Religion Creates no Boundaries in Love

Religion Creates no Boundaries in Love

Everything’s fair in love… and religion. I uncannily discovered this, or dare I say, through the unexpected love story that I witnessed. It was a lesson that unfolded before my young eyes, challenging the beliefs I had been raised with and opening my mind to the unpredictable nature of love. It was about Aunty Zino. Aunty Zino lived in the only self-contained apartment in our compound. Single, alone, rich, beautiful, and quiet. She worked with PZ Cussons and loved her hair cropped low on her head. It seemed long flowery gowns caught her fancy because she had many of them and wore different designs to work every day. My family used free PZ products because of her. She would bring them home sometimes and give them to us. In those moments, we felt rich as we used the Elephant extra detergent, Stella pomade, and Imperial leather soap. We became the happening tenants because of her. She seemed to like us more than other tenants. for some wonderful reasons, She would come home from work and come over to our flat to gist with Mum, sometimes they would stay on our verandah or hers. Mum would always invite her to our numerous special church programs and Aunty Zino would accept or decline as she deemed fit. She never returned the favour and never invited us to her church. Mum would cook on special occasions and include Aunty Zino’s portion which she would serve in one of the big white ceramic plates we owned with matching covers. She would then put it on a tray and ask me or my elder brother to go and give it to Aunty Zino. That always caused a tiff. We all wanted that golden opportunity to go to Aunty Zino’s apartment. Such visits were always rewarded with money, so my brother and I would fight to go and deliver the food. Those squabbles prompted Mum to create a timetable so we could take turns running such errands. One day, Aunty Zino came home and told us she was getting married. My mum was elated and told her how much she had been praying for her to meet the bones of her bones. It was not right that she was still single, a beautiful Christian wealthy woman like her. We were happy for her and jumped on the invitation card she brought later on. It was when we opened the card and read the names that we saw the difference. Deborah Zino and Ismail Mubarak Which one is Ismail? Is he a Muslim? Our questions were left unanswered as we watched Aunty Zino go about her wedding preparations. Mum helped out in any way she could as her wedding fathia drew close. She indeed married a Muslim. That was the first time I was witnessing a Christian marry a Muslim. The day she came to pack all her belongings, she told Mum hurriedly, “I know you would be surprised at my decision. I am 43 and not getting any younger. Ismail is the only man who has shown great interest and love for me. I want a husband and children if I can still have them at this age. I want to be a married woman. Don’t worry about the different religions. I will still be a Christian, we will respect each other’s religions and live peacefully. He loves me and I love him too. I think that is all that truly matters.” My mum only smiled as saw her off to the packing van outside of the gate and waited till it pulled out of our street. READ ALSO: Embracing Love After Life’s Hardest Trials

Determined Attacker – The Secret Destroyer

Determined Attacker – The Secret Destroyer (1)

