Table of Contents

  Title Page

  Copyright Page

  Dedication

  I - MONDAY, OCTOBER 7, 1985

  II - PIONEERS

  III - WARRIORS’ WARRIOR

  IV - COUNTRY CARL

  V - FEW ARE CALLED, FEWER ARE CHOSEN

  VI - VIETNAM

  VII - BETWEEN THE WARS

  VIII - THE LEBANON TRAGEDY

  IX - THE ACHILLE LAURO STRIKE

  X - PANAMA: OPERATION BLUE SPOON

  XI - PANAMA: OPERATION JUST CAUSE

  XII - SHADOWS IN THE STORM

  XIII - BULLDOG AND HIS PACK: AN INCIDENT IM THE WAR

  XIV - THE FACE OF THE FUTURE

  XV - TUESDAY, SEPTEMBER 11, 2001

  APPENDIX I: - THE UNITED STATES SPECIAL OPERATIONS COMMAND: A BRIEF HISTORY

  APPENDIX II: - LEADERSHIP

  Acknowledgements

  BIBLIOGRAPHY

  INDEX

  An unconventional war requires unconventional men—the Special Forces.

  Green Berets Navy SEALS • Rangers •

  Air Force Special Operations • PsyOps • Civil Affairs •

  and other special-mission units

  The first two Commanders books, Every Man a Tiger and Into the Storm, provided masterly blends of history, biography, you-are-there narrative, insight into the practice of leadership, and plain old-fashioned storytelling. Shadow Warriors is all of that and more, a book of uncommon timeliness, for, in the words of Lieutenant General Bill Yarborough, “there are itches that only Special Forces can scratch.”

  Now, Carl Stiner—the second commander of SOCOM, the U.S. Special Operations Command—and Tom Clancy trace the transformation of the Special Forces from the small core of outsiders of the 1950s, through the cauldron of Vietnam, to the rebirth of the SF in the late 1980s and 1990s, and on into the new century as the bearer of the largest, most mixed, and most complex set of missions in the U.S. military.

  These are firsthand accounts of soldiers fighting outside the lines: counterterrorism, raids, hostage rescues, reconnaissance, counterinsurgency, and psychological operations—from Vietnam and Laos to Lebanon, Panama, Saudi Arabia, Kuwait, Iraq, and the new wars of today...

  “Some action vignettes from [Special Forces] roots in WWII and Vietnam rival Clancy fiction.”—Kirkus Reviews

  “The plethora of insider history and firsthand operation specifics... will please the historically minded.”—Publishers Weekly

  NOVELS BY TOM CLANCY

  The Hunt for Red October

  Red Storm Rising

  Patriot Games

  The Cardinal of the Kremlin

  Clear and Present Danger

  The Sum of All Fears

  Without Remorse

  Debt of Honor

  Executive Orders

  Rainbow Six

  The Bear and the Dragon

  Red Rabbit

  The Teeth of the Tiger

  SSN: Strategies of Submarine Warfare

  NONFICTION

  Submarine: A Guided Tour Inside a Nuclear Warship

  Armored Cav: A Guided Tour of an Armored Cavalry Regiment

  Fighter Wing: A Guided Tour of an Air Force Combat Wing

  Marine: A Guided Tour of a Marine Expeditionary Unit

  Airborne: A Guided Tour of an Airborne Task Force

  Carrier: A Guided Tour of an Aircraft Carrier

  Special Forces: A Guided Tour of U.S. Army Special Forces

  Into the Storm: A Study in Command

  (written with General Fred Franks, Jr., Ret., and Tony Koltz)

  Every Man a Tiger

  (written with General Charles Horner, Ret., and Tony Koltz)

  Shadow Warriors: Inside the Special Forces

  (written with General Carl Stiner, Ret., and Tony Koltz)

  Battle Ready

  (written with General Tony Zinni, Ret., and Tony Koltz)

