Kenn's Laws | | REAL Black History | History & Archaeology | History of Racial Violence

Why I am not a Holocaust denier | Kenn Sings | Why Racism is Wrong | Why White Supremacy is Wrong | Why Antisemitism Is Wrong

MUST READ ► My Horrific Experience With A Psychopath


Support my hard work via Patreon ►

June 22, 2018 -- Need a pool for your kids. No problem. Just snatch your neighbor's pool. 

(Is this why we had segregated neighborhoods?)

From ▼

A five-year-old boy in Nebraska is missing his inflatable swimming pool. The family's security camera recorded two thieves stealing it right out of their backyard. 

The family's security camera recorded two thieves stealing it right out of their backyard on Father's Day, in the middle of the afternoon.

"I actually had it notified on my phone and actually saw the whole thing live on my phone," said homeowner Brandon Turner. 

Cameras record the entire kiddie pool caper. 

"Really? Really? That's all I could think of...was just... really?"

Turner was at the zoo with his children, watching as not one, but a pair of predators pilfer his pool. The first pool prowler can't lift it on her own, so she calls in reinforcements. 

"I just think it's crazy people would do something like that in just, broad daylight," he said. 

Together, the thieves drain the water from the pool, making it easier to carry away.

Five-year-old Alex Turner can't understand why someone would steal his summer fun.

"Stop! Give my swimming pool back. I want my swimming pool back," he said.  

Now, he and his younger sister Abby find other ways to keep entertained in the backyard, and their dad doesn't even have a good explanation to give them. 

"It's one thing to steal from another person because you believe you need that," Turner said. "It's another thing to steal from children. That's their happiness right there."


Owner: Columbus Marketing Group, Inc. Permission is granted to use original material in this article providing (1) the byline is included in an obvious manner crediting as the author, (2) a link to this page is included and (3) no changes are made either by deletion, addition or annotation. Original compositions at are sometimes seeded with decoy data, such as hidden acronyms, to detect unauthorized use and plagiarism.


Post a Comment