Kenn's Laws | AbateHate.com | REAL Black History | History & Archaeology | History of Racial Violence | Language Loading | About

Top 25 Conservative Websites | Top 75 Facebook Pages | Kenn Sings | Why Racism is Wrong | Why White Supremacy is Wrong |

MUST READ ► My Horrific Experience With A Psychopath

Saturday Night at the Movies
Girl in the News (1940)
Movies from when America was great!

November 22, 2018

DAILYKENN.com -- The Honduran invasion force may face lethal opposition from the US military, according to Donald Trump. The so-called "caravan" of "migrants" includes women and children, apparently as shields. 

CLICK to share on Facebook

We wonder:

Were the participants recruited and paid? Or did they pay to participate?

Who organized the invasion? Who is underwriting the cost?

Why has the CIA and other intelligence organizations infiltrated the caravan in an effort to destabilize it? (Or have they?)

From rt.com ▼

 US President Donald Trump has given troops permission to use lethal force if needed at the border with Mexico, adding that there could be a government shutdown next month over border security.

Trump's statements come just one day after US Defense Secretary Jim Mattis said he had been granted authority to allow troops to exhibit greater power to help protect border officials.

US President Donald Trump and Supreme Court Chief Justice John Roberts (file photo) ‘Dangerous disgrace’: Trump mulls breaking up 9th Circuit, hits back at SCOTUS chief justice

Around 5,800 active duty troops have been sent to the US-Mexico border to bolster defenses ahead of the expected arrival of a migrant caravan consisting mostly of Hondurans.



Owner: Columbus Marketing Group, Inc. Permission is granted to use original material in this article providing (1) the byline is included in an obvious manner crediting DailyKenn.com as the author, (2) a link to this page is included and (3) no changes are made either by deletion, addition or annotation. Original compositions at DailyKenn.com are sometimes seeded with decoy data, such as hidden acronyms, to detect unauthorized use and plagiarism.


Post a Comment

powered by Surfing Waves