Terrorists Among Us

Who is in the United State of America living among us that are tied to terror organizations? ICE along with JTTF did some good work as noted below. However, what is being overlooked or waved off with regard to investigations?

 

ICE deports Afghan doctor with ties to terrorist group

PHILADELPHIA – An Afghan doctor convicted of immigration fraud was deported late Tuesday and turned over to authorities in Kabul, Afghanistan, by U.S. Immigration and Customs Enforcement’s (ICE) Enforcement and Removal Operations (ERO).

Hayatullah Dawari, 62, of Philadelphia was sentenced to two years in federal prison Sept. 19 after an investigation found the man had ties to the Hezb-e-Islami Gulbuddin anti-western insurgent group active in Afghanistan and Pakistan. Dawari pleaded guilty to two counts of immigration fraud, and the judge suspended the sentence in favor of immediate deportation.

Dawari became a lawful permanent resident Nov. 11, 2008, and applied for U.S. citizenship in November 2013. In his plea, he admitted that he lied about his ties to the organization in his application for U.S. citizenship and omitted that he had a previous arrest in Russia in the late 1980s.

“Our county is undoubtedly safer without this man whose ties to potential threats are alarming,” said Philadelphia ERO Field Office Director Tom Decker. “It’s a testament to the diligence of special agents and officers that this man was found out and is now back in the hands of the Afghanistan authorities.”

An investigation by ICE Homeland Security Investigations (HSI), the FBI’s Joint Terrorism Task Force (JTTF) and the Philadelphia Police Department found Dawari still maintained contact with the group’s associates in the United States and Pakistan. HSI and JTTF special agents executed a search warrant at his home in January and seized a book sent from Pakistan that had a secret, coded message glued between two pages.

As part of Dawari’s guilty plea, it required that he would be sentenced to two years in prison but suspended due to an accompanying order requiring his transfer without undue delay into ICE custody for uncontested removal from the United States. He also agreed to relinquish his status as a lawful permanent resident, and he is now rendered permanently inadmissible to the United States.

——–

An Islamic village in Texas is reportedly a “jihadist enclave” and was investigated for possible links to terrorism by the FBI. Ryan Mauro, the journalist who broke the national security story, discussed the information released in FBI declassified during a Fox News interview this morning.

According to Mauro’s research, the Texas Islamic village is operated by the Muslims of the Americas group. The organization has reportedly been linked to Jamaat ul-Fuqra, a radical militant group in Pakistan. Group members are allegedly followers of Sheikh Mubarak Ali Gilani, an allegedly extremist Pakistani cleric.

——-

Several dozen suspected terrorist bomb-makers, including some believed to have targeted American troops, may have mistakenly been allowed to move to the United States as war refugees, according to FBI agents investigating the remnants of roadside bombs recovered from Iraq and Afghanistan.

The discovery in 2009 of two al Qaeda-Iraq terrorists living as refugees in Bowling Green, Kentucky — who later admitted in court that they’d attacked U.S. soldiers in Iraq — prompted the bureau to assign hundreds of specialists to an around-the-clock effort aimed at checking its archive of 100,000 improvised explosive devices collected in the war zones, known as IEDs, for other suspected terrorists’ fingerprints.

——-

A federal grand jury investigation going on all summer in St. Paul, Minnesota has been focused on a group of 20-30 Somali-Americans allegedly conspiring to join the fight with ISIS in Syria. Most of the youths being investigated have been going to the Al Farooq Youth and Family Center and mosque in Bloomington, where sources told the Star Tribune that 31-year-old Amir Meshal, an American of Egyptian descent, may have influenced them to join the jihadist movement.

Just do an internet search for yourself to determine who among us is a terrorist and imagine what we don’t know. The beheading in Moore, Oklahoma is but one of many clues at the risks in America. It is time to truly challenge the FBI and DHS.