The strength of your security system comes to huge test during the clandestine actions of a determined attacker. It is said; a chain is as strong as its weakest links. A determined attacker is any complex person or group who are hell-bent on compromising the security system of a facility in order to carry out a preplanned criminal act. Such act may include financial fraud, corruption, theft of sensitive information, theft of assets, diversion or adulteration of products, direct attack on properties, disruption of operation. In some other cases, it may involve robbery, theft, rape, assault, and murder. Hardly can any security design deter a determined attacker. At most it becomes win-win or win-lost battle; however, attempt would have been made and an incident created. A determined attack is carried out by criminal(s) who are motivated, mobilized and ready to breach security and disrupt peace at any cost. The consequence of the act holds no meaning to them; sometimes the consequence is perhaps the motivation. A determined attacker may be anyone – the diehard/disgruntled employee, a jail-prone criminal, a business partner (current or former), supplier, vendor, contractor, a customer, etc. In other case, a determined attacker maybe a close family relative such as sibling, child, a spouse/lover, a domestic staff, a friend, a foe, a fellow club/association or religious member, a passer-by, a teacher/student, a worker, the list is endless etc. The only limit to who becomes a determined attacker is the function of the mind. Make no mistakes about this, yes! Anyone can be a potential determined attacker. A determined attacker may be a professional or impulse criminal. A determined attack maybe motivated by some personal, pecuniary, religious/political and ideological interest, socio-economic, emotional factors. Anything could serve as motivation for the attack. The type and method of attack may just be the difference. A determined attacker can mobilize and deploy just any kind of resources required to accomplish the mission; failure is the last on their mind. Obsession is their possession. In same vein, a determined attacker is ready and patient to work along, work with the organization; assist the would-be victim, romance, care and love the would-be victim, worship at same place, trade/negotiate with you, contest with you, etc. However, in all of these, he/she studies the organization. Taking note of the strengths and the weaknesses, uses same to build the strategy required to execute the mission while waiting for the appropriate time to attack. Some measures against determined attacker include; Awareness of Their Existence: it is the goal of this article to draw attention and give insight to existence of these peculiar criminals amongst us. Strong Security System: as much resource can afford, put in place effective security controls for both preventive and reactive response. E.g., physical barriers; fences, gates, doors, locks, burglary proof, fire extinguishers, guardforce, procedures, CCTV and intrusion system; panic buttons, etc. Routine Due Diligence: this requires that background check must be carried out prior to activation of employment or engagement. Audit/Quality Control: periodically carry out audit of all risks control systems. Look out for and properly investigate anything that may seem out of place no matter how unimportant they appear. Teamwork/Networking: teamwork bring different brain and heart in the game, oftentimes produces better results. Problem is, victim oftentimes relegate or ignore them. Pay attention to these. Recognition Of Early Warning: please note, there is always a clue, sign, or redflag underneath any criminal project. Emergency Preparedness: at all times, hope for the best, prepare for the worst. Note this; our contemporary society is full of determined attackers in various shades. These are individuals who are feeling frustrated, disenchanted and incapacitated in their worlds thus, find solace in giving back to society whom they held responsible for their predicaments by breaching security, disrupting peace and unleashing harm with impunity. They are found everywhere! ALSO READ: Security Guides for Hiring Domestic Workers

Insider Threat Management And Guide

Insider Threat Management And Guide

Insider threat whether intentional or accidental can significantly harm your organization by causing financial loss, business disruption, reputational damage, and sometimes breach of compliance and associated sanctions and possible fine. This article aims to draw attention to this subject and briefly outline how to preventively manage insider threat. Suffice to say, many businesses tend to underestimate the presence, dangers and capabilities of insider threats. These set of people hide under genuine employees, vendors, contractors and partners; pretend to serve interest of the organization where as in reality, they pose serious threat. What is insider threat? Insider threat is any security risk that come from people within the organization. This maybe anyone who by virtue of their roles have access to sensitive information and other corporate resources capable of being used against the business. There are two types of insider threat. One is intentional threat, the other is accidental threat. The former is oftentimes premeditated and by impulse, the latter is by ignorance or accidental. Insider threat management refers to internal strategies and processes which a business can deploy for prevention, detection and response to potential threats posed by persons within the organization. Element of insider threat management should include; Risk assessment: will indicate the organization’s threat exposures and vulnerable areas to prioritize protection controls. Policy and procedure: will guide persons on standard operating procedures and the expected role behaviors. Training and awareness: will keep people informed about organization’s security culture and the present of insider threat. Surveillance and monitoring: will notified that every activities within the organization is being monitored for accountability. Insider threat response plan: will prepare the organization to promptly respond to risk of insider threat. It may be a stand-alone, or part of a composite plan. Continuous improvement: will activate reviews for improvement. 8-Controls Against Insider Threat: Maintain Consistent Background Check: employee background check is a conscious activity to prove or disprove claims made by applicant seeking job opportunity or already working for the organization. It is a verification exercise to know the veracity of information provided about an individual. Through background check a person with criminal history will likely be detected and denied employment so as to protect the organization from loss and embarrassment. Prioritize Risk Assessment: risk assessment is designed to know the potential threats that can cause harm and frustrate goals and objectives of a business. Risk assessment can identify most vulnerable areas to be exploited by insider threats, and proffer control measures. Conscious Of User Behavior: user behavior analytics otherwise known as UBA is popular in cyber security. It is designed to monitor, track and analyze behaviors of individuals in a setting for specific security purpose. While this concept tightly fits in cyber security, it can also loosely apply to physical security especially for specific individual who are suspected to pose significant security risks to organization. Through user behavior analysis; trends, patterns, early warning and redflag would be identified. Ensure Access Control: access control regulates in and outflow of persons and materials within a location. For better efficiency; organizations should practice role-based access control (RBAC) where by individuals are permitted access to areas, systems and resources that relevant to their functions. Enforce Policy And Control: policy as a statement of intent must be back up by behavior control measures to ensure compliance by stakeholders. Where this is lacking, will become a vulnerable context for insider threat to exploit. Deploy Physical Security: through people, procedures and technology. This measure will provide security and safety protection to physical assets. It serves to warn and caution insider threat actors of apprehension in the event of attempted security breach. Maintain Relevant Training Program: people will know better about organization’s security policy, standard and measures when they are consistently trained. Such trainings can be achieved through structured class, toolbox talk, sensitization and periodic electronics updates and games. Practice Reward And Sanction: honest acts should attract rewards; dishonest acts should attract sanctions. This is because reward pays, and sanction punishes. In conclusion, organizations must recognize existence of insider threat and that it is near impossible to identify and eliminate it entirely. However, solutions can be developed and implemented for prevention, detection and response. By implementing a custom designed strategy; organizations can proactively manage this potential threat and cultivate a culture of strong security. ALSO READ: Security Guides for Hiring Domestic Workers

