s



Kenn's Laws | AbateHate.com | REAL Black History | History & Archaeology | History of Racial Violence | Language Loading | About

Top 25 Conservative Websites | Top 75 Facebook Pages | Kenn Sings | Why Racism is Wrong | Why White Supremacy is Wrong |

MUST READ ► My Horrific Experience With A Psychopath



Republican candidate kicked off Twitter
after criticizing hate-group member, Ilhan Omar



September 24, 2019



DAILYKENN.com -- Two women were video recorded as one snatched a wallet from an elderly woman at a grocery. One suspect watched from a short distance as another stood behind their mark, awaiting the right moment to reach in her open purse and grab her wallet. 





The suspects were identified as Markkisha Anthnisha Mangum and Martavia Latrice. The alleged crime occurred at a grocery in north California. 

• Before viewing the video or reading the news story, I presumed the suspects were black and the victim white.  

• This is why some jurisdictions enacted Jim Crow laws; to protect whites from black crime. The far left has persuaded us that Jim Crow laws were an expression of white racism; an odd dislike of dark-skinned people. In reality, the laws were anti-racist as they helped prevent whites from being victimized by black racists. 

From Fox News ▼

The charges ranged from credit card fraud to financial elder abuse, KRON 4 reported. Bail was reportedly set at $22,500 for Blount and $82,500 for Mangum. Blount had an outstanding warrant for robbery, the report said.

The Walnut Creek Police Department said a woman and her accomplice “worked in tandem” on Sept. 9, to steal the wallet in a local Safeway grocery store. 


more 
*





Owner: Columbus Marketing Group, Inc. Permission is granted to use original material in this article providing (1) the byline is included in an obvious manner crediting DailyKenn.com as the author, (2) a link to this page is included and (3) no changes are made either by deletion, addition or annotation. Original compositions at DailyKenn.com are sometimes seeded with decoy data, such as hidden acronyms, to detect unauthorized use and plagiarism.

0 comments:

Post a Comment





















powered by Surfing Waves