Posted on 02/01/2005 11:22:09 AM PST by Peach
BAGHDAD, Iraq (AP) - Iraqi militants claimed in a Web statement Tuesday to have taken an American soldier hostage and threatened to behead him in 72 hours unless the Americans release Iraqi prisoners.
The posting, on a Web site that frequently carried militants' statements, included a photo of what appeared to be an American soldier in desert fatigues seated with his hands tied behind his back.
A gun barrel was pointed at his head, and he is seated in front of a black banner emblazoned with the Islamic profession of faith, "There is no god but God and Muhammad is His prophet."
A U.S. military spokesman in Baghdad, Marine Sgt. Salju K. Thomas, said he had no information on the claim but "we are currently looking into it."
A statement posted with the picture suggested the group was holding other soldiers.
"Our mujahadeen heroes of Iraq's Jihadi Battalion were able to capture American military man John Adam after killing a number of his comrades and capturing the rest," said the statement, signed by the "Mujahedeen Brigades."
"God willing, we will behead him if our female and male prisoners are not released from U.S. prisons within the maximum period of 72 hours from the time this statement has been released," the statement said.
The claim, carried on the Web site ansarnet.ws, could not be verified.
More than 180 foreigners have been kidnapped in the past year. At least 10 of them, including three American civilians, remain in the hands of their kidnappers.
The only American soldier known to have been taken hostage is Pfc. Keith M. Maupin, 20, of Batavia, Ohio, who was shown in a video in April being held by militants. Another video aired in June showed what purported to be Maupin's slaying, but the picture was too unclear to confirm it was him and the military still lists him as missing.
Marine Cpl. Wassef Ali Hassoun went missing in Iraq in June and later photos surfaced on Arab television showing him blindfolded with a sword to his head. In July he made his way to the U.S. Embassy in Beirut. Back in the United States, he said he had been captured, but in December he was charged with desertion for the incident.
I did a traceroute from my location using my IP address to www.qo4.net
And I thought I was the only one...
Well it is a doll, therefore fake...but authentic.
Target Name: www.qo4.net
IP: 193.138.222.63
Date/Time: 2/1/2005 7:33:47 PM
1 161 ms 154 ms 154 ms 153 ms bc2-6.97-72.rac.wi.net [209.225.97.72]
2 187 ms 156 ms 156 ms 157 ms fe0-0.core.rac.wi.net [209.225.96.1]
3 187 ms 171 ms 171 ms 171 ms 64-199-33-117.ip.mcleodusa.net [64.199.33.117]
4 187 ms 171 ms 218 ms 171 ms CHCGILWUH53JC02-SO0-2-0-0.mcleodusa.net [64.198.101.141]
5 188 ms 171 ms 157 ms 234 ms CHCGILWUH53JC01-SO0-0-0-0.mcleodusa.net [64.198.101.137]
6 185 ms 171 ms 187 ms 218 ms CHCGILDTHBUJC01-SO0-3-0-0.mcleodusa.net [64.198.100.46]
7 187 ms 171 ms 169 ms 154 ms chi-ix.he.net [206.223.119.37]
8 186 ms 187 ms 171 ms 186 ms pos6-0.br1.nyc.he.net [64.71.157.61]
9 250 ms 249 ms 249 ms 265 ms pos2-0.gsr12012.lon.he.net [216.218.200.102]
10 265 ms 265 ms 296 ms 249 ms pos2-0.gsr12416.ams.he.net [216.66.24.158]
11 406 ms 265 ms 265 ms 265 ms welcome-at-core2.nova-ams.as34305.net [193.138.220.18]
12 609 ms 265 ms 265 ms 280 ms jointtransit.nova-ams.as34305.net [213.207.0.122]
13 639 ms 249 ms 265 ms 264 ms [193.138.222.63]
Ping statistics for www.qo4.net
Packets: Sent = 4, Received = 4, Lost = 0 (0.0%)
Round Trip Times: Minimum = 249ms, Maximum = 639ms, Average = 354ms
Hate to brust your bubble, but, have a grand daughter named Andrea Adam, Dad's name, John Adam, same name different color.
