Tuesday, October 17, 2017

The History of Challenge Coins

The History Of Challenge Coins

The phenomenon of challenge coins particularly rose in popularity in the last couple of decades. Coins themselves are often associated with the military and it is widely known that these are given to the individuals who presented outstanding courage and valor while on service.

Therefore, having a challenge coin represents a great honor and in a certain way shows an individual’s affiliation with the certain organization.

But, they are not exclusively associated with the Army. Nowadays, challenge coins are also finding their use outside the military. Many non-military organizations (and not only the police departments) have adopted the practice of presenting coins to members that earned them somehow.

So today we have proud owners of Harley-Davidson motorcycles wearing their own challenge coins as a way of showing affiliation to the club, or we have coins of NASCAR drivers that are predominantly used as collectibles by NASCAR fans for example.

It’s pretty easy and simple to make your very own challenge coins with a number of companies offering services of making beautiful custom challenge coins today. Embleholics is one such company for example.

And with all the buzz surrounding this whole coins madness, one questions will always linger:

When and where challenge coins originated?


Origins of Challenge Coins  
It is believed that practice of giving coins to people who showed outstanding performance of duty dates back to the Roman Empire. The Emperor used to give these to the soldiers as a form of payment. Because the coins themselves had the insignia of the Empire engraved on them, soldiers often decided to keep these to themselves rather than spend it on food and necessities.

But perhaps most common story of challenge coin origins is the one associated with the US stepping into the World War I. Namely, before the US aircrafts took off to Europe, one of the flight lieutenants ordered for coins to be made in bronze with the US Army flight squadron emblem engraved on it, and gave coins to every member of the unit.

When one of the planes was gunned down by the Germans, American pilot was captured and stripped of his possessions. He was held captive behind enemy lines but somehow managed to escape and made it to the other side of the battle front where French troops were holding ground.

Because he had no ID on himself and because of his funny accent, the French thought that he was a German spy so they ordered for him to be executed. Luckily enough, a coin he kept in his leather bag saved his life in the end as the French suspected he was an American after all. That gave him just enough time to contact headquarters and to prove his identity.  

Although this story may sound like a fairy tale or story from some book that could be exciting to your child maybe, it pretty much pinpoints the significance of challenge coins. Those who have a challenge coin or collect them, cherish them with great pride. They use every situation possible to acknowledge that they are proud owners of one such coin, just like an airborne lieutenant did years ago during the World War. 

About the Author
Hellen McAdams is a blogger at Bicycle On Fire and a writer that loves to tackle all topics related to every day life of military professionals and their families. If you have any comments or questions, shoot her a question at @hellen_mcadams.




12 comments:

  1. ★COMPOSITE HACKS★

    If Truly you Are In Need Of A PROFESSIONAL LEGIT HACKER Who Will Get Your Job Done Efficiently With Swift Response, Congratulations, You Have Met the Right HACKERS.

    WHO ARE COMPOSITE HACKS???
    • We are a Team Of Professional HACKERS , a product of the coming together of Legit Hackers from the Dark-Web, (pentaguard,CyberBerkut, RedHack , Black Hat, White Hack ) we have been existing for over 12years, our system is a very Strong and decentralized command structure that operates on ideas and directives.

    JOB GUARANTEE:
    • Frankly speaking, I always give a 100% guarantee on any job we are been asked to do, because we have always been successful in Almost all our jobs for over 12years and our clients can testify to that . To hack any thing needs time though, but we can provide a swift response to your job depending on how fast and urgent you need it. Time also depends on what exactly you want to hack and how serious you are. Enough time with social engineering is required for hacking. So if you want to bind us in a short time, then just don't contact us because We can't hack within 30minutes,*sorry*. Basically, time depends on your luck. If its good luck, then it is possible to hack within 30minutes but, if it is in the other way round, it would take few hours. I have seen FAKE HACKERS claiming they can hack in 30min, 20min , but there is no REAL HACKER who can say this (AVOID THEM).
    Please Note : we have only one contact email : compositehacks@gmail.com

    We will be happy to have you join over 2000 satisfied clients around the world to use our services.

    OUR HACKING CAPABILITIES:
    There are so many Reasons why people need to hire a hacker, It might be to Hack a Websites to deface , retrieve information, edit information or give you admin access Some people might need us for Hacking any smart phone giving you access to all activities on the phone like , text messages , call logs , Social media Apps and other informations. Some might need to Hack a Facebook , gmail, yahoomail, Instagram , twitter and every other social network Accounts, Some might need to Hack into Court's Database to Clear criminal records. However we can also Hack into school's websites (server) to change grades without any trace, Also Some Individuals might want to Track someone else's Location probably for investigation cases.
    All these Are what we can get Done withing few hours.