Make the Deal with Iran in Spite of Allies

Cast aside allies, Cast aside the truth. Cast aside the potential for a Middle East nuclear arms race. If John Kerry and the White House write letters in secret, ask what other actions have commenced that are secret? We know that Bashir al Assad is relieved that he remains the tyrannical leader of Syria. We know that the Obama administration has fully legitimized Iran on the world stage. We know this is just bad.

Official: Israel independently learned of secret U.S. letter to Iran

Information in Israel’s hands suggests the letter stressed the need to reach a nuclear deal and made clear U.S.-led strikes in Syria aren’t aimed at toppling Assad.

Israel learned independently about the secret letter U.S. President Barack Obama sent to Iranian Supreme Leader Ali Khamenei, according to a Jerusalem official who asked to remain anonymous due to the sensitivity of the matter.

The official said Israel learned about the letter shortly after it was sent. The information arrived indirectly, through channels that are not part of Israel’s official contacts with the American administration.

The Wall Street Journal broke the story, reporting that the U.S. president had suggested to the Iranian leader to cooperate in the struggle against the Islamic State (also known as ISIS or ISIL), on condition that the Islamic Republic reach a nuclear agreement with the Western powers by November 24.

 

The information in Israel’s hands indicated that Obama was trying to allay Iranian fears. Obama made clear in the letter that the international coalition that had been established, and the air strikes in Syria, were meant for a war solely against ISIS, and that the U.S. administration had no aspirations of toppling President Bashar Assad’s regime.

Likewise, Obama stressed to Khamenei his desire to reach an agreement with Iran on a nuclear program, and that such a deal would release Iran from its international isolation.

The fact that the Obama administration kept Israel out of the loop, and that Israel found out about the letter indirectly, adds to already deep suspicions in the Prime Minister’s Office about the White House on the Iranian issue. The letter also strengthened fears in Israel that the struggle against ISIS in Iraq and Syria – two areas with a massive Iranian presence – will make the United States soften its position regarding Iranian nukes.

 

While the letter was kept secret, there was quiet Israeli-American dialogue on the issue. The matter probably arose during talks the Israeli delegation, headed by National Security Adviser Yossi Cohen, held with a group of senior American officials, headed by U.S. National Security Advisor Susan Rice 10 days ago in Washington.

A senior Israeli official briefed on details of the talks remarked that Rice and Under Secretary for Political Affairs Wendy Sherman, who heads the U.S. negotiation team with Iran, noted that, despite continuous diplomatic efforts, they did not think they could reach a permanent deal with Iran by the November 24 deadline.

Cohen, together with the head of the Foreign Ministry’s strategic division, Jeremy Issacharoff, and other senior Israeli officials who participated in the talks, said that America’s handling of the negotiations is hardening Iran’s position.

The Israeli officials reportedly told their U.S. counterparts that the Iranians think the Americans want to reach a deal more than they do, and so they don’t want to close a deal now. They added that Foreign Minister Mohammad Javad Zarif wants to be flexible, but Khamenei won’t let him.

Marie Harf, deputy spokesperson for the U.S. Department of State, said that “both the subjects and the details in that account of our recent consultations with the Israelis are inaccurate.” “Any attempt to misrepresent what has been a very constructive dialogue with our Israeli friends on the Iranian nuclear negotiations is disappointing,” she added.

Jerusalem responded harshly to the letter over the weekend. “I think the struggle with ISIS doesn’t need to come at the expense of preventing Iran from obtaining nuclear arms,” said Prime Minister Benjamin Netanyahu, before meeting with the European Union’s new foreign policy chief, Federica Mogherini. “One has to act in both these directions, and not tie one to the other.”

Foreign Minister Avigdor Lieberman also said Israel opposed linking ISIS with Iranian nukes. “It’s not our job to advise the U.S. president, but we disagree on this matter,” Lieberman said ats a press conference with Mogherini. “We oppose this approach … we think it is a mistake … Iran is not an acceptable partner for any moderate coalition against ISIS, or any type of dialogue in the Middle East.”

