satisfy that curiosity. But it goes beyond that, analyzing how, in Naylor’s terms, America’s “perfect hammer” for the War on Terror was built and acknowledges the command’s success while questioning whether JSOC is really the best solution for every difficult military problem. “Relentless Strike” is the most comprehensive dive into JSOC’s history to date, and an absolute necessity for any looking to fully understand the full extend of the past 15 years of war.

“Relentless Strike: The Secret History of Joint Special Operations Command” by Sean Naylor is available for purchase beginning Sept 1.