Small Business; A 5 Step Guide to Start.

Small Business; A 5 Step Guide to Start

Starting up a small business in this modern age involves a lot of process that requires thorough planning, making important decisions, taking steps for growth, and implementing strategies for the success of the business. Whether you are an experienced entrepreneur or you’re new to the business world, if you want to become your own boss, having your idea to sell or product to sell isn’t enough to start a small business. There’s more to starting up than having your ideas or products ready. There is an approach that needs to be followed to ensure the business is a success and that it is well sustained. If this approach is ignored, the business will fail even before starting it. By following this 5 step guide, you will be on a journey of turning your dream business into a successful and thriving one.   Step 1; Create Ideas When you decide to start a small business, you have to create ideas on what product or services you want to sell. This can be gotten from your passion, skills, or hobbies. Whatever idea you choose to go with, make research about the business idea, the type of audience or customer to target, and the benefits your idea will give your customers.   Step 2; Create your Business plan After generating your business idea and making the necessary research about the entire business you want to venture into, a proper business plan needs to be generated. A business plan entails the activities of a business and the strategies set to achieve the set goals of that business. Create a name for your business: generate name that resonates well with your business idea Look out for a suitable location for your business, whether you want to choose a physical store or you want to make it online. This depends on the type of business and the type of customers you want to target. Also, state your business goals, mission and vision in a way that will promote your business. Make plans for marketing strategies that will enhance the success of your business   Step 3; Source for Funds/Capital Most people venture into starting up a business without plans for finance sustainability. The absence of this crucial step wrecks most business immediately they start. Funds is very important in starting up your business. This can be sourced in various ways and this can be through personal funds, investments from friends and families, taking out loans. This will keep the business running.   Step 4; Register your Business Business registration with the appropriate body in your state or country is very important, it helps your customers know that you’re legit. If your business is solely owned or a partnership, it should be registered so it can be recognized.   Step 5; Launch of the Business To launch your business, you need to out up a team that will help you build your business and has the same goal to ensure the success of the business. Plan successful marketing strategies that will help move the business forward. After these things have been put in place, then you can launch your product or services for the public. After launching your business, then you can move on as a proud business owner, selling your product or services to your target audience while making profits for you and your business as well.   In conclusion, starting a business involves proper planning, making key decisions and implementing key strategies to make it thrive and successful. These steps will guide you to creating a successful business. Cheers to being your own boss! ALSO READ; Small Business – 6 Steps to Create a Successful Marketing Plan  