    SOME OTHER SPECIAL SERVICES WE OFFER:
    ★ Hacking and sales of Programmed credit cards & CREDIT CARD TOP-UP
    ★ Sales of untraceable phones (even the pentagon can not track our phones)
    ★ Sales of Tutorial packs for Beginner Ethical Hackers.

    ★ You can also contact us for other Cyber Attacks And Hijackings, we do almost All.

    ★Contact Us Via: compositehacks@gmail.com

    ReplyDelete
    Replies
    1. ◾ "PROTOCOL SHIELDERS" ◾
      Hello,

      I am COREY RODRIGUEZ by name, THE CEO of protocol & cyber-sheild hackers.
      In this message, we will explain how you can almost avoid SCAMMERS and stay safe, plus how our organisation works.

      Read it carefully!!
      Its reading will not take more than 10mins.

      We kindly URGE you to not respond without have read the entire text. Those who mail without have read everything, ask questions that are answered here!!

      WARNING:
      MOST HACKERS YOU SEE HERE ARE FAKES
      AND INCONGUROUS!!.
      It tears me up when we receive bitter emails for Jobs with complains from most clients with hacking issues about past SCAMs by uncertified fake hackers like most you see here, which is disappointingly inadequate, leaving their mess for us to deal with eventually (WE DON'T MEAN TO BRAG ABOUT THAT).

      HOW WOULD YOU KNOW??

      You won't know until you fall a Victim but can be attentive to potential danger, error or harm if you take note of these:

      1, you see uncertified email accounts carrying numberings like
      "iamhacklord1232@(gmail,yahoo or hotmail.com"
      pls flee from them, BIG SCAMMERS.
      They take your money and never do your job!!

      2, you see posts like "do you need to spy on spouse?"
      All fake! , just a way to lure you toward getting ripped OFF!.

      3, posting fake testimonies and comments to trick you into feeling save and secured.
      Pls endeavour to ignore!!

      ◾VERY IMPORTANT◾

      For years now, We've helped organisations secure data base, so many sites has been hacked for different reasons of Job kinds.
      "CLEAR CRIMINAL RECORDS" & "iPhone HACK" of
      and in short timing hacked petty cyber sites accounts like Skype, Fb, WhatsApp,Tinder,Twitter!!, FLIPPED MONEY, LOAD CCs and vice versa but these are significant experiences a good and effectively recognized organisation
      must firmly ascertain.

      ◾OUR "AIMS" HERE◾
      Are:
      1◾to assign a qualified agent of specific rank to particularly any sort of cyber issues you intend dealing with in short and accurate timing.

      2◾ to screen in real hackers (gurus only) in need of job with or without a degree, to speed up the availability of time given to for Job contracts.!!

      Thus an online binary decoding exam will be set for those who seeks employment under the teams Establishment.

      write us on:
      ◾Protocolhacks@gmail.com or
      ◾Cybershieldnotch@gmail.com
      ◾Cybeshieldnotch@protonmail.com,

      COREY ROD,
      SIGNED...!
      Thank you!!!

      Delete
  2. CYBERHACKTON@GMAIL.COM is a professional hacker that specializes in exposing cheating spouse,and every other hacking related issues. he helps catch cheating spouse by hacking their communications like call, Facebook, text, emails, Skype and many more. i have used this service before and he did a very good job, he gave me every proof i needed to know that my fiancee was cheating. You can contact him on his email CYBERHACKTON@GMAIL.COM to help you catch your cheating spouse, or for any other hacking related problems, he will definitely help you, he has helped a lot of people, contact him and figure out your relationship status. i wish you the best too

    ReplyDelete
  3. ◾ "PROTOCOL SHIELDERS" ◾
    Hello,

    I am COREY RODRIGUEZ by name, THE CEO of protocol & cyber-sheild hackers.
    In this message, we will explain how you can almost avoid SCAMMERS and stay safe, plus how our organisation works.

    Read it carefully!!
    Its reading will not take more than 10mins.

    We kindly URGE you to not respond without have read the entire text. Those who mail without have read everything, ask questions that are answered here!!

    WARNING:
    MOST HACKERS YOU SEE HERE ARE FAKES
    AND INCONGUROUS!!.
    It tears me up when we receive bitter emails for Jobs with complains from most clients with hacking issues about past SCAMs by uncertified fake hackers like most you see here, which is disappointingly inadequate, leaving their mess for us to deal with eventually (WE DON'T MEAN TO BRAG ABOUT THAT).

    HOW WOULD YOU KNOW??

    You won't know until you fall a Victim but can be attentive to potential danger, error or harm if you take note of these:

    1, you see uncertified email accounts carrying numberings like
    "iamhacklord1232@(gmail,yahoo or hotmail.com"
    pls flee from them, BIG SCAMMERS.
    They take your money and never do your job!!