"As of 7:41pm, AP is running the story that it looks fake, but isn't sure."
Yup just saw that too. "not sure".. what a joke, it seems they need no confirmation to run with the original story but won't commit to say it's fake despite all the evidence.
I didn't see any mention of the fake mentioned at msnbc which was one of the first to run the original 'story'. Fox has the hoax story up, at least we can count on them.
They cut his head off?
and you posted it!
Is there no sanctity left?
Is there no compassion?
Is there no feeling, humanity? pity?
is there no glue? to slap that puppy back on?
Gets more interesting. First:
Registrant:
moh shahab
dammam
dammam 966
Saudi Arabia
Registered through: GoDaddy.com
Domain Name: ALMJLAH.NET
Created on: 28-Jun-04
Expires on: 28-Jun-05
Last Updated on: 29-Jun-04
Administrative Contact:
shahab, moh info@dammamhost.com
dammam
dammam 966
Saudi Arabia
508977789 Fax --
Technical Contact:
shahab, moh info@dammamhost.com
dammam
dammam 966
Saudi Arabia
508977789 Fax --
Domain servers in listed order:
DNS1.DAMMAMHOST.COM
DNS2.DAMMAMHOST.COM
The previous information has been obtained either directly from the registrant or a registrar of the domain name other than Network Solutions. Network Solutions, therefore, does not guarantee its accuracy or completeness.
Show underlying registry data for this record
Current Registrar: GO DADDY SOFTWARE, INC.
IP Address: 198.87.87.9 (ARIN & RIPE IP search)
IP Location: US(UNITED STATES)-TEXAS-ARLINGTON
Record Type: Domain Name
Server Type: Apache 1
Lock Status: REGISTRAR-LOCK
Web Site Status: Active
DMOZ no listings
Y! Directory: see listings
Secure: No
E-commerce: No
Traffic Ranking: Not available
Data as of: 08-Jun-2004
Then, we do an ARIN and RIPE search on 198.87.87.9, which yields:
ALMJLAH.NET
198.87.87.9
Record Type: IP Address
OrgName: Verio, Inc.
OrgID: VRIO
Address: 8005 South Chester Street
Address: Suite 200
City: Englewood
StateProv: CO
PostalCode: 80112
Country: US
ReferralServer: rwhois://rwhois.verio.net:4321/
NetRange: 198.87.0.0 - 198.88.255.255
CIDR: 198.87.0.0/16, 198.88.0.0/16
NetName: VRIO-198-087
NetHandle: NET-198-87-0-0-1
Parent: NET-198-0-0-0-0
NetType: Direct Allocation
NameServer: NS0.VERIO.NET
NameServer: NS1.VERIO.NET
NameServer: NS2.VERIO.NET
NameServer: NS3.VERIO.NET
NameServer: NS4.VERIO.NET
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment:
NeoTrace Trace Version 3.25 - Results
Target: www.qo4.net
Date: 2/1/2005 (Tuesday), 6:36:16 PM
Nodes: 19
Node Data
Node Net Reg IP Address Location Node Name
1 1 - 192.168.1.100 --.---N, ---.---W LAPTOP
2 2 1 216.129.249.3 47.511N, 111.272W 216-129-249-3.vnet-inc.com
3 2 1 216.129.249.1 47.511N, 111.272W 216-129-249-1.vnet-inc.com
4 3 2 216.220.20.237 Seattle ag237.montanavision.com
5 4 1 65.19.239.1 48.378N, 106.617W fe0-1.fortpeck.glasgow.mt.vnet-inc.com
6 5 1 65.19.239.6 45.633N, 108.350W atm6-0-0-9.rimrock.billings.mt.vnet-inc.com
7 3 1 216.220.20.250 45.633N, 108.350W atm2-0-7.sweetgrass.ncutbank.mt.vnet-inc.com
8 6 3 66.244.207.237 51.000N, 113.750W ra1so-ge3-2-11.cg.bigpipeinc.com
9 7 4 66.163.71.141 51.000N, 113.750W rc1so-ge9-6.cg.shawcable.net