The White House and U.S. State Department in Washington declined to comment on the existence of the Obama-Khamenei letter over the weekend, but did engage in damage control. “There is no linkage whatsoever of the nuclear discussions with any other issue, and I want to make that absolutely clear,” said Secretary of State John Kerry, at a press conference in Beijing yesterday. “The nuclear negotiations are on their own.”

A decisive trilateral summit opens today in Muscat, involving Kerry, Zarif and the EU’s negotiator on Iran, Catherine Ashton. Senior Iranian and U.S. officials stressed over the weekend that the summit’s goal is to make a breakthrough in the stalled talks.

According to website Al-Monitor, Ali Akbar Velayati – Khamenei’s foreign policy adviser – is expected to join the meeting. Velayati’s participation in the talks could signal that Iran’s supreme leader is preparing for the possibility of making decisive concessions on the nuclear issue, ones likely to lead to signing a deal by November 24.

Significant gaps remain between the Iranian positions and those of the United States and the five world powers. Prime Minister Netanyahu is reportedly very concerned about the summit in Oman, which revolves around the final round of negotiations set to commence in Vienna on November 18. Netanyahu, who reportedly believes Obama is set on a deal with Tehran, suspects the Americans and Iranians are cooking up a secret bargain, which will leave a large portion of nuclear infrastructure in Iran’s hands, and present the deal as a fait accompli to the rest of the world.

Netanyahu said at a press conference with Mogherini in Jerusalem on Friday that it would be a mistake to allow Iran to become a threshold nuclear state.

“If Iran is left with residual capacity to enrich uranium for a nuclear bomb, ultimately this will destabilize the world – not just our region, not just pose a direct threat at Israel, whom Iran spells out for eradication, but also I think for all the Middle East and well beyond the Middle East,” he said. “I think this is something that should be prevented.”

Netanyahu added: “Better no deal than a bad deal that leaves Iran with a capacity to enrich uranium for a nuclear bomb.”

By Haaretz

 

Dragonfly vs. America, Courtesy of Russia

Can you live without electricity for a day or two? Yes of course if you in advance right? Can you live without power for a week or so? Yes of course with advanced notice right? Can you live without power for a month, 4 months or 18 months? NOPE. It is time to not only think about preparations, but to get prepared and then to practice procedures for short term and long term power outages and the reason is Russia.

There is a sad truth to what is below, the United States is not prepared and what is worse we are not declaring war to stop Russia either. Russia has hacked into U.S. government sites, hacked into corporate sites and hacked into the financial industry all without so much as a whimper as a U.S. reply. We have no countermeasures, we have no offensive measures and have not even written a strongly worded letter.

 

Russia has gone to the dragons against America, well actually to the Dragonflies and this is what you need to know and do. Remember the entire infrastructure is tied to SCADA, that includes water systems, transportation systems, water, hospitals, schools and retail.

Dragonfly: Western Energy Companies Under Sabotage Threat

Cyberespionage campaign stole information from targets and had the capability to launch sabotage operations.

An ongoing cyberespionage campaign against a range of targets, mainly in the energy sector, gave attackers the ability to mount sabotage operations against their victims. The attackers, known to Symantec as Dragonfly, managed to compromise a number of strategically important organizations for spying purposes and, if they had used the sabotage capabilities open to them, could have caused damage or disruption to energy supplies in affected countries.

Among the targets of Dragonfly were energy grid operators, major electricity generation firms, petroleum pipeline operators, and energy industry industrial equipment providers. The majority of the victims were located in the United States, Spain, France, Italy, Germany, Turkey, and Poland.

The Dragonfly group is well resourced, with a range of malware tools at its disposal and is capable of launching attacks through a number of different vectors. Its most ambitious attack campaign saw it compromise a number of industrial control system (ICS) equipment providers, infecting their software with a remote access-type Trojan. This caused companies to install the malware when downloading software updates for computers running ICS equipment. These infections not only gave the attackers a beachhead in the targeted organizations’ networks, but also gave them the means to mount sabotage operations against infected ICS computers.

