It Is Written

The Dangers of Technology

Three Angels Broadcasting Network

Program transcript

Participants:

Home

Series Code: IIW

Program Code: IIW018171A


00:10 ♪[Theme music]
00:19 >>John Bradshaw: This is It Is Written.
00:21 I'm John Bradshaw.
00:22 Thanks for joining me.
00:23 In the early 1800s, an English woman named Mary Shelley
00:27 had a contest with her future husband and another man
00:30 to see who could write the best horror story.
00:33 A few years before, she had traveled in Germany
00:35 near Frankenstein Castle, which is near the city of Darmstadt.
00:38 It seems that Mary was influenced by stories
00:41 about Frankenstein Castle,
00:44 and so she wrote the story of "Frankenstein."
00:49 In Mary Shelley's novel, a scientist working
00:51 in a laboratory creates an eight-feet-tall being
00:54 that ends up being described as a monster.
00:57 It's a story, ultimately, about science gone wrong.
01:01 A scientist or alchemist attempts to create something,
01:04 and things don't work out as intended,
01:07 as he works with the technology of his day.
01:10 The story was a cautionary tale.
01:12 Technology can come with unintended consequences.
01:16 And it seems that today,
01:17 society seems to have created another Frankenstein's monster.
01:22 Technology has given the world some wonderful things.
01:26 The Industrial Revolution-- that was technology.
01:29 Today, modern medicines do a great amount of good.
01:31 Modern transport-- it's incredible.
01:34 Now, you could argue that there's a downside to some
01:36 of these things, but there's also a gigantic upside.
01:41 Modern technology has given us computers.
01:44 Today we're able to access information anywhere
01:46 in the world from virtually anywhere in the world,
01:49 any time we like.
01:51 That's good, right?
01:52 You can watch whatever you want to watch,
01:54 whenever you want to watch it,
01:55 from the privacy of your own private space.
01:57 That's good, too, right?
01:59 Today you can type messages in moments,
02:01 send them to anyone anywhere.
02:03 You can post photos to photo-sharing websites,
02:05 broadcast video of whatever you're doing,
02:08 wherever you're doing it, to the whole world, if you want,
02:12 whenever you'd like to do so.
02:14 You no longer need to be a newspaper publisher to share
02:16 your point of view with everybody on the entire planet.
02:21 That's good...right?
02:25 Well, we know it isn't always good.
02:27 And we're coming to understand more and more that,
02:30 in many cases, it's actually positively harmful.
02:35 When an Englishman named Tim Berners-Lee invented
02:38 the World Wide Web early in the 1990s in Geneva, Switzerland,
02:42 it's doubtful that anyone anywhere realized
02:44 what it would become only a few short years later.
02:48 And it's probably fair to say that most people who use
02:51 the internet and modern technology today don't realize
02:55 what it really has become.
02:57 There's no question modern technology
02:59 provides great opportunities.
03:01 It's how you're able to watch this,
03:03 and I'm glad you're able to.
03:05 Technology is used to promote good values and to share
03:08 positive messages-- and to proclaim the gospel.
03:11 That's good.
03:13 But it seems that when it comes to modern technology,
03:15 every silver lining has a dark cloud.
03:21 Today's generation is the first generation in history
03:25 to be connected to a constant stream of electronic information
03:28 and entertainment.
03:30 And while that might seem like a silver lining in many ways,
03:33 that constant stream of temptation,
03:35 the constant access to sin, is a very dark cloud.
03:39 Today's young people have to grow up in a world
03:41 where being liked means something slightly different
03:44 to what it meant a generation ago,
03:46 and the pressures that come along with that
03:47 are impacting the lives of young people--
03:50 and the lives of not-so-young people--
03:52 in a very, very real way.
03:55 Society is now wired.
03:57 Or more to the point, it's wireless.
04:01 Whereas television decades ago brought the world
04:04 into the living room,
04:05 smartphones bring the world into your pocket.
04:09 And it's a different kind of world,
04:10 a world where there are virtually no controls.
04:15 And what's the constant connection with the internet
04:17 doing to us as individuals?
04:19 How's it challenging people of faith who claim
04:22 to be disciples of Jesus Christ?
04:24 And what's it doing to society?
04:27 Websites today offer you anything you want.
04:31 And a lot of things that you really don't want.
04:34 It's no secret that there's some dark content on the internet.
04:37 Unfortunately, it's eminently accessible,
04:41 even to children.