Goodbye, Afolabi

ImgResizer 20240830 0756 45524

I still remember the day I met my husband, Afolabi. He was charming, handsome, and had a way of making me feel like I was the only person in the world. We fell deeply in love, and I thought our relationship was perfect. But little did I know, his mother, Barbara, (she preferred we called her that) would become the reason I’d leave him. The sweet moments we shared are evergreen and I wish I could rewind time. On our wedding day, she prayed for me wholeheartedly. I could remember when she added this. “You will give birth to twins, not once, not twice but three times.” Every bystander exclaimed more than I did. Afolabi just smiled. His mother read our his thoughts. My heart throbbed when I saw this strange attitude from Barbara, my mother-in-law. At first, Barbara was sweet and welcoming. She’d invite me over for dinner, ask me about my day, and show genuine interest in getting to know me. But as time went on, I started to notice a change. She’d call Afolabi multiple times a day, asking him to run errands, fix things around the house, or simply to “check in.” He’d always oblige, saying “Mom needs me.” “I need you too!” I responded coldly in my heart when he said that. One evening, as we were preparing dinner together, Barbara called again. Afolabi dropped everything to answer, leaving me standing alone in the kitchen. “Can’t you see I’m busy?” I asked, trying to hide my frustration. “It’s Mom, I have to take it,” he replied, not even looking up. I felt a knot in my stomach. “Jack, we’re married now. Can’t you set boundaries?” He sighed, “She’s just worried about me, that’s all.” But it wasn’t just worry. Barbara would show up unannounced, criticizing my cooking, my cleaning, even my clothes. Afolabi would just laugh it off, saying “That’s just Mom being Mom.” One day, I’d had enough. “Afolabi, I need to talk to you about your mom,” I said, my voice shaking. “What’s up?” he asked, not looking up from his phone. “Your mom’s obsession with you is suffocating me. I feel like I’m losing myself in this marriage.” He finally looked up, surprised. “What are you talking about? Mom just cares about me.” “Cares about you? She can’t even let you breathe without her! I’m your wife, Afolabi. I need you to prioritize me, our relationship.” He sighed, “I don’t know what to say. Mom’s always been like this.” I felt tears welling up. “Exactly. And that’s why I’m leaving.” He looked stunned. “What? No, please don’t go.” But I knew I had to. For my own sanity, for my own happiness. As I packed my bags, Barbara showed up, as if sensing her grip on Afolabi was slipping. “Where are you going?” she demanded. “I’m leaving Jack,” I said, my voice firm. “Your obsession with him is destroying our marriage.” She gasped, “How dare you! I’m just trying to protect my son!” But I knew the truth. She was trying to control him, to keep him tied to her apron strings forever. As I walked out the door, Afolabi called after me. “Please, don’t go!” But I knew I had to. For myself, for our marriage, I had to break free from Barbara’s suffocating grasp. As I type this, his calls are coming in. I don’t want to seek any advice. I am doing what exactly what will give him some sense. I planned to give him another week. It’s been two weeks I left the house. It’s so cool to see his unending remorseful chats and calls. My heart will be opened next week, I guess. READ ALSO: 10 ways to prevent workplace violence