This campaign follows in the footsteps of Stuxnet, which was the first known major malware campaign to target ICS systems. While Stuxnet was narrowly targeted at the Iranian nuclear program and had sabotage as its primary goal, Dragonfly appears to have a much broader focus with espionage and persistent access as its current objective with sabotage as an optional capability if required.

In addition to compromising ICS software, Dragonfly has used spam email campaigns and watering hole attacks to infect targeted organizations. The group has used two main malware tools: Backdoor.Oldrea and Trojan.Karagany. The former appears to be a custom piece of malware, either written by or for the attackers.

Prior to publication, Symantec notified affected victims and relevant national authorities, such as Computer Emergency Response Centers (CERTs) that handle and respond to Internet security incidents.

Background
The Dragonfly group, which is also known by other vendors as Energetic Bear, appears to have been in operation since at least 2011 and may have been active even longer than that. Dragonfly initially targeted defense and aviation companies in the US and Canada before shifting its focus mainly to US and European energy firms in early 2013.

The campaign against the European and American energy sector quickly expanded in scope. The group initially began sending malware in phishing emails to personnel in target firms. Later, the group added watering hole attacks to its offensive, compromising websites likely to be visited by those working in energy in order to redirect them to websites hosting an exploit kit. The exploit kit in turn delivered malware to the victim’s computer. The third phase of the campaign was the Trojanizing of legitimate software bundles belonging to three different ICS equipment manufacturers.

Dragonfly bears the hallmarks of a state-sponsored operation, displaying a high degree of technical capability. The group is able to mount attacks through multiple vectors and compromise numerous third party websites in the process. Dragonfly has targeted multiple organizations in the energy sector over a long period of time. Its current main motive appears to be cyberespionage, with potential for sabotage a definite secondary capability.

Analysis of the compilation timestamps on the malware used by the attackers indicate that the group mostly worked between Monday and Friday, with activity mainly concentrated in a nine-hour period that corresponded to a 9am to 6pm working day in the UTC +4 time zone. Based on this information, it is likely the attackers are based in Eastern Europe.

figure1_9.png
Figure. Top 10 countries by active infections (where attackers stole information from infected computers)

Tools employed
Dragonfly uses two main pieces of malware in its attacks. Both are remote access tool (RAT) type malware which provide the attackers with access and control of compromised computers. Dragonfly’s favored malware tool is Backdoor.Oldrea, which is also known as Havex or the Energetic Bear RAT. Oldrea acts as a back door for the attackers on to the victim’s computer, allowing them to extract data and install further malware.

Oldrea appears to be custom malware, either written by the group itself or created for it. This provides some indication of the capabilities and resources behind the Dragonfly group.

Once installed on a victim’s computer, Oldrea gathers system information, along with lists of files, programs installed, and root of available drives. It will also extract data from the computer’s Outlook address book and VPN configuration files. This data is then written to a temporary file in an encrypted format before being sent to a remote command-and-control (C&C) server controlled by the attackers.

The majority of C&C servers appear to be hosted on compromised servers running content management systems, indicating that the attackers may have used the same exploit to gain control of each server. Oldrea has a basic control panel which allows an authenticated user to download a compressed version of the stolen data for each particular victim.

The second main tool used by Dragonfly is Trojan.Karagany. Unlike Oldrea, Karagany was available on the underground market. The source code for version 1 of Karagany was leaked in 2010. Symantec believes that Dragonfly may have taken this source code and modified it for its own use. This version is detected by Symantec as Trojan.Karagany!gen1.

Karagany is capable of uploading stolen data, downloading new files, and running executable files on an infected computer. It is also capable of running additional plugins, such as tools for collecting passwords, taking screenshots, and cataloging documents on infected computers.

