An Innocent Iraqi DickTator abused by Mr. President Bush, who is the REAL terrorist to destruct Saddam Hussein's home country.
A terrorist leader with WMD, but were never going to use it against his enemies, if his enemies respected him when they did, or at least, tried to.
A terrorist leader with WMD, but were never going to use it against his enemies, if his enemies respected him when they did, or at least, tried to.
Even though Saddam Hussein was a bad leader, we should have never defeated him and let him rule Iraq. Mr. President Bush just lied about him and his evil plans and claims that Saddam Hussein is a terrorist when the real terrorist is President Bush! I hope he gets assasinated for bombing Iraq and goes to hell for bombing Baghdad Iraq, destroying peoples lives there.
by judenihal July 23, 2008
by judenihal February 09, 2009
by judenihal March 16, 2010
When I was young, I though I could save space and record all my composed music in .MP3 and found out later that when I did my first recording, I could hear disturbing artifacts. Later on, I realized that it could be fixed but also found out that even with a good codec, MP3's will always sound terrible from WAV files.
by judenihal January 27, 2010
Owned by the rival unexpectedly and illegally.
Another way of saying "Invaded".
Word of Origin:
Americans took over Iraq in 2003 by bombing Baghdad, which is an illegal act towards the UN and the world.
Another way of saying "Invaded".
Word of Origin:
Americans took over Iraq in 2003 by bombing Baghdad, which is an illegal act towards the UN and the world.
Example 1:
The American's Illegally Iraqed Iraq by bombing Baghdad and overthrew Saddam Hussein and now has full control of the oil and the country.
Example 2:
The hacker Iraqed the computer network system and now has the capibility of changing private information secretly.
The American's Illegally Iraqed Iraq by bombing Baghdad and overthrew Saddam Hussein and now has full control of the oil and the country.
Example 2:
The hacker Iraqed the computer network system and now has the capibility of changing private information secretly.
by judenihal July 22, 2008