Kenn's Laws | AbateHate.com | REAL Black History | History & Archaeology | History of Racial Violence

Why I am not a Holocaust denier | Kenn Sings | Why Racism is Wrong | Why White Supremacy is Wrong | Why Antisemitism Is Wrong

MUST READ ► My Horrific Experience With A Psychopath


SCOTLAND SCHOOLS ARE
FORCING CHILDREN TO...




Support my hard work via Patreon ►

June 18, 2018



DAILYKENN.com -- Far-left Democrats fret over the plight of tiny children who managed to trek alone from Central and South America to find themselves in the far reaches of the United States. 


Sound suspicious? Homeland Security Secretary Kirstjen Neilsen seemed to think so and has now revealed that insurgents from south of the border are being coached to pose as families to gain entry into our nation. 

Aliens prefer to live in our nation because they have turned their own countries into cultural outhouses. 

From  dailywire.com ▼

Homeland Security Secretary Kirstjen Nielsen said on Monday that some "well-coached" people illegally crossing the U.S.-Mexico border are using children to pose as families to gain entry.

"From October 2017 to this February, we have seen a staggering 315 per cent increase in illegal aliens fraudulently using children to pose as family units to gain entry into the country," she told the annual National Association of Sheriffs meeting in New Orleans, the Daily Mail reports. "This must stop. All this does is put the children at risk."

"We do not have the luxury of pretending that all individuals coming to this country as a family unit are in fact a family," Neilsen added. "We have to do our job. We will not apologize for doing our job."

more


*





Owner: Columbus Marketing Group, Inc. Permission is granted to use original material in this article providing (1) the byline is included in an obvious manner crediting DailyKenn.com as the author, (2) a link to this page is included and (3) no changes are made either by deletion, addition or annotation. Original compositions at DailyKenn.com are sometimes seeded with decoy data, such as hidden acronyms, to detect unauthorized use and plagiarism.

0 comments:

Post a Comment