04:44 I spoke with one young lady, who shared with me just how easy
04:47 it can be for children to access the sort of content
04:51 that parents don't want their children seeing.
04:54 >>Kyla Steinkraus: I took my family to church,
04:56 um, myself, my husband, my 12-year-old son,
04:59 and my 7-year-old daughter.
05:01 And I took my daughter to go to the bathroom,
05:03 and I left my son in the back row.
05:05 My husband was volunteering in the audio-visual department,
05:09 which is a back room that has a glassed-in window,
05:12 um, but he was not directly with my son at the time.
05:16 And when I came back a few minutes later,
05:18 after taking my daughter to the bathroom,
05:20 um, I found my husband with a tablet and a 10-year-old boy,
05:24 and he was very upset.
05:26 So I asked him what happened,
05:28 and he said that the 10-year-old boy
05:30 had just shown my son pornography on his tablet--
05:34 at church.
05:34 >>John: In church?
05:35 >>Kyla: Yes, in church.
05:38 And I was so, so upset I was shaking.
05:42 It took me a minute to really--for it to sink in.
05:45 It was definitely a very negative experience,
05:48 a very saddening experience.
05:49 Your child loses some of their innocence at that point,
05:53 and it was, it was a hard thing to go through.
05:59 >>John: So, how'd this happen?
06:01 >>Kyla: The 10-year-old boy had the tablet,
06:03 and he came over and sat by my son and his friend and said,
06:06 "Here, I want to show you something,"
06:08 and he pulled up the pornography on his tablet
06:12 and showed it to the boys.
06:13 And to their credit, both boys said,
06:16 "No, we don't want to look at this."
06:18 But the 10-year-old then shoved it in their faces and said,
06:22 "No, I want you to see this."
06:24 My husband, who was in the A/V, um,
06:27 heard the commotion and looked through the window
06:30 and saw that something was happening,
06:32 saw the boys trying to push the tablet away.
06:34 And so when he came out and saw what was on the tablet,
06:38 he got very upset and took it immediately.
06:41 And that's the point where I came in.
06:43 And I took the boy aside and said,
06:45 "You're 10, you know; you're 10 years old.
06:48 How did you even get pornography?
06:50 Like, what happened?"
06:52 And that's when he told me that he had an Instagram account
06:55 and a pornography company had created a profile page with,
07:02 um, a picture of a beautiful scantily-clad woman,
07:06 who then went and searched for this young boy's profile--
07:11 or, well, they were searching for kids
07:12 and found him and was posting little comments
07:15 under his pictures.
07:17 And so, as a curious kid, he clicked on it to see
07:20 what it was, and it took him directly to pornography,
07:23 unfortunately.
07:26 >>John: I think that's something many parents don't realize,
07:28 is that there are predators-- individuals or sites
07:34 or companies, or whatever they might do--
07:36 that are coming after your kid.
07:38 They don't care who the kid is,
07:41 just as long as they can get access and then groom the child.
07:45 It's very intentional what's going on, right?
07:47 >>Kyla: Yes, correct.
07:49 I know an 11-year-old girl who had an adult child predator
07:56 pretend to be another 11-year-old boy
07:58 and start chatting with her,
08:00 and over time said that he wanted to be her boyfriend,
08:04 and then asked her to send pictures of herself to him,
08:09 and then asked her to send nude pictures of herself to him,
08:12 which she did.
08:13 >>John: She did--11 years old?
08:15 >>Kyla: She did, at 11 years old.
08:16 >>John: Well, well, let me ask you,
08:17 so, this 11-year-old that you know of,
08:19 uh, was she that kind of kid?
08:22 Is she the sort of kid that a person might say,
08:24 someone who knows her, say,
08:25 "Yeah, well, she'd do something like that"?
08:27 Or, totally out of the blue?
08:29 >>Kyla: No, it was very out of the blue.
08:31 She was just in fifth grade, very innocent,
08:34 had never had a boyfriend before.
08:35 She was very childish, very young.
08:38 It was totally shocking and unexpected,
08:41 and, and out of the blue, and the parents were devastated.
08:45 >>John: I, I think that's a really important point,
08:47 and I--forgive me for asking the way I did--
08:49 "was she that kind of kid."
08:50 I don't know how many 11-year-olds
08:51 are that kind of kid.
08:53 But, you know, there are some children you might say,
08:55 "Yeah, well, it wouldn't surprise me if this child
08:57 did something reckless."
08:58 But what you're saying is this was a model child
09:01 from a model family without any signs
09:03 that she might do something, which is quite remarkable.
09:07 It's quite a step from playing a game to...
09:10 sharing those kind of photographs.
09:12 How do you think then--and this means that any parent
09:15 must realize that, that their family is at risk,
09:19 under similar circumstance.
09:20 How did that child get from A to B?
09:23 How did that process take place?
09:25 >>Kyla: Well, I, you know, I hear it a lot where parents are.
09:28 They, you know, they give their kids a smartphone,
09:31 but they say, "Well, my kids are good kids."
09:33 Uh, "My kids would never do that."
09:35 Um, they'll, "They would never try to do that,"
09:38 or "They wouldn't be interested in that kind of thing."
09:40 But the thing is, is that it's not that their kid
09:43 is going out looking for that kind of stuff.
09:45 That stuff is looking for their kid and is--
09:48 those companies, those child predators
09:50 are hunting these kids.
09:52 >>John: So, this 11-year-old child shared pictures
09:55 that no parent wants an 11-year-old child sharing.
09:58 What happens to those pictures?
09:59 >>Kyla: The parents did call the FBI,
10:01 and it was an adult child predator
10:05 who had targeted their daughter.
10:08 But they were unable to recover the pictures,
10:11 so the pictures are now part of the child pornography.
10:15 They get shared among pedophiles and predators online...forever.
10:22 >>John: And that's not something that any parent
10:25 wants to go through.
10:27 >>Kyla: No.
10:28 >>John: Or have the child go through.
10:29 >>Kyla: Yeah.
10:30 >>John: So, Kyla, let me ask you this.
10:32 Parents are watching this, and they're thinking,
10:34 oh, my goodness.
10:35 What should parents who are concerned--
10:37 what should they do?
10:38 What can they do right now to address the situation
10:42 in their own experience-- like, right now?
10:44 >>Kyla: I think the number one most important thing
10:47 that they could do right now is take away the smartphone.
10:51 It really gives your kid unfettered access to everything.
10:57 And gives predators unfettered access to your child.
11:01 And it's not the coolest thing to do;
11:03 it's not the easiest thing to do.
11:05 But to me, my child's-- your child's safety
11:09 and your child's soul is the most important thing.
11:14 >>John: Kyla, thanks so much. I appreciate this a lot.
11:17 We'll be back with more in just a moment.
11:19 ♪[Theme music]
11:28 >>Announcer: To receive your free DVD copy of this program,
11:31 call us now at 800-253-3000
11:35 "The Dangers of Technology" DVD also includes bonus material
11:38 from internet security expert Michael Dinkins,
11:41 which will help keep you and your family safe online.
11:45 Don't miss "The Dangers of Technology."
11:47 It's yours free when you call 800-253-3000
11:51 You can write to the address on your screen,
11:53 or visit iiwoffer.com
11:58 >>John Bradshaw: Thanks for joining me on It Is Written.
12:01 I'm John Bradshaw.
12:03 It's a new age.
12:04 Modern technology has changed the way that we do life.
12:07 Now, you've seen people sitting together in a group,
12:09 but everybody has their heads...down;
12:12 they're gazing at their devices.
12:14 Now, is that harmful?
12:16 Well, no, not necessarily.
12:18 But the potential for harm is huge.
12:21 And that potential is being realized.
12:24 Now, in a moment we're going to talk about social media--
12:26 Facebook and Instagram and Snapchat and Twitter
12:28 and so forth.
12:29 They are huge today.
12:32 But there's a fundamental issue
12:33 that we're going to discuss first.
12:35 The internet has really brought with it the death of privacy.
12:40 Now, privacy is a human right,
12:42 recognized as such by the United Nations.
12:45 Now, you might think you're carrying a smartphone with you
12:47 when what you're actually carrying with you is a...
12:50 tracking device.
12:52 You see, unless you've taken action,
12:53 your smartphone tracks your movements.
12:56 It keeps a record of everywhere you've been
12:59 and of most things that you've thought or written.
13:02 Your laptop or your smartphone almost certainly contains
13:06 information that you don't want other people seeing.
13:10 Take a look at your search history and then ask yourself
13:13 how you'd feel if simply your search history was made public--
13:17 and not because you've necessarily done anything
13:19 illegal or immoral.
13:20 Your devices contain an enormous amount of sensitive information
13:23 about you--maybe health information or other personal
13:26 or interpersonal information.
13:29 What you post online,
13:31 whether that be a photo or a comment or an opinion,
13:34 becomes part of a permanent electronic record of your life.
13:38 Kids--or adults, for that matter--who post photos
13:41 or conversations online ought to be asking themselves
13:44 if what they are posting is what they would want a teacher
13:47 or a grandmother to see.
13:50 It's, it's a must to think that way.
13:51 You see, even if you think that you've got nothing to hide--
13:54 which may well be true--
13:56 you've certainly got something to protect.
13:59 Devices are often now a gateway to accounts,
14:03 emails, personal information.
14:05 Essentially, they're a gateway
14:07 to a running history of your life.
14:10 And you don't want people getting their hands on that.
14:15 I talked with Michael Dinkins, an internet security expert
14:19 at UTC, the University of Tennessee at Chattanooga,
14:23 and he shared with me some ways that people
14:25 can protect themselves online.
14:28 >>Michael Dinkins: Well, first thing, in my opinion,
14:30 is to become aware of what the "threat-scape" is.
14:33 Uh, they need to understand fully what, what is the attack,
14:37 uh, and what's coming at them.
14:39 You need to use strong passwords.
14:41 You need to, uh, upgrade your systems,
14:43 make sure it has the latest operating system patches,
14:45 latest security patches.
14:47 You should have different account names
14:50 and different account passwords for every site that you go to.
14:53 You have screen time for children, uh,
14:56 that should be monitored, uh, because they can go anywhere.
15:00 They need to understand that once you put something
15:03 on a social networking site, or even in a private drive space,
15:07 once it's out there, it's out there,
15:08 and it's out there probably forever.
15:11 Take advantage of any convenience that you want to,
15:14 but understand that whenever you embrace convenience,
15:17 somebody else knows about it, you know.
15:20 So, uh, you've just got to find that balance on how...
15:25 invisible you want to be on the internet.
15:29 >>John: It comes as a terrible surprise to a lot of people
15:31 to learn that their email service gives third parties
15:34 the right to read their email, which is entirely legal
15:37 because you checked off on fine print,
15:40 which made it legal for that to happen.
15:43 People give away a lot about themselves online.
15:46 Now, again, only you can decide how much is too much.
15:50 But research from Cambridge University has said that
15:53 after you "like" just 10 Facebook pages,
15:56 advertisers can get to know you as well as a colleague does.
16:00 After 70 "likes," someone with that information can know you
16:04 about as well as a close friend does.
16:06 And after 150 "likes"?
16:09 You've essentially given up as much about yourself
16:12 as your parents know.
16:14 Advertisers once thought that consumers would become
16:17 desensitized to this lack of privacy,
16:19 but studies show that the opposite
16:22 appears to be happening.
16:24 So, what about social media and the effect it's having
16:27 on your life and on society?
16:29 And what does the Bible say that speaks to this?
16:32 I'll be right back.
16:33 ♪[Theme music]
16:42 >>John: Thank you for remembering
16:43 that It Is Written exists
16:45 because of the kindness of people just like you.
16:48 To support this international life-changing ministry,
16:51 please call us now at 800-253-3000
16:55 You can send your tax-deductible gift
16:57 to the address on your screen,
16:58 or you can visit us online at itiswritten.com
17:02 Thank you for your prayers and for your financial support.
17:04 Our number again is 800-253-3000
17:09 Or you can visit us online at itiswritten.com
17:12 ♪[Music]
17:14 >>John: Thursday, August the 5th, 2010,
17:16 was not a happy day for 33 men
17:20 when a collapse in a mine in Chile
17:23 buried them 2,300 feet below ground.
17:28 No matter how much they tried to escape,
17:30 there was no way out.
17:32 Rescue would have to come from above.
17:37 On the outskirts of the San Jose Mine,
17:39 over two-and-a-half thousand people gathered,
17:42 and with each failed rescue attempt, despair increased.
17:48 Families gathered together to pray for a miracle.
17:53 From the Atacama Desert comes a story of tragedy,
17:56 a story of uncertainty, yet a story of courage,
18:00 hope, and ultimately, a story of salvation.
18:04 Wait on the Lord, and the miracle will come.
18:08 "Trapped."
18:10 Watch now on itiswritten.tv
18:13 >>John: Thanks for joining me today on It Is Written.
18:16 The world has changed.
18:17 Technology has rewritten the rules of engagement.
18:21 Young people, especially, are being forced to grow up
18:23 in a world that is radically different from the world
18:26 their parents or grandparents grew up in.
18:28 Temptation looks different today than it did in days gone by.
18:32 Temptation now hunts for you--
18:34 and your children or grandchildren.
18:36 And it comes in more attractive ways than it used to.
18:39 And that's by design.
18:42 Social media sites were created by very bright people,
18:46 whose intent was to get you to use their product
18:49 as much as possible.
18:50 In other words, they want to get you hooked.
18:55 It's interesting that in recent times,
18:57 some of the people who took part in developing
18:59 social media services like Facebook have expressed regret
19:03 over what they created.
19:06 Facebook's founding president has criticized the way
19:09 that the company "exploits a vulnerability
19:11 in human psychology" by creating what he called
19:14 a "social-validation feedback loop."
19:18 Another said he believed that social media was "eroding
19:21 the core foundations of how people behave
19:23 by and between each other."
19:25 That same man said that he doesn't doesn't allow
19:27 his children to use social media
19:30 because of the way it deliberately hooks people
19:32 to spend more and more time on those sites and to divulge
19:37 more and more personal information about themselves.
19:41 He said, "You don't realize it, but you are being programmed,"
19:45 saying that people have to decide how much
19:47 of their intellectual independence
19:49 they are prepared to give up.
19:51 A former Google executive said,
19:53 "Our minds can be hijacked.
19:55 Our choices are not as free as we think they are."
20:00 And the technology obviously works.
20:02 One piece of research said that the average millennial
20:05 checks their phone 157 times a day.
20:11 A former Facebook executive said that social media sites
20:14 are "exploiting a vulnerability in human psychology."
20:19 And maybe here's the rub.
20:21 One of the co-creators of the "like" button said,
20:24 "If we're not vigilant, computers and mobile devices
20:28 will guide our attention poorly."
20:31 Think about that.
20:32 The "like" button was created to exploit our desire
20:35 to be affirmed--or liked.
20:38 You can easily see how it can lead a person to do or say
20:40 or post things that later they might seriously regret.
20:45 You know, people have been killed,
20:46 people have died doing crazy things in an attempt
20:50 to make content that they hoped would go viral.
20:54 They wanted to be seen and noticed and liked.
21:00 Now, think of the spiritual ramifications of this.
21:04 You've likely heard people say,
21:06 "I go online;
21:07 I go to Facebook or YouTube for just a few minutes.
21:10 I just waste time scrolling through comments
21:13 and clicking on links."
21:15 You might have said that yourself.
21:17 What is seen as a form of entertainment really is
21:20 nothing less than an addiction for a whole lot of people.
21:24 Now, there's another purpose of social media.
21:26 One, they want to get you hooked to use their site.
21:28 Secondly-- think about this--
21:30 Facebook, for example, isn't selling you social networking.
21:33 They're giving that to you for free.
21:35 What they're selling is information--
21:38 your information-- to other people.
21:40 And how are they getting that information?
21:43 You're giving it to them.
21:44 Now, again, you might not have a problem with this.
21:46 It surely isn't illegal.
21:48 But it tells you how careful you have to be to make sure
21:50 that you're not sharing more about yourself
21:53 than is appropriate--things that are not dangerous to share.
21:58 So now, let's look at a few biblical principles
22:00 to help guide us with modern technology.
22:03 One, you want to live like you've got nothing to hide.
22:07 To do that, you want to have nothing to hide.
22:10 The internet has a way of sucking people into doing things
22:13 that they might not otherwise do,
22:15 and saying things they might not otherwise say.
22:17 So, here are some Bible verses to keep in mind
22:20 that can help you with this.
22:21 Psalm 51, verse 10, David's prayer.
22:24 He prayed,
22:25 "Create in me a clean heart, O God;
22:27 and renew a right spirit within me."
22:30 Second Corinthians 5, verse 17:
22:32 "Therefore if any man be in Christ, he is a new creature:
22:35 old things are passed away;
22:38 behold, all things are become new."
22:40 So, you want to be fully given to Christ.
22:42 There's a lot of garbage on the internet,
22:44 in the media, in society.
22:47 Only the power of God in your life
22:49 is going to keep you from that.
22:51 That's all.
22:52 There's a lot of tawdry stuff online.
22:55 Even reputable websites leave little or nothing
22:58 to the imagination these days.
23:00 There's very little that's hidden anymore.
23:02 And that's a challenge for believers.
23:04 So, remember what Paul wrote
23:06 in Philippians chapter 4 and verse 8:
23:08 "Finally, brethren, whatever is true, whatever is honorable,
23:12 whatever is right, whatever is pure,
23:15 whatever is lovely, whatever is of good report,
23:17 if there is any excellence and if anything worthy of praise,
23:21 dwell on these things."