  CREATED BY TOM CLANCY

  Tom Clancy’s Splinter Cell

  Tom Clancy’s Splinter Cell: Operation Barracuda

  Tom Clancy’s Splinter Cell: Checkmate

  CREATED BY TOM CLANCY AND STEVE PIECZENIK

  Tom Clancy’s Op-Center

  Tom Clancy’s Op-Center: Mirror Image

  Tom Clancy’s Op-Center: Games of State

  Tom Clancy’s Op-Center: Acts of War

  Tom Clancy’s Op-Center: Balance of Power

  Tom Clancy’s Op-Center: State of Siege

  Tom Clancy’s Op-Center: Divide and Conquer

  Tom Clancy’s Op-Center: Line of Control

  Tom Clancy’s Op-Center: Mission of Honor

  Tom Clancy’s Op-Center: Sea of Fire

  Tom Clancy’s Op-Center: Call to Treason

  Tom Clancy’s Op-Center: War of Eagles

  Tom Clancy’s Net Force

  Tom Clancy’s Net Force: Hidden Agendas

  Tom Clancy’s Net Force: Night Moves

  Tom Clancy’s Net Force: Breaking Point

  Tom Clancy’s Net Force: Point of Impact

  Tom Clancy’s Net Force: CyberNation

  Tom Clancy’s Net Force: State of War

  Tom Clancy’s Net Force: Changing of the Guard

  Tom Clancy’s Net Force: Springboard

  Tom Clancy’s Net Force: The Archimedes Effect

  CREATED BY TOM CLANCY AND MARTIN GREENBERG

  Tom Clancy’s Power Plays: Politika

  Tom Clancy’s Power Plays: ruthless. com

  Tom Clancy’s Power Plays: Shadow Watch

  Tom Clancy’s Power Plays: Bio-Strike

  Tom Clancy’s Power Plays: Cold War

  Tom Clancy’s Power Plays: Cutting Edge

  Tom Clancy’s Power Plays: Zero Hour

  Tom Clancy’s Power Plays: Wild Card

  Most Berkley Books are available at special quantity discounts for bulk purchases for sales promotions, premiums, fund-raising, or educational use. Special books, or book excerpts, can also be created to fit specific needs.

  For details, write: Special Markets, The Berkley Publishing Group, 375 Hudson Street, New York, New York 10014.

  A Berkley Book

  Published by The Berkley Publishing Group

  A division of Penguin Putnam Inc.

  375 Hudson Street

  New York, New York 10014

  Copyright © 2002 by C. P. Commanders, Inc.

  Passage from Best Laid Plans by David C. Martin and John Walcott,

  copyright © 1988 by David C. Martin and John Walcott. .

  Chapter II based in part on Hazardous Duty: An American Soldier in

  the Twentieth Century, by General John K. Singlaub, U.S. Army (Ret.)

  with Malcolm McConnell. Copyright © 1991, used with permission.

  All rights reserved.

  This book, or parts thereof, may not be reproduced in any form

  without permission. The scanning, uploading, and distribution of

  this book via the Internet or via any other means without the

  permission of the publisher is illegal and punishable by law. Please

  purchase only authorized electronic editions, and do not participate in

  or encourage electronic piracy of copyrighted materials. Your support

  of the author’s rights is appreciated.

  BERKLEY and the “B” design are trademarks belonging to Penguin

  Putnam Inc.

  Clancy, Tom, 1947

  Shadow warriors: inside the Special Forces / Tom Clancy, with Carl

  Stiner.

  p. cm.

  Includes bibliographical references.

  eISBN : 978-1-436-24570-8

  1. Special forces
(Military science)—United States. 2. U.S. Special

  Operations Command. 3. Low-intensity conflicts (Military science).

  4. United States. Army. Special Forces. I. Stiner, Carl. II. Title.

  UA34.S64 C58 2002

  356’.16—dc21

  2001058914

  http://us.penguingroup.com

  DEDICATION

  This book is dedicated to all the great soldiers, sailors, airmen, and marines with whom and for whom I have been privileged to serve during my thirty-five years of service.

