Sermons

Summary: Identity Theft, a deceitful & unauthorized use of a person's private info usually for financial gains, is a real problem in our society & leads to Undue Suffering. It happens to millions of Americans annually. The modern church also suffers from a spiritual identity crisis. How?

SERIES: RECOVERING STOLEN IDENTITY & RECLAIMING MISPLACED DESTINY: AN INTRODUCTION

Judges 6: 1 Then the children of Israel did evil in the sight of the Lord. So the Lord delivered them into the hand of Midian for seven years, 2 and the hand of Midian prevailed against Israel. Because of the Midianites, the children of Israel fled and lived in the dens, the caves, and the strongholds which are in the mountains. 3 So it was, whenever Israel had planted, Midianites would come up; also Amalekites and the people of the East would come up against them. 4 Then they would encamp against them and destroy the produce of the earth as far as Gaza, and leave no sustenance for Israel, neither sheep nor cow nor donkey. 5 For they would come up with their livestock and their tents, coming in as numerous as locusts; both they and their camels were without number; and they would enter the land to destroy it. 6 So Israel was greatly impoverished because of the Midianites, and the children of Israel cried out to the Lord. 7 And it came to pass, when the children of Israel cried out to the Lord because of the Midianites, 8 that the Lord sent a prophet to the children of Israel, who said to them, “Thus says the Lord God of Israel: ‘I brought you up from Egypt and brought you out of the house of bondage; 9 and I delivered you out of the hand of the Egyptians and out of the hand of all who oppressed you, and drove them out before you and gave you their land. 10 Also I said to you, “I am the Lord your God; do not fear the gods of the Amorites, in whose land you dwell.” But you have not obeyed My voice.’” 11 Now the Angel of the Lord came and sat under the big oak tree which was in Ophrah, which belonged to Joash the Abiezrite, while his son Gideon threshed wheat in the winepress, in order to hide it from the Midianites. 12 And the Angel of the Lord appeared to him, and said to him, “The Lord is with you, you mighty man of valor!” 13 Gideon said to Him, “O my lord, if the Lord is with us, why then has all this happened to us? And where are all His miracles which our fathers told us about, saying, ‘Did not the Lord bring us up from Egypt?’ But now the Lord has forsaken us and delivered us into the hands of the Midianites.” 14 Then the Lord turned to him and said, “Go in this might of yours, and you shall save Israel from the hand of the Midianites. Have I not sent you?” 15 So he said to Him, “O my Lord, how can I save Israel? Indeed my clan is the weakest in Manasseh, and I am the least in my father’s house.” 16 And the Lord said to him, “Surely I will be with you, and you shall defeat the Midianites as one man.” 17 Then he said to Him, “If now I have found favor in Your sight, then show me a sign that it is You who talk with me. 18 Do not depart from here, I pray, until I come to You and bring out my offering and set it before You.” And He said, “I will wait until you come back.”

INTRODUCTION: RESTORING STOLEN IDENTITY AND RECLAIMING MISPLACED DESTINY: AN INTRODUCTION.

Series: About Stolen Identity & Misplaced Destiny & How We Can Find Them Again. Stolen Identity: Esau & Jacob, David, Adam & Eve, Moses, Elijah. Misplaced Destiny: Joseph, David, Moses, Paul, Abraham, Isaac, Jacob, etc.

IDENTITY THEFT IN THE REAL WORLD.

Identity Thefts Leading To Undue Suffering Are Real Problems In Society: Identity Theft: Deceitful & unauthorized use of a person's private info usually for financial gains. It happens to millions of Americans every year & is increasing - about 14 million identities stolen in 2015. Despite the risks, many don’t know anything about identity theft. How Does It Work?

1. Acquisition Of Personal Data: 1st Step of Identity Theft is when someone steals your personal data thru hacking, fraud & trickery, phishing scams, redirecting or intercepting mail, physical theft - a criminal digs through your trash for infos - and data breaches. E.g. Data breaches made hackers steal private information of nearly 80% working Americans and made away with SS #, addresses, etc. At times they steal information but nothing happens.

2. Use Of The Stolen Identity: 2nd Step of identity theft occurs when thieves use personal data collected. They thieves normally conduct series of trials to test validity of the stolen info. If data proves accurate, scammers will attempt to steal more info from same source or take immediate action on data at disposal. Some common ways thieves use personal data:

Copy Sermon to Clipboard with PRO Download Sermon with PRO
Talk about it...

Nobody has commented yet. Be the first!

Join the discussion
;