Security Operations Centre – SOC Essentials For Physical Security Operation

Rear view of security system operator looking at CCTV footage at desk in office

Security Operations Centre otherwise known as SOC is a central hub for security operations. The concept was originally applicable to cybersecurity operations. However, it is no more an exclusive field. Futuristic physical security is increasingly optimizing its operation through adaption of this niche functions of surveillance and response. With Artificial Intelligence dominating business world, Security Operations Centre is indeed the future of security value. The reality of future physical security is such that most organizations would go full automation. This disruption will lead to sharp drop on reliance on physical deployment of guardforce personnel. Many routine roles of guardforce that require less decision making will likely be replaced with automation. Given above scenario; most corporate security departments are currently expanding their traditional CCTV control room operation to reflect a classic Security Operations Centre settings. In this configuration, the SOC will be equipped with skilled personnel for complex tasks that would essentially include monitoring, analyzing and responding to security threats. Security Operations Centre will serve unique function, dedicated to using analysis of observed event to direct and guide field security operatives to respond to emerging security incidents within a facility or distant location being monitored remotely. In the age of Artificial Intelligence, the importance of Security Operations Centre cannot be relegated. It would play crucial roles in shaping the future of physical security operations. Field security force who are serving as quick response force – QRF would rely on SOC to activate response to security incident. See below, the summary of security routine security functions to be integrated into Security Operations Centre. Controlling access to premises and assets. Monitoring people, locations and activities. Managing security incidents. Responding to emergencies. Supporting investigations. Enforcing compliance to company rules and regulations. Reporting incidents. The two types of Security Operations Centre – SOC:  Managed SOC – this is an outsourced SOC, to a third-party service provider. It may be located onsite or offsite command centre operated by the vendor. Dedicated SOC – this is a proprietary or inhouse SOC; owned and operated by an organization. It is usually located onsite, however; it maybe tasked to manage various offsite locations that belong to same organization. It is correct to brand such, a command centre SOC. Security Operations Centre technologies and tools: Access Control System – ACS: this tool is deployed for management of access control. It makes use of pre-enrolled card, pin, code, fingerprint, facial or voice recognition, etc. SOC runs the enrollment, privileges, activations, deactivations, data analysis and archiving, etc. for efficient operation. Visual Surveillance System – VSS: this technology provides SOC with cameras, DVRs, cables, videowalls, spot monitors, dedicated software/application, etc. for real-time remote monitoring of people, assets/locations & activities. Intrusion Detection System – IDS: this comprised of alarms, alerts and prompts; it may be visual and/or audio. IDS relies on sensors to collect data, analyzers to process data, and response mechanism to initiate appropriate actions which SOC would act on. Standard Operating Procedures – SOP: this sets step by step guides on required response of SOC per event and the overall functions. It provides framework for uniformity, consistency and standardization in Security Operations Centre. Composition of SOC team: Tier 1 personnel: this is an operator and level 1 analyst. Tier 2 personnel: this is an operator with added functions and authority above tier 1. Tier 3 personnel: this person handles supervisory or coordinator roles; having authority above tier 1 & 2 personnel. SOC Manager: this person should be responsible for overall SOC resource management. Primary functions of SOC include: Monitor – this function requires active surveillance on cameras, alarms, and alerts. Analyze – requires making sense of people, location and event being monitored. Detect – identifies abnormal, odd, out of place, threats and security breach event. Respond – requires taking actions in response to events or incident. Communicate – entails reaching out to other functional personnel about the incident. Collaborate -demands working with the entire team from start to initial and final close of the incident. Record – will require documenting every piece of information about the incident. Investigate – entails fact-finding focused on what-when-where-who, how & possible why. Report – is about providing fact-based account or testimony of the incident. Archive– store and protect data, and exhibits about the incident using chain of custody guide. Security Operation Centre is the future of physical security operations. It is been driven by Artificial Intelligence. Its adoption will disrupt traditional physical security functions. It has potential for huge return on investment. Your organization’s CCTV control room operation can be expanded and transformed to SOC. ALSO READ: A Christian Journey That Started With Theft

7 Benefits To Choosing Corporate Security Trainings And Certifications

7 benefits & guides to choosing corporate security trainings and certifications (1)

