North America, Family Histories, 1500-2000, Ancestry.com, Book Title: Charles D'Wolf : of Guadaloupe, his ancestors and descendants : being a complete genealogy of the "Rhode Island D'Wolfs," the descendants of Simon De Wolf, with their common descent from Balthasar De Wolf, of Lyme, Connecticut. (1668) : With a / Ancestry.com
In The Netherlands , there was from February 1, 1862 to February 10, 1866 the cabinet Thorbecke II, with Mr. J.R. Thorbecke (liberaal) as prime minister.
May 9 » Second Schleswig War: The Danish navy defeats the Austrian and Prussian fleets in the Battle of Heligoland.
May 22 » American Civil War: After ten weeks, the Union Army's Red River Campaign ends in failure.
July 29 » American Civil War: Confederate spy Belle Boyd is arrested by Union troops and detained at the Old Capitol Prison in Washington, D.C.
August 22 » Twelve nations sign the First Geneva Convention, establishing the rules of protection of the victims of armed conflicts.
November 4 » American Civil War: Confederate troops bombard a Union supply base and destroy millions of dollars in material at the Battle of Johnsonville.
November 25 » American Civil War: A group of Confederate operatives calling themselves the Confederate Army of Manhattan starts fires in more than 20 locations in an unsuccessful attempt to burn down New York City.
When copying data from this family tree, please include a reference to the origin: Whitney Wetherill, "Wetherill via Brouwer", database, Genealogy Online (https://www.genealogieonline.nl/wetherill-via-brouwer/P271.php : accessed May 5, 2025), "Mark Antony De Wolf Howe (1864-????)".
Copy warning
Genealogical publications are copyright protected. Although data is often retrieved from public archives, the searching, interpreting, collecting, selecting and sorting of the data results in a unique product. Copyright protected work may not simply be copied or republished.
Please stick to the following rules
Request permission to copy data or at least inform the author, chances are that the author gives permission, often the contact also leads to more exchange of data.
Do not use this data until you have checked it, preferably at the source (the archives).
State from whom you have copied the data and ideally also his/her original source.