sensitive lands

2) How To Handle the “M” Word with your Kids

m_wordRecently, I’ve found myself discussing the “M” word (“missionary”) with more than one worker from a sensitive land, especially regarding families with kids. The question, in particular, is “How to handle the “M” word when mommy and daddy are working in a creative access country (for example, launching a business as missions platform). Some families say “all Christians are missionaries” then define the term. Other families avoid the “M” word all together. There are opportunities for comparisons with other paradigms. When your kids were little, how did you handle the concept of Santa Claus? [plot spoiler: If your kids are reading this with you, and they still ‘believe in Santa Claus,’ better stop reading right now :-) ] If you decided to tell them the truth about Santa, how did you instruct them to handle that “truth” in relation to other children… when, for example, they were playing with kids whose families handled it differently?

This is an important topic — and it’s one that could easily cause trouble for a family who chooses to live for Jesus in a sensitive land. Your thoughts?

4) Creative-access Church Planting Training with George Patterson —

All Nations will be offering training this summer for anyone interested in planting churches among unreached people groups in closed access countries. The training will feature several speakers, including a week with George Patterson, who planted over a hundred churches in Latin America. Training will be held in Kansas City, MO, and will last three weeks. Visit the website for more information, or call at 816-216-1353. http://www.allnations.us

4) Headed to a sensitive field? Encrypt your Hard Drive for Free

truecryptNow you can use…

http://www.truecrypt.org/

to completely envelope your laptop’s hard drive in a proective shell. Check it out. You can encrypt a folder, or force encryption of an entire hard drive, pre-boot. What’s more, after that, ancryption is “real-time.” You can even hide keep a hidden volume within the encrypted portion, thus tricking an adversary into believing you’ve given up the hard drive, when in reality, you’ll retain private information on the hard drive in a secure sub-partition.

 Scroll to top