Corporate security trainings and certifications are the way to go in order to remain competitive and relevance in the industry. Corporate security industry is currently attracting professionals from various backgrounds. A corporate security professionals may come from the public law enforcement or the private industry. One of the things that unify these professionals on the job is the security trainings they have received and the industry network they affiliate with. There are many institutions, organizations and bodies currently providing topnotch corporate security trainings and certifications. While some have attained local acceptance, others have gone global with widespread acceptance. While most of the trainings have general application to all sectors; others are narrower and more dedicated to clustered sectors. Note, corporate security training may be tailored for either certificate or certification. Certificate has no expiration, as such do not require retraining to have validity. However, certification has expiration period ranging from three or five years; as such it requires retraining through continuous professional education to maintain validity. Experience has shown that the industry places more value on certification than certificate. It is also import to know that certifications are oftentimes more expensive in cash and kind. 7 Benefits of corporate security trainings and certifications include; Knowledge: it gives detailed understanding of the subject. Competence: it gives skill to apply knowledge to problem solving. Confidence: it gives assurance of self-trust and right fit for the job. Authority: it makes the holder a subject matter expert. Validation: it confers recognition and acceptance to the holder. Credibility: it confers reliability and trust to the holder. Network: it provides common link/fold to professionals in the industry. As business world keeps evolving, security and safety as enabler has come to centre stage in the corporate world. it is commanding resources at increasing pace. Corporate organizations have come to appreciate and prioritized the inevitable security risks associated with modern business, as such they are willing and ready to foot the bills for any resource professional who is hands-on to manage these risks and achieve expected results. Having the right corporate security training can make you that professional resource person worthy of those bills. To give leadership and authority to security the industry professional who runs the function must possess requisite competence and skillset to drive the overall corporate objectives. The leadership roles may vary in title, power, and authority; however, they are often tied to managing corporate physical security risks. As a security professional, to qualify for hire to these advance positions first requires you must have integrity and be trustworthy. Other baseline qualification may include academic diploma or degree as the case maybe. Furthermore, reasonable personal sacrifice will be demanded of you in terms of continuous training for up-to-date knowledge through recognized industry certifications. This is because, security as an ever-changing field needs continue professional education to keep up with changes and trends in the risk landscape. To remain relevant and to keep advancing in the job, it is advised you maintain the pace of learning after the initial trainings. This learning can be achieved through relevant advanced courses, workshops, and other specialized trainings. The choice of corporate security trainings can be tough sometimes, especially for those who are new in the industry. The first advice is that training and certification choice should be strategic. It must not be made in haste and on random or herd-mentality basis. These trainings are expensive in terms of funding, commitment and time. 7-Guides to Choosing Corporate Security Training and Certifications: Strategic decision: first guide is that you must be strategic in choosing trainings and program. Connect your past, present and future goals to your choice of trainings. Avoid crowd and certificate mentality.  The ultimate goal should be the knowledge and the potential values therein. Natural ability: know your natural ability. What are you naturally good at in relation to security functions? Is it leading others, managing resources, fact-finding, researching and training, organizing event, driving supply-chain, etc.? Career goals: your decision for training program should be preceded by your personal preferences and career goals. What specialty functions holds more value to you? What can you make of that function in the next five, ten or twenty years or potentially after retirement? Your niche: this is a specialized segment of the market with a unique kind of product or service. security is very wide and wild, creating your niche will stand you out as a brand and for early success. Interest & preference: train as a generalist but go deeper with the program that aligns with your field of interests; examples are banking/finance, aviation, maritime, FMCG, hospitality, real estate, etc. these clustered sectors have dedicated trainings and certifications. Mentorship: it is good to get a genuine mentor who is already ahead. Such will make the journey less challenging. Market demand: what trainings and certifications is the market asking for? Note, some certifications have attained huge acceptance in the industry, while some others are still in the formative stage. Having come this far, here are list of some notable organizations and institutions who are currently running recognized and acceptable corporate security trainings and certifications. American Society for Industrial Security – ASIS CPP: Certified Protection Professional PSP: Physical Security Professional PCI: Professional Certified Investigator Nigerian Institute for Industrial Security – NIIS CSS: Certified Security Specialist CLRM: Certified Lead Risk Manager CLFE: Certified Lead Forensic Examiner International Security Management Institute – ISMI CSMP: Certified Security Management Professional International Foundation for Protection Officers – IFPO  CPO: Certified Protection Officer CPOI: Certified Protection Officer Instructor CSSM: Certified Security Supervision & Management ISO-SEC CSM: Certified Security Manager CPSM: Certified Physical Security Manager CINTA: Certified Intelligence Analyst Corp Security International: CSA: Certified Security Associate CSM: Certified Security Manager CSI: Certified Security Investigator Other narrower and clustered corporate security trainings and certifications currently regulated and known in the industry include; Maritime/Oil & Gas security BOSIET: Basic Offshore Safety Induction & Emergency Training HUET: Helicopter Underwater Escape Training PFSO: Port Facility Security Officer CSO: Company Security Officer SSO: Ship Security Officer Air … Read more

