Responding to the SL Tribune’s Mischaracterization of my Testimony on Conversion Therapy

A recent article in the Salt Lake Tribune unclearly characterized my comments to the Utah State Legislature on August 18 regarding conversion therapy. I would like to clarify them. While I oppose the current version of the conversion therapy rule, I do not support conversion therapy. As a therapist, I don’t believe changing sexual orientation is an appropriate goal in therapy. But I oppose the conversion therapy rule because not only does it forbid these kinds of attempts to change sexual orientation, but also brands a much broader range of interventions as “conversion therapy,” including assisting clients who wish to manage their sexual behaviors.

Read more

A Reminiscence: Gospel Unity in a Time of Bitter War

What I learned from one member in Belgium about gospel unity in a time of war.

In the summer of 1990, I was serving in Liege, a French-speaking city in Belgium. As part of our work we were visiting all the members we could find on the membership rolls. One day we found an elderly sister who had joined the Church as a young woman shortly before World War I broke out, due to her age she rarely attended meetings anymore. I don’t recall if this member was living in Liege at the time of the Great War, but German atrocities were notably severe in this area, in part because this area was thwarting the achievement of a key component of the German Army General Staff’s Schlieffen Plan for winning the war.

She told me an amazing story about how the gospel of Jesus Christ can transcend bitter divisions and deep wounds.

Read more

Information Security and the Temple Endowment

For about twelve years I worked information security for a few different software companies. We sold our software to companies and government agencies concerned with making sure those accessing their sensitive systems were (a) who they said they were, and (b) only accessing information they should have access to. The first concern is called authentication (“are you who you say you are?”), and the second one is called access control (“do you have access to the information that you need and are you denied access to the information you shouldn’t have?”). Solving these two problems have always been a challenge. And though their implementation has changed throughout time, the solutions are basically the same.

While the temple has ancient roots, it contains features that are used in the most modern and secure computer systems.

It was only a few days after I’d completed a computer security certification when I went through an endowment session again. It occurred to me that you could look at the endowment though an information security lens and gain some valuable insights. I’ll explore some of them in this post. Some of my discussion will necessarily be oblique, and may only make sense to those who have been through themselves. I take seriously the desire to keep these things sacred, and I hope my post here will be in harmony with that.

Read more