Kenn's Laws | AbateHate.com | REAL Black History | History & Archaeology | History of Racial Violence

Kenn Sings | Why Racism is Wrong | Why White Supremacy is Wrong | Why Antisemitism Is Wrong

MUST READ ► My Horrific Experience With A Psychopath

These racists use
blacks a PETS!


Upcoming The Talk Show guests
Monday, May 21 ► Rocky Dee, radio talkster
Monday, May 28 ► Gregory Newson, black Confederate
February 8, 2018



DAILYKENN.com -- Excuse me for being culturally insensitive, but this behavior is so persistent and consistent that is screams "genetic predisposition". 


From whio.com ▼

Over 15 Dayton police and Montgomery County Sheriff’s cruisers have escorted a funeral procession for a homicide victim, after a large fight broke out at the Mt. Enon Baptist Church in Dayton. 

The fight broke out at the funeral for Jamal D. Colvin who was fatally shot on Burleigh Avenue on July 3. 

Police said guns were displayed during the fight but there were no shooting victims. 

Officials said during the funeral procession, a vehicle showed up where one occupant displayed a gun. Police pursued the vehicle but later terminated their pursuit without stopping the vehicle. 

Officials added they believe the violence today is retaliation for the death of Colvin. 

Multiple law enforcement officers, including Montgomery County Sheriff Phil Plummer escorted the procession to Willow View Cemetery on Neff Road. Officials said the escort was conducted to prevent further violence after the fight at the funeral. 

UPDATE @ 12 p.m. 

Up to 10 Dayton police cruisers remain on scene after a large fight was reported at a funeral Thursday morning. 

Continue reading 


*





Owner: Columbus Marketing Group, Inc. Permission is granted to use original material in this article providing (1) the byline is included in an obvious manner crediting DailyKenn.com as the author, (2) a link to this page is included and (3) no changes are made either by deletion, addition or annotation. Original compositions at DailyKenn.com are sometimes seeded with decoy data, such as hidden acronyms, to detect unauthorized use and plagiarism.

0 comments:

Post a Comment