    2, you see posts like "do you need to spy on spouse?"
    All fake! , just a way to lure you toward getting ripped OFF!.

    3, posting fake testimonies and comments to trick you into feeling save and secured.
    Pls endeavour to ignore!!

    ◾VERY IMPORTANT◾

    For years now, We've helped organisations secure data base, so many sites has been hacked for different reasons of Job kinds.
    "CLEAR CRIMINAL RECORDS" & "iPhone HACK" of
    and in short timing hacked petty cyber sites accounts like Skype, Fb, WhatsApp,Tinder,Twitter!!, FLIPPED MONEY, LOAD CCs and vice versa but these are significant experiences a good and effectively recognized organisation
    must firmly ascertain.

    ◾OUR "AIMS" HERE◾
    Are:
    1◾to assign a qualified agent of specific rank to particularly any sort of cyber issues you intend dealing with in short and accurate timing.

    2◾ to screen in real hackers (gurus only) in need of job with or without a degree, to speed up the availability of time given to for Job contracts.!!

    Thus an online binary decoding exam will be set for those who seeks employment under the teams Establishment.

    write us on:
    ◾Protocolhacks@gmail.com or
    ◾Cybershieldnotch@gmail.com
    ◾Cybeshieldnotch@protonmail.com,

    COREY ROD,
    SIGNED...!
    Thank you!!!

    ReplyDelete
  4. My life was falling apart, I was being cheated and abused, I had to know the truth and needed proof. i saw a recommendation about a private investigator worldcyberhackers@gmail.com by a friend. i contacted them and they took care of my needs. they hacked his iphone and gave me all information in his facebook,instagram, Whatsapp, twitter and email account. I got all I wanted as proof . I am glad i had a proven truth he was cheating . Contact them if you need help.


    ReplyDelete
  5. CYBER ULTIMATE HACKS
    Cyber ultimate hacks is a legit hack team specially equipped with the solution you've been searching for.
    We specialize in all type of cyber attacks and bullies such as:

    #TRACKING GPS location of cars, Computers, Phones (Apple, windows and Android), e.t.c.
    We also track E-mail addresses, Social media such as Facebook, Twitter, Skype,Instagram Snapchat etc.
    #RECOVERY of Passwords for E-mail address, Phones, Computers, Social media Accounts, Documents e.t.c.
    #INSTALLATION of Spy ware so as to spy into someone else's computer, phone or E-mail address thereby giving you access to the Target’s Call Log, messages, chats and all social media Apps and also Installation of Spy ware software on your individual O.S to know if your Gadget is being hacked into..
    We also Create and Install VIRUS into any desired computer gadget.

    #CRACKING into Websites and Data base of both Private and Govt organization, such as Schools, Hospitals, Court houses, The FBI, NSA e.t.c
    #Phishing
    #Hacking and sales Of Programmed credit cards , amazon , Walmart , PayPal , bank logs .
    ##And Other Cyber Attacks And Hijacking.

    NOTE: We also specialize in clearing of CRIMINAL RECORDS of diverse types.

    * We assure you that your Job will be attended to with care and efficiency as it will be done in no delayed time.

    #There's also a forum where you can get yourself equipped with Advanced hacking Knowledge and Also if you're Good with Hacking and you think you can Join our Team of sophisticated hackers, you're welcome as well...
    CYBER ULTIMATE HACKS gives you the Best service in the Hacking world.
    Write us on
    *Cyberultimatehacks@gmail.com
    *Cyberultimatehacks@protonmail.com

    ReplyDelete
    Replies
    1. ◾ "PROTOCOL SHIELDERS" ◾
      Hello,

      I am COREY RODRIGUEZ by name, THE CEO of protocol & cyber-sheild hackers.
      In this message, we will explain how you can almost avoid SCAMMERS and stay safe, plus how our organisation works.

      Read it carefully!!
      Its reading will not take more than 10mins.

      We kindly URGE you to not respond without have read the entire text. Those who mail without have read everything, ask questions that are answered here!!

      WARNING:
      MOST HACKERS YOU SEE HERE ARE FAKES
      AND INCONGUROUS!!.
      It tears me up when we receive bitter emails for Jobs with complains from most clients with hacking issues about past SCAMs by uncertified fake hackers like most you see here, which is disappointingly inadequate, leaving their mess for us to deal with eventually (WE DON'T MEAN TO BRAG ABOUT THAT).

      HOW WOULD YOU KNOW??