  Among these, an elite brotherhood of warriors deserves the highest possible recognition—our nation’s Special Operations Force, past and present.

  To those who have sacrificed their lives in the defense of our freedoms, we owe our deepest respect and gratitude. And to their families, we offer our deepest sympathy and prayers for their future.

  —General Carl Stiner (Ret.)

  AUTHORS’ NOTE

  During any given week, an average of more than 3,500 Special Operations Forces (SOF) are deployed overseas in some sixty-nine countries. Their missions range from counterdrug assistance and demining to peacekeeping, disaster relief, military training assistance, and many other special mission activities. As such, they function as instruments of U.S. national policy, and develop relationships with the militaries and governments of the host nations in a way that best serves our national interests now and in the future.

  In the writing of this book, we have attempted to include all the information possible about the capabilities of these unique forces, the sacrifices that they make, and the mission areas of their responsibility, as well as just tell some good stories. Needless to say, however, some of these missions and capabilities are sensitive and cannot be revealed for national security reasons. Likewise, the names of some of the personnel, as well as family members, must be protected for personal security reasons. We know the reader will understand that there are some details that are not appropriate for discussion here, and will pardon any necessary omissions.

  —Tom Clancy and General Carl Stiner (Ret.)

  I

  MONDAY, OCTOBER 7, 1985

  Brigadier General Carl Stiner, the commander of the Joint Special Operations Task Force, was returning from his morning run at Fort Bragg, North Carolina, when his J-2 intelligence officer, Colonel Mike Flynn, met him at the gate. “A cruise ship has been hijacked in the Mediterranean,” Flynn told him coolly, but with urgency, “and Americans arc very likely on board.”

  No other organization had the capability to recapture a ship on the high seas, and Stiner knew they would certainly be called in, and soon.

  Stiner was a slender man of six feet, with a crisp but not rigid military bearing and a comfortable, easy look. At the same time, he had always been driven by an underlying intensity and a deep competitiveness. It wasn’t just that he wanted to be the best, or to lead his troops to be the best—all officers want that—but that he had time and again figured out ways to make it happen.

  As he and Flynn hurried toward the headquarters building, Stiner was already processing the news. He knew that Flynn’s sparse information was all that was then available, or else Flynn would have told him more. Even so, he had to begin initial actions based on that slender thread. Through long hours of intense planning, training, and rehearsal, JSOTF had developed force packages for virtually any anticipated crisis situation; these were always ready to go within a few hours, as long as there were airplanes available to haul his men. Based on the planning and rehearsals, Stiner focused on what he had to work out right away: “It’s a tough target... got to get more detailed information,” he thought to himself. “We’ll have a long way to go and have to get on the road as soon as possible... must order up airlift now. And we must find out the location of the ship.”

  As these thoughts went through his mind, he remained calm. When Special Forces have a job to do, the job must be done fast, accurately, and efficiently. It is likely to be extremely complex, with many lives at risk, and many unknown variables. Facing those conditions, people in these units do not waste their time and effort expressing feelings. They are businesslike, always focusing on the mission at hand—looking especially for vulnerabilities that can be exploited to solve the problem in the cleanest, most complete way possible.

  Once he reached the headquarters, he went without pausing to the Joint Operations Center (JOC), a high-tech war room, complete with computer workstations and secure communications to all JSOTF units, the Pentagon, and major commands throughout the world. There he would review the latest intelligence and learn firsthand everything anyone knew about the incident in the Mediterranean. His staff principals had already assembled, waiting for his guidance.

  The Task Force maintained its own twenty-four-hour intelligence center, complete with “watch officers”—military officers and civilians expert at picking out intelligence indicators of an impending crisis—analysts, and databases covering every known terrorist organization. Terminals connected the command with all major news networks, including Reuters and the BBC—the first indication of a developing incident often appeared as a news item. JSOTF also had its own people resident in all U.S. intelligence agencies—always looking for indicators of terrorist activities, as well as already existing information that had not seemed important to analysts in those agencies.