Symantec found that the majority of computers compromised by the attackers were infected with Oldrea. Karagany was only used in around 5 percent of infections. The two pieces of malware are similar in functionality and what prompts the attackers to choose one tool over another remains unknown.

Multiple attack vectors
The Dragonfly group has used at least three infection tactics against targets in the energy sector. The earliest method was an email campaign, which saw selected executives and senior employees in target companies receive emails containing a malicious PDF attachment. Infected emails had one of two subject lines: “The account” or “Settlement of delivery problem”. All of the emails were from a single Gmail address.

The spam campaign began in February 2013 and continued into June 2013. Symantec identified seven different organizations targeted in this campaign. The number of emails sent to each organization ranged from one to 84.

The attackers then shifted their focus to watering hole attacks, comprising a number of energy-related websites and injecting an iframe into each which redirected visitors to another compromised legitimate website hosting the Lightsout exploit kit. Lightsout exploits either Java or Internet Explorer in order to drop Oldrea or Karagany on the victim’s computer. The fact that the attackers compromised multiple legitimate websites for each stage of the operation is further evidence that the group has strong technical capabilities.

In September 2013, Dragonfly began using a new version of this exploit kit, known as the Hello exploit kit. The landing page for this kit contains JavaScript which fingerprints the system, identifying installed browser plugins. The victim is then redirected to a URL which in turn determines the best exploit to use based on the information collected.

Trojanized software
The most ambitious attack vector used by Dragonfly was the compromise of a number of legitimate software packages. Three different ICS equipment providers were targeted and malware was inserted into the software bundles they had made available for download on their websites. All three companies made equipment that is used in a number of industrial sectors, including energy.

The first identified Trojanized software was a product used to provide VPN access to programmable logic controller (PLC) type devices. The vendor discovered the attack shortly after it was mounted, but there had already been 250 unique downloads of the compromised software.

The second company to be compromised was a European manufacturer of specialist PLC type devices. In this instance, a software package containing a driver for one of its devices was compromised. Symantec estimates that the Trojanized software was available for download for at least six weeks in June and July 2013.

The third firm attacked was a European company which develops systems to manage wind turbines, biogas plants, and other energy infrastructure. Symantec believes that compromised software may have been available for download for approximately ten days in April 2014.

The Dragonfly group is technically adept and able to think strategically. Given the size of some of its targets, the group found a “soft underbelly” by compromising their suppliers, which are invariably smaller, less protected companies.

Two additional links are below for more information and key use.

http://energy.gov/sites/prod/files/Large%20Power%20Transformer%20Study%20-%20June%202012_0.pdf

http://www.fgdc.gov/usng/

 

 

 

Terror War, the Generational Future

Terror did not begin on September 11, 2001 with the attacks in America. The real war began however soon after that. But terror goes back many decades as early perhaps as 1982 with the founding of Hizbullah a terror network with global cells and founded by Muslim clerics. Iran financially supports Hizbullah and the leadership is trained and led by the Iranian Revolutionary Guard to kill or manage all apostates in the Middle East and eventually globally beginning with Jews.

So, pulling out of Iraq did not end the war there and leaving Afghanistan will not end the war there. Hostilities against the enemies of the West have long since been concluded under the Obama administration but those enemies have not ceased their hostilities against any non-Muslim globally. There is no mission to defeat the enemy, there is no rules of engagement to win ,there is no objective to seek victory.

Terror is IN the future and the next generations are being trained today.

It was earlier this year during the conflict between Israel and Hamas in Gaza where it was determined that Hamas hold summer camps and training for as many as 1000,000 child soldiers. These children even in regular schools are taught to hate Jews and Christians, they are taught twisted history, they are taught to build tunnels, to build bombs and to use weapons larger than their own body size.

Do you ever wonder where the United Nations is on this? The United Nations Relief and Works Agency knows and has been part of the program funding camps.