      You won't know until you fall a Victim but can be attentive to potential danger, error or harm if you take note of these:

      1, you see uncertified email accounts carrying numberings like
      "iamhacklord1232@(gmail,yahoo or hotmail.com"
      pls flee from them, BIG SCAMMERS.
      They take your money and never do your job!!

      2, you see posts like "do you need to spy on spouse?"
      All fake! , just a way to lure you toward getting ripped OFF!.

      3, posting fake testimonies and comments to trick you into feeling save and secured.
      Pls endeavour to ignore!!

      4,beware as we urge you not to make respond to any "IVAN HONG" (impersonating with our post pretending to work for us) with this exact post.

      ◾VERY IMPORTANT ◾

      For years now, We've helped organisations secure data base, so many sites has been hacked for different reasons of Job kinds.
      "CLEAR CRIMINAL RECORDS" & "iPhone HACK" of
      and in short timing hacked petty cyber sites accounts like Skype, Fb, WhatsApp,Tinder,Twitter!!, FLIPPED MONEY, LOAD CCs and vice versa but these are significant experiences a good and effectively recognized organisation
      must firmly ascertain.

      ◾OUR "AIMS" HERE ◾
      Are:
      1◾to assign a qualified agent of specific rank to particularly any sort of cyber issues you intend dealing with in short and accurate timing.

      2◾ to screen in real hackers (gurus only) in need of job with or without a degree, to speed up the availability of time given to for Job contracts.!!

      Thus an online binary decoding exam will be set for those who seeks employment under the teams Establishment.

      write us on:
      ◾Protocolhacks@gmail.com or
      ◾Cybershieldnotch@gmail.com
      ◾Cybershieldnotch@protonmail.com,

      COREY ROD,
      SIGNED...!
      Thank you!!!

      Delete
  6. Hello, If you want to hack your spouses or girlfriends Email, social account, phone and other means to get contact of someone without him/her knowing, contact cyberhackpros@gmail.com. They are very good and affordable and also based in the USA. contact him via email/phone CYBERHACKPROS@GMAIL.COM or +1 512 605 1256 Tell him i reffered you.He will help you INSTAGRAM:Cyberhackprofessionals.

    ReplyDelete
  7. Finally i got in contact with cyberhackpros@gmail.com they helped me hack into my spouse facebook smoothly, hacked into her emails and cell phone.the sweetest of all is that they are fast and quick which helped during my Divorce. mentioning my name would make him respond and treat you better as we are now close. Just tell him you are from me,stacey . He also does so many other hacks like facebook, whatsapp, bank, credit card,paypal,skype,Snapchat,Calls… just name it or call/text +1 512 605 1256 INSTAGRAM:Cyberhackprofessionals

    ReplyDelete
  8. CYBERHACKPROS@GMAIL.COM is a professional hacker that specializes in exposing cheating spouse,and every other hacking related issues. he helps catch cheating spouse by hacking their communications like call, Facebook, text, emails, Skype and many more. i have used this service before and he did a very good job, he gave me every proof i needed to know that my fiancee was cheating. You can contact him on his email CYBERHACKPROS@GMAIL.COM to help you catch your cheating spouse, or for any other hacking related problems, he will definitely help you, he has helped a lot of people, contact him and figure out your relationship status. i wish you the best too call/text +1 512 605 1256 INSTAGRAM:Cyberhackprofessionals

    ReplyDelete
  9. They are all scammers, they will make you pay after which they will give you an excuse asking you to pay more money, they have ripped me of $2000, i promised i was going to expose them.
    I figured it all out when my colleague took me to Pavel

    (HACKINTECHNOLOGY@gmail.com)

    (+1(669) 225 2253)

    He did perfect job, he hacks all accounts ranging from (Emails, Facebook, whatsapp, imo, skype, instagram, Phone cloning, DMV removal, tracking locations, background checks Kik etc. he also hacks cell phones, cell phone tapping and cloning, clears bad driving and criminal records, bank transfers, locates missing individuals e.t.c. You should contact him and please stop using contacts you see on websites to execute jobs for you, you can ask around to find a real hacker.

    ReplyDelete
  10. It is not advisable to just embrace every trade opportunity because of scam,i have been a victim and lost upto 560,875$ trust me. It is always good to trade with broker using a transparent pricing, fast and reliable trade executions.. I have been scammed in forex and binary options before I got to know and actually recovered my funds back with the help of viapreferred @ gmail.com hacker group and still went ahead to trade with them
    using their forex and binary options group an it has been lucrative ever since.
    They are advanced trading platform designed for active traders
    because of their clear, reliable pricing and superior trade execution.They have shown to be market leader with a proven record of strength and stability.
    Gains will vary based on market conditions, including volatility, available liquidity, and other factors.
    You repair your credit score with them and can also use them for any hacking services whatsoever.. Thank me later

    ReplyDelete