  In most cases, the headquarters learned of terrorist incidents early, and they usually had the most complete information about them.

  Stiner knew that all available intelligence information had already been transmitted by the staff to the units that would be involved. This also meant that all his units would have begun to ready their forces for deployment, while anticipating further guidance from him. They always made maximum use of the time available. In this business, time was a most precious asset.

  BEFORE Stiner had taken this command, previous tours in the Middle East had taught him a lot about terrorists and how they operated. For instance, while he had been the chief of training for the modernization of the Saudi Arabian National Guard from 1975 to 1977, he had had a chance to take the measure of Yasir Arafat and his chief lieutenants. Along with other dignitaries from the region, the Palestinians had been invited to a graduation dinner for an officer candidate class by King Khalid and Prince Abdullah, the commander of the National Guard.

  Arafat’s lieutenants were impressive, no doubt about it. Most of them had advanced degrees from American universities. They were all well-dressed, very sharp, well-spoken, and knowledgeable about world affairs. Arafat was obviously the leader—and clearly an intelligent and remarkable man—but the lieutenants who made things work struck Stiner as truly formidable. In years to come, that impression proved terribly accurate.

  Later, in 1983, Stiner was assigned to Lebanon. There he got a firsthand experience of terrorism and its effects—a U.S. ambassador had been assassinated; while he was there, more than sixty people at the American Embassy. and later more than two hundred U.S. Marines, were killed by bombs.

  In those days, Beirut was not only an armed camp with many hostile factions, but a place where fighting might break out anywhere at any time. No one was safe, and death was an ever-present risk—from snipers, crossfires between factions, ambushes, and indiscriminate shelling by heavy artillery and rocket fire. The shelling sometimes involved thousands of rounds, which reduced entire sections of the city to rubble in half an hour.

  It was not an casy assignment. Yet, for Stiner, it proved to be rewarding. It offered a chance to learn lessons he could get nowhere else.

  You learned how to survive. Or you didn’t.

  You learned whom to trust in a life-or-death situation—and whom, by faction or religious motivation, you could not trust.

  You learned to think like a terrorist.

  THE EVOLUTION OF JSOTF

  The traditional function of wars is to change an existing state of affairs. In the early 1970s, a new form of warfare, or maybe a new way of practicing a very old form
of warfare, emerged—state-supported terrorism. Nations that were not militarily powerful learned to use terrorist tactics to obtain objectives and concessions they could never win through diplomatic or military means.

  When this new form of warfare broke out, the United States quickly showed itself unprepared to cope with it. It had neither a national policy nor intelligence capabilities aimed at terrorism, nor any military forces adequately trained and prepared to respond to terrorist provocations. Although the United States was the most powerful nation in the world, its military capabilities were focused on the Soviet Union and not on something like this.

  In 1972, Israeli athletes at the Munich Olympics were massacred by Black September terrorists. This outrage might have been avoided if German snipers had had the ability to hit the terrorists as they led the hostages across the airport runway to their getaway plane.

  The Israelis took this lesson to heart, and on July 4, 1976, eighty-six Israeli paratroopers landed at Entebbe Airport in Uganda. Their mission was to rescue the passengers from an Air France airliner hijacked eight days earlier. In a matter of minutes, the paratroopers had rescued ninety-five hostages and killed four terrorists—though at the cost of the lives of two hostages and the paratroop commander. News of the raid flashed all over the world—and pointed out even more sharply America’s inadequacies in fighting terrorism.

  This truth had already been brought out in May 1975: Forty-one American Marines were killed in an attempt to rescue the thirty-nine crewmen of the American merchant ship Mayaguez after it had been seized by the Cambodian government. The rescue attempt had failed.