 

Today fighters hired and trained by al Qaeda, al Nusra and Daesh (ISIS) are as young as 12 years old, as their own older family members have already been in the fight and died. The family needs to money to live so younger fighters can earn $500.00 per month to support the home. Loyalty has vanished between fighting for al Nusra or Daesh, it is a matter of only safety and money.

So what comes next in terror is future recruits, a new and constant crop of not only female fighters but the never-ending flow of adolescent trainees.

 

NBC News reports

On the streets of Syria and Iraq, ISIS militants are building a small army — literally. The use and recruitment of child soldiers is a war crime. It’s also a practice which ISIS has boasted of in photos and videos splashed across the Internet with titles such as the “Cubs of the Islamic State.” 

Instead of archery and merit badges of Cub Scouts, these boys learn how to clean, disassemble and shoot machine guns. While their peers in the U.S. build campfires, ISIS’ diminutive devotees go from Quranic recitation drills to the front line of battle.

“They teach them how to use AK-47s,” one Iraqi security official told NBC News on condition of anonymity. “They use dolls to teach them how to behead people, then they make them watch a beheading, and sometimes they force them to carry the heads in order to cast the fear away from their hearts.”

Some graduates of the camps are used as human shields and suicide bombers. Other wee warriors man checkpoints, hoist heavy weapons and act as enforcers. Beyond the additional fighting power, analysts and experts say brainwashing young recruits is a strategic move aimed at ensuring the militant group’s longevity by providing a ready-and-willing next generation of jihadis.

“It’s being done for the same reasons that Hitler had the Hitler Youth,” explained Charlie Winter, of the Quilliam Foundation, a London-based anti-extremist think tank. “That’s effectively what we’re seeing here — military training and ideological training.” 

The potent blend of military training with ideology is especially dangerous for impressionable minds, which is exactly why ISIS is targeting the young.

“There’s no term better suited to it than brainwashing,” Winter said. “These children won’t have any point of reference other than jihadism so the ideology will be a lot more firm in their heads and a lot more difficult to dislodge.”

While the use of child soldiers in Syria is not an abuse unique to ISIS, it is “most prominent” with the group, according to Winter, and billed as a necessary “education.”

“It’s something to be expected because we know that they have and are trying to be a state — which means they have to have an educational system,” he said. “Obviously though it’s not going to be secular — teaching evolution and stuff — but going to be teaching the principles of jihad.”

Read more here and see the videos.

 

Circuit Court War over Marriage?

Slowly state by state, laws are being passed allowing gay marriages and throwing the Defense of Marriage Act into ignored and obscure history. Well that was actually easy as the Supreme Court rendered a decision to do that in 2013.

However, States have their own legislatures, their own Constitutions and much of the time the ethos of ‘separate but equal’ and been redefined. So, very little has been mentioned about Circuit Court rulings on marriage. The Sixth Circuit comes into play with their recent decision,  a good one. Question is, how will this play with the other Circuit Courts and what will the Department of Justice do to interfere?

The Thomas More Law Center (TMLC) played an instrumental role in a ruling issued late yesterday afternoon in which the Sixth Circuit Court of Appeals decided to preserve traditional marriage, stopping the homosexual juggernaught that had been sweeping the nation.   In its 2-1 decision, the Sixth Circuit upheld marriage laws from Michigan, Ohio, Kentucky, and Tennessee.  Judge Jeffrey Sutton wrote the opinion joined by Judge Deborah Cook. 
The Thomas More Law Center played a significant role in crafting Michigan’s constitutional amendment upheld by the Court.  TMLC also filed an amicus brief (friend of the court brief) on behalf of a Coalition of Black Pastors and Christian leaders supporting traditional marriage.
Responding to yesterday’s ruling, Richard Thompson, TMLC’s President and Chief Counsel commented, “This opinion is an historic and elegant defense of the principle of judicial restraint and deference to democracy and the voice of the people.  It could well become the catalyst for the US Supreme Court to finally take-up the issue as well as the basis of an ultimate Supreme Court decision to allow the individual states to decide the definition of marriage.”

