Click the buttons below to access the full episode on ITunes(Apple users), or Soundcloud(Android users). Be sure to like, share, subscribe, and download the episodes. Thank you
GRP 120-Warriors Heart: Two Brothers Serving in Special Missions in The War on Terror
For this week's podcast, I have on Tom and Scot Spooner. Both served in the infantry than became Special Forces Engineers. After 9/11 Tom who joined the Army before Scot went to selection and made it into the Army’s Special Missions Unit as an operator. For the next decade, he deployed without a break into combat as an operator and a sniper.
Scot was on an instructor tour at the Special Forces schoolhouse where he taught everything explosives for young men becoming Green Berets. Once Scot’s instructor time was up he went into the Special Missions Unit as apart of the heavy breacher’s program. They’ve been deployed to Iraq at the same time and discuss what that was like. We talked about their new podcast Original Freedom, Post Traumatic Stress, and several other topics. Enjoy.
0:00-Ronald Regan Speech
6:00-Tom Spooners Army Career
12:51-Scot Spooners Army Career
20:16-Deployed with Army Special Missions in Iraq at the same time.
37:02- “It was harder to be at home watching television then it was to be deployed in combat”
58:06-Warriors Heart
Follow The Spooner brothers:
http://www.ogfree.com
YouTube Channel: https://m.youtube.com/channel/UCqARyF74PZilCKFb4-YNq9A
Apple Podcasts: https://itunes.apple.com/us/podcast/original-freedom-podcast/id1438086939?mt=2
Spotify: https://open.spotify.com/show/2pmwoSqWGA9fezImaR6odU?si=yCZfmhJjSU6DFIIXllHebA
Follow us at our Original Freedom Facebook page and @BeOGFree on instagram and Twitter
Follow Global Recon below:
https://www.instagram.com/igrecon
https://www.instagram.com/blackopsmatter
https://www.facebook.com/GlobalReconPodcast/
Chantel Taylor:
https://www.instagram.com/mission_critical
https://www.instagram.com/altern8rv
Tim Kolczak:
www.thevetsproject.com
www.instagram.com/theveteransproject
Music provided by Caspian: