Spritual Warfare

In: Religion Topics

Submitted By drummerrican06
Words 722
Pages 3
"I will go to church when God touches me.” This is something I heard ever since
I was a little boy. I grew up in a family which was not very founded in the gospel. My brothers and sisters were more into there own lives rather than there lives in Christ. My parents were the only ones in the household that were believers. I was about 5 years old at the time and followed my parents every where they go, even to church. So every time I heard my parents invite my siblings to church, they would reply “I will go to church when God touches me.”
Hearing this over and over again made me analyze a lot as a child in the gospel.
I use to always ask myself “Well God why aren't you touching them? Why aren’t you showing your glory in there lives?”
This is when I first started to fight with the Lord. I was a God fearing man every since I was a little boy but I never knew how people can't live without God in there lives.
When I was about 7 years old my oldest brother (Andrew) was sent to jail. This crushed my parents and my family especially myself. The night he was sentenced I cried and prayed for him. As
I prayed words started to come to mind.
Things I couldn't understand but I wrote them down as I cried feeling God presence in my room. As I wrote down these words I heard someone tell me these words are for your brother Andrew.
So I waited till he called us since he was allowed one call a day. When he called I opened the bible and gave a short preaching about Jonas and how he didn' t listen to Gods words and now he was locked up in the fish till God said so and compared that to his life. Now he must pray for God himself to take him out of there for he can do what God as been asking him to do. We both wept as I know God was touching him. This is when God confirmed my calling. I wanted to preach his word all over the world. At the age of…...

Similar Documents

Cyber Warfare

...Computers have modernized terrorism in the same way cyber terrorism revolutionized information warfare. There is no distinct definition of Cyber terrorism; however, its threat is as real as waging war but with weapons of automation. Terrorists have begun to exploit the availability of information with the malicious intent to sabotage; conversely, there are those who are not quite sure if information warfare - cyber terrorism is an actual threat. This research paper will briefly explore the history of cyber terrorism, the friend the internet has been to terrorist and how we can make the internet safer through vigilant tactics of prevention and deterrence. It will also expose the truth about cyber terrorism for the skeptic, reasons not to discount the threat, and why it is paramount their mind is changed. Information Warfare-Cyber Terrorism Did you know there were 18 cybercrime victims every second, 1058 every minute, approximately 64,000 per hour, and 1.5 million per day, that affected over 556 million people within the last year (Norton , 2012)? The internet has made it possible for terrorists to gather our public information and use it against us. As the internet matures so does the terrorist, finding ways to cripple and intimidate. The internet and terrorists have become a real hazard to the health of the cyber world. The government has implemented several organizations to help combat cyber terrorism but have not given it a clear concise definition. ......

Words: 3494 - Pages: 14

Religion and Warfare

...Religion and Warfare: Yesterday and Today A religious war is a war justified by religious differences. It can be the acceptable forces of one state that has a well-known religion against those of another state with either a different religion or a different section within the same religion, or, at the level below a state, it can be a faction motivated by religion attempting to spread its faith by violence either within the state or elsewhere. The French Wars of Religion, the Crusades, and the Reconquista are often cited historical examples. While there are certainly wars fought primarily on religious grounds, wars frequently have multiple and complex causes. Saint Augustine is credited as being the first to detail a "Just War" theory within Christianity, whereby war is justifiable on religious grounds. Saint Thomas Aquinas elaborated on these criteria and his writings were used by the Roman Catholic Church to regulate the actions of European countries (Sherman & Salisbury). In modern times religious differences are frequently used as shorthand for cultural and historical differences between combatants, giving the impression that the conflict is primarily about religious differences. For example, The Troubles in Northern Ireland is frequently seen as a conflict between Catholic and Protestant. However, the more basic cause is the attachment of Northern Ireland to either the Republic of Ireland or the United Kingdom. As the native Irish were mostly Catholic, and......

Words: 1813 - Pages: 8

Mountain Warfare

...have to lead Marines into combat with his junior Marines being disgruntle towards each other, his professionalism and maturity and the will to do the right thing would play a strong role in his unit and his mind set would have to be mission first and as well as balance those opinions at the same time. During the Korean war the NCO was also faced with taking his experiences during the war back to the rear to train the Marines that are going to be combat replacements in Korea and since the Marine corps was on a push to get it ranks up to 200,000 they needed a place to train these Marines going to Korea and that place we know today is Mountain Warfare Training Center Pickle Meadows California (MWTC). The NCO’s in charge of training at the MWTC were as follows: Cold Weather survival, rock climbing and animal packing. The Mountain Warfare training center provided excellent training to Marines that where heading to Korea because of the fact that they had a feel of what they could face just like the Marines did at the Chosin Reservoir....

Words: 752 - Pages: 4

Irregular Warfare

...An Irregular Warfare Strategy for Somalia Staff Sergeant Ondrae L. Meyers Enlisted Professional Military Education- Career Course 9 June 2014 In Somalia there is a constant battle that the country faces with a terroristic organization called Al Shabaab. Within these battles they do not use conventional warfare. The Al Shabaab do not have the support of the people and rule by commanding obedience through fear. In a conventional war military forces attempt to achieve strategic objectives against a recognized state. Irregular Warfare is when adversaries seek to isolate themselves from their external supporters and undermine their opponent’s legitimacy and credibility. Irregular Warfare is defined by the Department of Defense Directive 3000.07, (December 2008), as “A violent struggle among state and non-state actors for legitimacy and influence over the relevant population(s). Irregular warfare favors indirect and asymmetric approaches, though it may employ the full range of military and other capacities, in order to erode an adversary’s power, influence, and will.” There are specific applications of “keys to success”, in order to carry out the Irregular Warfare campaign. The two applications are unity of success and understanding the operational environment. Irregular Warfare is defined by Thomas Edward Lawrence, better known as ‘Lawrence of Arabia’, as “Granted mobility, security (in the form of denying targets to the enemy), time, and doctrine (the idea to convert......

Words: 893 - Pages: 4

Cyber Warfare

...accounts of Chinese human rights activists. The attacks were directed at some 34 companies or entities, most of them in Silicon Valley, California, according to people with knowledge of Google’s investigation into the matter. The attackers may have succeeded in penetrating elaborate computer security systems and obtaining crucial corporate data and software source codes.” Both of these attacks could be dismissed as everyday criminal cyber-attacks but they could be considered something much more serious. By some the attack against Visa and MasterCard maybe considered cyber terrorism and the attack against Google considered cyber warfare. The circumstances of the attack, politics, and the parties involved often determine what category an attack falls in. This paper will focus on cyber-attacks that the United States Government deems to be cyber terrorism or cyber warfare. We will explore the past, present, and future of these attacks and our nation’s current known defensive and offensive cyber-attack capabilities. Cyber Terrorism Distinctions between crime and terrorism may be blurry when attempting to describe a computer network attack (CNA). It can be difficult to determine if non-state actors who initiate a CNA are secretly sponsored by a nation state because it can be hard to determine where a cyberattack originated because attackers may direct suspicion toward an innocent third party. Interactions between terrorist and criminals who use computer technology may further......

Words: 2021 - Pages: 9

Celtic Warfare

...Celtic warfare Celtic warriors were well equipped with an arsenal of weapons and armor, and were always ready to fight. During battles, they dressed in long oval shields that covered most of their body. These oval shields were usually made of wicker or wood and might have been covered with leather. Some warriors carried spears, which looked like javelins. These spears were made of wood, which the Celts would throw at opposing forces to knock down some of the enemies. The range was greater than an arrow, so they had more of an advantage over the enemy. The common warriors would wear leather helmets that provided little to no protection, but wealthy warriors could afford bronze helmets that very protective. During the Bronze Age, they carried a sword that was only designed for thrusting, not cutting. Eventually, the Celts developed a 'Cut - Thrust' Sword which was a long iron double-edged sword. In the Iron Age, they developed their most popular sword, which was the double-edged Broad sword. It was made of iron and bronze, and it was one of the heaviest swords ever created. It had a wooden scabbard covered with leather and was lined with fur, with bronze chaps, and an iron or bronze blade. The Celts used only a few battle tactics to overcome their enemies, but they were still very successful in battle. Chariots were an important part of Celtic warfare, a method that was very effective against the Romans. Warrior and driver were a strong team. The driver would bring the......

Words: 664 - Pages: 3

Celtic Warfare

...rule happened every year before Caesars arrival that they either opened up hostilities themselves or had to defend against -, they all joined the battle . . .” (Caesar, De Belli Gallico VI – 15,1) Caesar may be a biased source, but his statement tells us a lot about the role of war in ancient Celtic society: it was an important part of life, primarily for the nobility, but, to a lesser degree, also for the average man. We see a similar picture if we take a look at the Irish or Welsh legends, where the heroes go off to fights, most often one at a time or in small groups, but often in the company of their followers and clients to fight mass battles. A Short, Short History of Celtic Expansion and Retreat Before we look into ancient Celtic warfare itself, it is necessary to define what time and geographical region I will be talking about. Even though Celtic culture developed probably some centuries earlier, the oldest material I’ll be discussing dates to the beginning of the 5th century BC in central Europe. From that point, the culture expanded until, in the 3rd century BC, it reached its greatest extent with Celts living in Ireland and Spain in the West and as far as Galatia in Asia Minor in the East. This was partly due to cultural exchange and peaceful transmission of ideas, partly due to massive military campaigns like that in northern Italy. From then on, however, the Celts began to lose ground. Starting even in the 3rd century BC, the Romans began to conquer the Celtic......

Words: 2666 - Pages: 11

Cyber Warfare

...For over a decade, the concept of cyber warfare (computer warfare) has bee embedded i military doctrine. I 2000 the Defece white paper stated a ambition to repond to cyber warfare attacks. The 2007 Defence Update went further by calling for a focus on 'cyber warfare' to protect 'national networks and deny information'. The most recent Defence White Paper in 2009 also announced a 'major enhancement of Defence's cyber warfare capability...to maximise Australia's strategic capacity and reach in this field'. Given the rate of technological change and the number of system vulnerabilities discovered every day, the ADF's cyber capabilities will require dedicated and constant attention. This will be difficult to achieve and sustain if the ADF has not fully defined what it means by cyber warfare and how it will be used to serve Australia's interests. There are several definitions of cyber warfare, one of which was provided earlier this year by Defence Signals Directorate's (DSD) Deputy Director of Cyber and Information Security Mike Burgess in a speech to the Old Crows Association. He defined cyber warfare as 'an act...intended to degrade, destroy or deny computer accesses and systems' and added 'a true act of cyber warfare would have to be potentially lethal, instrumental and political'. Information stored on computers has become a key national asset and an element of our national power. Our ability to create information, store it, secure it, analyse it and harness it to......

Words: 571 - Pages: 3

Robotic Warfare

...Robots Help, Not Hurt Imagine a world where robots were used instead of humans on the battlefield and there was no loss of human lives. Robotic warfare needs to be supported because it helps prevent the loss of human life, it has the ability to rapidly reproduce robotic soldiers, and it can reduce the possibility of human error. Many articles state that robots have the downsides like most everything does but robots can provide upsides that can't be done by any other solution. Robotic warfare is a positive for both sides of the spectrum due to niether side losing any men at all. When a soldier goes out on to a battle field they have a chance to die because of many various dangers and they are unable to identify and counteract all of the dangers they will face. The amount of dangers are too immense for one human to handle and key in on the human aspect. If and when the robotic soldier enter the battlefield soldier will be virtually untouchable and incredibly safe compared to war in this era. This still doesn't keep humans completely out of harm's way from the dangers of the battlefield. The humans have to be within a certain range to operate the drones or robots that are being controlled in the battlefield so they are still be in range of the enemy forces and can be killed if spotted or traced by the enemy. Also when you put robots into combat they don't have the ability to discern an enemy vs an innocent person. The robots could end up killing innocent women and......

Words: 1035 - Pages: 5

Spiritual Warfare

...Spiritual Warfare Strongholds & Strategies Bob Burns “Everything is permissible for me-but I will not be mastered by anything” 1 Corinthians 6:12 1 The Bible tells us that we struggle not against flesh and blood, but against demonic forces. Ephesians 6:12, "For we wrestle not against flesh and blood, but against principalities, against powers, against the rulers of the darkness of this world, against spiritual wickedness in high places." Often the enemy uses life controlling problems as a means of attack. “Life-controlling problems are anything that master our lives and block our spiritual growth.” Other description include: life-controlling struggles, addictions, dependency, stronghold, besetting sin, slavery, and compulsive behavior. 1 Almost everyone has something blocking his or her spiritual growth in Christ. Some strongholds may be something that people consider positive such as sports or ministry. Others that are considered negative include drugs, gambling, sexual addiction and more. Perhaps a person is consumed by another persons problem, trapped by grief, depression, anger, envy, lust and etc. 2 In this paper we will discover the three tools Satan uses to keep people trapped which are delusion, secrecy, and isolation. Secondly we will learn about three resources God provides to confront the enemies attack. These include the Word of God, the Spirit of God, and the People of God. Delusion or deception means to make another person......

Words: 983 - Pages: 4

Cyber Warfare

...Cyber warfare One of the first cyber-attacks was the Morris worm in the year 1988. It had affected the world cyber infrastructure. This worm utilized the weak areas of UNIX system Noun1. This worm has replicated adversely and slowed down the computers in all of the US and made them unusable. Cyber warfare has become a societal issue now. Though the roots of cyber warfare aimed at military areas primarily, it extended its effects to non-military areas too. The information infrastructure based companies have become victimized due to abundant availability of cheap cyber weapons over internet. This resulted in economic instability. Libicki classified information warfare into seven categories. They are intelligence based warfare, economic information warfare, hacker warfare, psychological warfare, electronic warfare, command and control warfare and cyber warfare. CSI and CERT information reflects that securities incidents are common, private firms are the major targets and much of these security incidents never receive public acknowledgement (Geeks et al., 2010). Several tools in the cyber warfare are developed based on Windows and are available free of cost. They require a minimal understanding about the technology frames. Many of the network organizations today are using well developed proxy servers, intrusion detection systems and firewalls. However these defensive systems are often configured improperly and carried known vulnerabilities. This weakness gave an opportunity......

Words: 1988 - Pages: 8

Warfare Prayer

...A Warfare Prayer Before Starting Your Day Heavenly Father, I bow in worship and praise before you, and thank you; for covering me with the blood of Jesus Christ. I claim the protection of the blood for me Family; my finances; me home; and my spirit, soul, and body. I surrender myself completely in every area of my life to you. I take a stand against all the workings of the devil that would try to hinder me and my family from best serving you. I address myself only to the True and Living God, who has all power and control over everything. For this purpose the Son of God (Jesus) was manifested that he might destroy the works of the devil. Thank you Lord Jesus for destroying all satan’s work in my life, on the cross. Therefore, satan, I command you and all your demon forces of darkness, in the name of the Lord Jesus Christ, to leave my presence. I bring the blood of Jesus Christ between you and my family; my home ; my finances ; and me spirit, soul, and body. I declare therefore that you and your wicked spirits are subject to me in the name of the Lord Jesus Christ. Furthermore, in my own life today, I destroy and tear down all satanic strongholds and cancel every plan that has been formed against my family in the Name of the Lord Jesus Christ. I tear down every stronghold against my mind, emotions, and body and I present myself to you Heavenly Father; a living sacrifice, holy and acceptable, which is my reasonable service. I realize that I am the temple of the Holy Spirit,......

Words: 798 - Pages: 4

Biological Warfare

...Biological warfare has existed for centuries and is still existent in modern times. Over the past years, there has been an increase in biological warfare where, several persons gave died from the deliberate release of biological toxins, such as bacteria, fungi, and viruses. When infectious agents are used as weapons the intent is to kill living organisms, whether it is humans, plants, or animal. However, humans are often times the main target. According to the Occupational Safety and Health Administration (n.d), biological agents have the ability to adversely affect human health in a variety of ways, ranging from relatively mild, allergic reactions to serious medical conditions, even death. These organisms are widespread in the natural environment; they are found in water, soil, plants, and animals. Because many microbes reproduce rapidly and require minimal resources for survival, they are a potential danger in a wide variety of occupational settings. Some examples of biological or infectious agents include anthrax, botulism, Ebola, blood borne, and food borne pathogens. When exposed to biological or infectious agents humans may present with immediate and long term effects. Immediate effects are the initial signs and symptoms that are manifested once the subject comes in contact with the biological agent. These clinical manifestations include fever, chest pain, cough, cold, allergic reactions, fatigue, nausea, vomiting, and abrupt onset of respiratory distress. However,......

Words: 454 - Pages: 2

Submarine Warfare

...WWII Submarine Warfare Germany’s surrender and agreement not to retain any submarines due to the Armstice terms in 1918 and the Treaty of Versailles was short-lived. Britain was not ready for Hitler’s initiation 20 years later. After building up his submarine stock since 1935, his initiative to intercept merchant ships in the Atlantic commenced in 1939. The directive was to sink more supply line ships than the Allies could replace to force a surrender through starvation and lack of supplies. This initiative created what was known as the Battle of the Atlantic. Known as the longest continuous campaign of World War II, the Battle of the Atlantic mostly involved the Allies protecting the shipping routes across the Atlantic which were constantly being intercepted by German U-boats. The Nazi’s submarines, referred to by most as U-boats, were more like submersible ships than submarines at the time. They ran on diesel engines for their surface time and battery for their submersed. They dove beneath the water only when they were attacked or for torpedo strikes during the day. More often attacks were made on the surface at night. This was extremely effective in the early years of the war as they were virtually untraceable due to the lack of sonar technologies at the time. This time was known to Germans as “die gluckliche Zeit” or “the happy time”. Many classes of U-boats were made, but the most prominent of them were Type VII, the workhorse (700 active), Type IX, larger with......

Words: 672 - Pages: 3

History of Warfare

...Edward LeBar November 25th, 2009 HIST 017 Prof: Dan Hambly History of Warfare: Essay Assignment The two key individual advancements of weaponry in warfare that I believe were most relevant to the change in warfare tactics were the Spears used by the Ancient Greek and Macedonian Phalanx (300 B.C.E) and the Long Bow used by the British (1300-1500 AD). Each of these weapons made a huge impact in warfare upon being developed and changed the course of history of their armies who wielded these weapons of excellence. Each weapon was wielded by soldiers slaying millions of people during many glorious historical battles still taught to students around the globe today about their importance to warfare. “One of the earliest, and certainly the deadliest of these first purpose-made weapons, was the spear” (Weir, 2005). The spear was developed in early known warfare, and had an impact when the Ancient Greeks wielded the spear in their battles. The Spear was a simple weapon to make as it consisted of a wooden poll 6 to 8 feet in length with a sharp piercing arrowhead attached to the end capable of puncturing any enemy armor. The Ancient Greek’s developed the spear to be able to attack an enemy from a longer range than the sword and used the spear with tactics and coordination with a Hoplon shield protecting the Hoplite soldier which was later called a Phalanx. The spear proved to be very useful to the Greek Phalanx providing the Greek’s with many victories with this particular......

Words: 1344 - Pages: 6

Chuggington Ready To Build apk full | Universel Enfant Adulte Brassier Gilet de Sauvetage Flottant Canoë Kayak Bateau | Baseus (159)