The Sixth Circuit ruled that laws defining marriage as between a man and a woman were constitutional, even in light of the U.S. Supreme Court’s ruling last year in U.S. v. Windsor, which struck down the Defense of Marriage Act (“DOMA”).  The Sixth Circuit held that deference must be given to the individual states to regulate marriage, and that defining marriage between a man and a woman—as it has been for “thousands of years,” “span[ning] almost every society in history”—is a constitutional and rational act of the states.
TMLC played an intricate part in this crucial victory.  In 2004, TMLC crafted the Michigan Marriage Amendment which was upheld by yesterday’s decision.    TMLC cautiously ensured that the Marriage Amendment served no discriminatory purpose and explained its reasoning in the amendment itself, stating:
To secure and preserve the benefits of marriage for our society and for future generations of children, the union of one man and one woman in marriage shall be the only agreement recognized as a marriage or similar union for any purpose.
Mich. Const. Art. I, § 25.
Michigan’s Marriage Amendment was passed by fifty- nine percent of Michigan’s voters.  Supporters of “homosexual marriage” have not tried to pass their own legislation through the usual channels of democracy, but have tried to use judges to bypass the ballot box. Their strategy has proven successful in several courts across the county. It failed in the Sixth Circuit.
Instrumental to the Sixth Circuit’s decision was TMLC’s amicus brief that provided a full legal analysis explaining why marriage amendments that protect traditional marriage are constitutional.  The brief was submitted as part of TMLC’s national strategy to defend laws protecting traditional marriage and to enlighten courts on why traditional marriage is the only sound response to the approximately 90 cases filed in the past year by pro-homosexual activists.  TMLC has filed several briefs nationally as an answer to this assault on Christianity and traditional family values. 
TMLC’s amicus brief was filed on behalf of a Coalition of African-American pastors and Christian leaders to reflect the voice of a majority of African-Americans that discrimination because of one’s sexual preference is not the same thing as racial discrimination and that tradition and morality should not be discarded as a basis of the law as the pro-homosexual judges have done in their opinions.
A legal team consisting of TMLC’s senior trial counsel, Erin Mersino, and Co-counsels William R. Wagner and John S. Kane of Lansing, MI, has been filing briefs in significant cases dealing with traditional marriage. 
Coalition member, Pastor Danny Holliday of Victory Baptist Church, of Alton, Illinois reacted to yesterday’s ruling, “I am grateful to God because the Sixth Circuit overturned the decisions, concluding the definition of marriage should be left to the voters — not judges — and that voters should be allowed to decide whether gay marriage is a good idea or not.”
Coalition member, Minister Stacy Swimp, of Greater Bibleway Temple, stated, “I thank God that the U.S. 6th Circuit Court has lived up to its appointed responsibility to interpret law rather than create new laws. The ruling is indeed a major victory for traditional marriage and a strong affirmation of our nation’s Judeo Christian values and culture.”
Janet Boynes, another Coalition member reacted, “This is a great victory for those of us who believe in the sanctity of marriage, but we know the fight isn’t over. We pray for Circuit Judge Jeffrey Sutton and his family as they might have to face the rage of those with opposing views.
The Sixth Circuit adopted many of TMLC’s legal arguments including its point of view that preservation of our Nation’s tradition and morality should not be replaced with the trendy, moral relativism of only the last decade.  The brief states, “Some truths are self-evident. Among them are that men and women are different. In fact, it is clear from our very existence that men are made for women, and women for men. None of us would be here but for that truth. Another self-evident truth is that it is best for children to be raised by their parents whenever possible. There have been many theories to the contrary throughout history, but they have all proven vacuous at best. Public policy that recognizes and acts on these truths is not unfairly discriminatory. In fact, the only way to have sound public policy is to build on such truths.”