Feeds

Baptist church in assault rifle giveaway

US youth worship God through firepower

Choosing a cloud hosting partner with confidence

An Oklahoma baptist church has insisted it will proceed with its controversial plan to give away an AR-15 semiautomatic assault rifle* during a youth conference - a move described as "a way of trying to encourage young people to attend the event", according to local Koko 5 news.

Windsor Hills Baptist apparently has a history of worshipping God through firepower, and last year ran a shooting competition as part of its annual shindig. This year, it reportedly shelled out $800 for said trophy semi, but the church’s youth pastor, Bob Ross, claimed the main thrust of the conference wasn't about guns but rather "teens finding faith".

He stressed that the event featured 21 hours of preaching between bursts of gunfire, and defended: “I don’t want people thinking ‘My goodness, we’re putting a weapon in the hand of somebody that doesn’t respect it who are then going to go out and kill. That’s not at all what we’re trying to do.”

Koko 5 reported last week that the giveaway was cancelled at the last minute since pastor emeritus Jim Vineyard, who ran the shooting competition, "injured his foot and wouldn’t be able to attend". The promotion was subsequently removed from the church's website, Koko 5 said.

However, a quick shufti at the church's website reveals that Our Lord and the Second Amendment have intervened to allow the donation of the AR-15 to a true believer. It says:

Although the shooting competition that was to take place during the Youth Conference had been canceled, due to false statements made by the Oklahoma City TV Channel 5 (KOCO) and subsequently reported also by media outlets across the country, an AR-15 was donated last Saturday so that the competition could go on as planned.

If Congress, back when our country was fighting for its independence could give engraved muskets to the fifteen or so eleven year old boys that their teacher, Mr. Akins, led into battle against the British, then we can give away a firearm still today, especially since our Supreme Court just re-emphasized our Second Amendment rights.

Amen. ®

Bootnote

*AR-15? Pah. Authentic Children of Christ know that the AK-47 is the infidel-busting weapon of choice.

Choosing a cloud hosting partner with confidence

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.