I Will Never Drink Alcohol Again

I will Never Take Alcohol Again (1)

Alcohol almost ended my life and I vowed never  to drink again. Here is my story. The flickering lights in my room sent some cold chills into my body. The eerie sounds coming from the graveyard opposite the house made my body shiver. Although it was fenced but the sounds were always closer to my window as if the site was just by my window side. My stepmom was pounding, I didn’t know exactly what in the middle of the night she was pounding. The lights were stable for a second then started to flicker again. I went straight to the switch to put them off. I didn’t know what was happening to me that night. My heart was throbbed and the sense of fear hovered in my room. I had drunk some alcohol from the old fridge the previous days but the effect tonight was different. It was something I had never experienced. I had taken alcohol before and didn’t feel the way I am feeling right now. I turned to get to my bed after switching the lights off, then, I was glued to the floor of my room. Something beside my bed looked like the figure of a human being, a man but the head was bent to a side. It seemed to be taking his steps towards me. The room was dark but I could see the dark figure, humming a sound. I cringed at a corner, stretched my arm to the switch and immediately the lights were on, the figure was gone. I wasn’t hallucinating. This was real. My window creaked. The wind stayed at my window, whistling greatly. I quickly went to close it. It was seriously disturbing my curtains, and every light object was falling down. Eventually, my room was in a mess. As I wanted to close the window, just by the other side of the road, under a tree in front of Mrs. Jersey’s house, a little girl stood looking at my direction. She was stiff and dripping but her focus was on me. I wondered what a little girl could be doing outside by that time. That she didn’t shift her focus from me got me scared. I closed the window and continued to watch her through my transparent window. After a few minutes, I saw her move to the tree and climb it so swiftly and skillfully. “How could a little girl do that?” A few seconds after, my room started dripping. Little drops from different points from the ceiling started dropping. The leaks became many. The major ones were on top of my bed and eventually, my bed was drenched. I screamed but nobody came to my rescue. The pounding continued. I called out to my stepmom, but the door was locked. I struggled with it for a long time. Then, I noticed that the little girl was beside the tree again, this time around with an adult looking at me. I quivered; my whole body was burning. I thought I was going to die. The leaks became too many, it wasn’t raining at all outside, but my room was getting fuller. It was now falling heavily from my roof. I wanted to open the window; it wasn’t opening. There was no other way out. I stood on my bed as the water reached my knees. I screamed, shouted and called for help but no answers. I couldn’t hear her pound again. I could only hear the sound of the water falling. I shouted for help again. I ran to my table and mounted it. Taking alcohol could impose unnssary experiences on you. This was scary. I couldn’t understand it. I was dying in my room. The water levelled up to my shoulders, to my chin and finally, above my head. Here I was struggling in the water, a chance to shout was a way to get my mouth filled up with water. I couldn’t struggle anymore. I felt my eyes closing and my body lifeless. I could tell I died. “Seth! Seth!” I heard my father shouting my name. Someone was tapping me and the next minutes; I saw a blue bowl being emptied on my face. My whole shirt was drenched. “What happened to you?” She worriedly asked. I was lost as I tried to recall what had happened. Then, I remembered. “My room! Did you enter my room? My room was full.” I explained. The looks I received right there were unbelieving. “I am serious!” I said this to convince them, but they didn’t believe me. I later learnt I had been sleeping since I got drunk the last night. They had been trying to wake me up, but I never responded. So, all I saw were just a dream, a bad dream. I laughed at myself as I remembered every bit of what I passed through. I brought it all on myself. They stood there wondering why I was laughing. I got up and went straight to my bed. Everything was intact. I threw myself on my bed and whispered to myself. “I will never drink again.” ALSO READ: Discipline: A Necessary Habit For Writers.