23:24 God says there are some things
23:25 that shouldn't even be on your mind.
23:28 There's no doubt modern technology has made it easier
23:31 than ever before to encounter sin,
23:34 and harder than ever to keep away from it.
23:37 Technology has made it easier than ever to access sin
23:41 and to access it privately.
23:43 It's easier than ever to encounter meanness and hate.
23:46 The internet is full of it.
23:48 It's easier than ever to be victimized by others,
23:50 even by people that you don't know.
23:52 What we need is the power of God to keep us away
23:55 from where we shouldn't be and to keep us where we should be.
23:58 It's essential that you know Jesus as a friend,
24:02 so that you are validated by Him,
24:04 and you don't feel the need to be validated by others online--
24:07 chasing "likes" instead of pursuing the love of God.
24:12 It's essential we're able to keep our lives in balance.
24:15 Of course, you can have healthy relationships online,
24:17 healthy interests online.
24:19 But it's easy to become unhealthy.
24:22 God is able to keep you where you need to be and want to be.
24:27 We need the ability to say what we should,
24:30 and not to say what we shouldn't.
24:32 A lot of people have made their lives complicated
24:34 by forgetting Proverbs 13, verse 3 when they go online.
24:37 "He who guards his mouth preserves his life,
24:41 but he who opens wide his lips shall have destruction."
24:45 If Solomon was writing that today,
24:47 he might have said something about guarding the keyboard.
24:50 And we need something that the Bible calls "temperance."
24:54 Galatians 5:22 and 23 says this:
24:57 "But the fruit of the Spirit is love, joy, peace, longsuffering,
25:01 gentleness, goodness, faith, meekness, temperance:
25:05 against such there is no law."
25:09 That word "temperance,"
25:10 that's what we would call "self-control."
25:13 I saw a definition of that, which said,
25:17 "The virtue of one who masters his or her desires and passions,
25:22 especially sensual appetites."
25:26 You see, what we need is surrender to the Holy Spirit.
25:30 As the times change, temptations change with them,
25:34 or at least, temptation is brought to us in different ways.
25:37 Revelation 14:12 speaks about the "saints...
25:40 who keep the commandments of God and the faith of Jesus."
25:45 Technology has not made that unattainable.
25:49 But it should make us realize that we need God;
25:52 we need the Holy Spirit in our lives more than ever before.
25:57 If you're struggling with this, God can help you.
25:59 And He will.
26:01 Ask God to be your strength; tell Him He must.
26:04 Ask God to deliver you.
26:06 And watch God work--
26:08 and experience God's power in your life.
26:13 >>Announcer: To receive your free DVD copy of this program,
26:16 call us now at 800-253-3000
26:20 "The Dangers of Technology" DVD also includes bonus material
26:23 from internet security expert Michael Dinkins,
26:26 which will help keep you and your family safe online.
26:30 Don't miss "The Dangers of Technology."
26:32 It's yours free when you call 800-253-3000
26:36 You can write to the address on your screen
26:38 or visit iiwoffer.com
26:44 >>John Bradshaw: Let's pray together now.
26:46 Our Father in heaven, we know that modern technology
26:49 brings temptation to us like never before.
26:51 ♪[Music]
26:52 And look at us. We're just poor, weak people,
26:55 in need of Your help and Your strength.
26:58 So, thank You that You have pledged not to leave us
27:01 and not to forsake us.
27:03 We need Your assistance; we need Your power
27:05 in this very real battle against sin,
27:08 as presented to us in this modern age.
27:11 Lord, I pray, protect us online and offline.
27:14 Give us wisdom, self-control as we live our online lives.
27:21 And I pray, Lord, that our primary pursuit would be Jesus.
27:25 Teach us to love Your approval
27:29 more than the approval of others.
27:31 And keep us where we ought to be, even when our weakened,
27:34 fallen hearts want to lead us in another way.
27:37 Give us Your Spirit, that we are born again,
27:40 and keep us in the center of Your will now and ever.
27:43 We pray in Jesus's name.
27:46 Amen.
27:47 Thanks so much for joining me.
27:49 I'm looking forward to seeing you again next time.
27:51 Until then, remember:
27:52 "It is written, 'Man shall not live by bread alone,
27:56 but by every word that proceeds from the mouth of God.'"
28:02 ♪[Theme music]
28:12 ♪[Theme music]


Home

Revised 2018-09-19