10 7 4 66.163.76.86 49.889N, 96.983W rc2nr-pos13-0.wp.shawcable.net
11 7 4 66.163.73.129 49.889N, 96.983W rc1nr-pos15-0.wp.shawcable.net
12 7 4 66.163.76.73 Montréal rc1sh-pos13-0.mt.shawcable.net
13 7 4 66.163.76.90 New York rc1hu-pos5-0.ny.shawcable.net
14 7 4 66.163.74.14 New York rc2hu-pos5-3.ny.shawcable.net
15 7 4 66.163.74.2 New York rd1ny-pos9-0.ny.shawcable.net
16 8 - 195.69.144.189 AMSTERDAM nikhef.openpeering.nl
17 9 5 194.153.154.103 AMSTERDAM euroaccess.novaxess.nl-ix.net
18 10 6 193.138.220.17 Eindhoven welcome-at-core1.nova-ams.as34305.net
19 10 7 193.138.222.63 Eindhoven www.qo4.net
NeoTrace Trace Version 3.25 - Results
Target: almjlah.net
Date: 2/1/2005 (Tuesday), 6:39:40 PM
Nodes: 12
Node Data
Node Net Reg IP Address Location Node Name
1 1 - 192.168.1.100 48.895N, 105.164W LAPTOP
2 2 1 216.129.249.3 47.511N, 111.272W 216-129-249-3.vnet-inc.com
3 2 1 216.129.249.1 47.511N, 111.272W 216-129-249-1.vnet-inc.com
4 3 2 216.220.20.237 Seattle ag237.montanavision.com
5 4 1 65.19.239.1 48.378N, 106.617W fe0-1.fortpeck.glasgow.mt.vnet-inc.com
6 5 1 65.19.239.6 45.633N, 108.350W atm6-0-0-9.rimrock.billings.mt.vnet-inc.com
7 6 3 144.223.8.57 41.128N, 104.867W sl-gw10-che-2-0-ts1.sprintlink.net
8 7 3 144.232.15.145 41.128N, 104.867W sl-bb20-che-3-0.sprintlink.net
9 7 3 144.232.18.190 Chicago sl-bb22-chi-11-1.sprintlink.net
10 7 3 144.232.20.91 Chicago sl-st21-chi-13-0.sprintlink.net
11 7 - 144.232.9.22 Chicago
12 8 4 198.87.87.9 26.356N, 80.083W server.dammamhost.com
Its Karl Rove I tell you!!!
This is a plot to get Bush Re-Elected!!!
Yeah its Haliburton!
yeah yeah thats it!
Toughen up and learn to deal with it, you big ......big ...... well, I'd call you a big wuss, but I don't know how to spell it!!
;^)
ABC news reported in April 2004 that Thomas Hammill (the contractor who was later freed) was kidnapped by the same group that claimed responsibility for today's faux kidnapping.
So they are a REAL group. I think that is a good sign that the terrorists have had to resort to this type of hoax.
http://www.abc.net.au/news/newsitems/s1085092.htm
Sew them in sow's hides...
From 2003: An audiotape purportedly from ousted Iraqi leader Saddam Hussein praised resistance against the U.S. occupation and claimed "mujahedeen" brigades were on hand to fight the "invaders."
http://edition.cnn.com/2003/WORLD/meast/07/05/sprj.nilaw.saddam.tape/
If true, then they are finished. This means that Sunday was indeed the day the war was won.
Ya know, after the weekend election this may just be our sides part in the propaganda war.
I have to agree. This is the group that Saddam bragged about in 2003.
This reminds me of the Afghan days when al queda was claiming to shoot everything down out of the skies, or baghdad bob claiming Americans were committing suicide at the baghdad airport as they were so afraid for the iraqi army.
Bottom line, not only have the terrorists been reduced to pogue status, by this time tomorrow, they'll be the laughing stock of the middle east..
Ahhhh for the days of the Carson monologues......
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.