My Life Ended on a Wednesday

My Life Ended on a Wednesday

My life  came crashing down in minutes when my husband confessed he cheated on me with a former secondary school classmate. As he spoke, I felt a sharp pain slice through my heart, through every fibre of my being, and totally knocked me out. I know I was still sitting on the only chair in our bedroom and holding the phone to my ears, I was still still alive but my thoughts were racing at the speed of light leaving me breathless and gasping for air. He couldn’t face me. He had to tell me over the phone to evaluate the tone of my voice and my reaction and then calculate his chances of coming home afterwards. He ended the call with the usual cliche, “I’m sorry, babe. I’m so sorry for doing this to you, I promise it will never happen again. Please forgive me.” I didn’t yell. I didn’t ask any questions. I was as calm as I could be when I asked if he could end the call. It surprised me: my quietness. It was not something that most women who find themselves in such a situation would do. They get angry, break something, destroy their husband’s property, burn his credentials and business documents or even break his car’s windscreen. I did nothing of such. I was still, managing the ravaging thoughts of my husband with another woman in my head. How did they do it? Where did they do it and how many times? When did they start? It then occurred to me that I had been with him during his escapades with his classmate. I have been sharing his body with a stranger! I wondered how he managed us both, how he coped with sleeping with his wife and a mistress, most times in a single day. I felt smeared with the filth of adultery. I felt disgusted with my own body and I ran to the bathroom, took off my clothes quickly, and turned on the shower. I scrubbed and scrubbed my skin in an attempt to wash away my husband’s filth. My thoughts ran wild at the moment. What if his classmate has HIV or any STDs? Were they careful enough to use protection? What if he has been infected? What if I have been infected as well? It was crazy. I ran out of the bathroom breathing laboriously. I needed to go to the hospital and get myself tested. I wasn’t thinking. My dresser was in shambles in seconds as I couldn’t get the perfect dress to wear. That was when I started crying. The hurt of what my husband did hit me raw, snuffing life out of me and leaving that miserable feeling in the pit of my stomach. I sat down on the floor, pulled my knees up and hugged them. Where did I go wrong in my marriage? What did I do wrong? His confession came back to me again, and I felt so inadequate that my husband could go out to meet someone else when he had me. I felt so small and insignificant. My words came out in a gargle, cracked by tears and catarrh, “Jesus, what did I do wrong? Please help me. Help my heart.” I couldn’t hear God. Maybe I was deafened by my hurt that I couldn’t hear Him saying, “Daughter, I am here. Cast your hurts and cares on me, I’ll bear them.” God was trying to talk to me, to comfort me and pull me out of my misery but I was busy hatching a perfect revenge plan on the man I married. READ ALSO: Marrying Wrong and the Truth It Reveals

A Christian Journey That Started With Theft

A Christian Journey That Started With Theft

My journey to becoming a Christian started with Anwuli. She was renowned in our village for her perfectly well-seasoned dried meat. Her art was the finest in our land and even beyond. She alone knows the wonders that go into her cooking pot, the goodness that she adds to the simmering meat and the buds-watering awe that follows when she puts them on Ahiara to dry out. Anwuli had hunters working for her. Fortnightly, they would go neck-deep into the Akika forest and emerge with all sorts of animals that they had managed to kill. She had a way of displaying the meat in her front yard — which was just a stone’s throw to the stream — for all to see. It would take the blind not to see the array of flesh on sets. She was flaunting her wealth and craft and taunting every villager who goes to get water from the stream. I did see. I was taunted, too, and also tempted, especially during the cooking and drying process. The scented aroma of her meat was enough to send one on a quest unasked for. I wanted a taste. Just one bite. But of course, Anwuli would never give anything that wasn’t paid for. By the time those pieces of meat get to our house, I am left with a small portion not bigger than half of my little finger. It would also have been doused with the heavy aroma of my mother’s ogiri and I cannot tell the taste of the meat or the fermented oil seeds apart. I wanted the fresh, perfectly cooked, and dried meat before it entered any cooking pot filled with soup. Well, that was my greatest undoing. I stole a piece of meat from where Anwuli staked it in her yard. Just as I was about to run toward the stream with the piece of neat hidden perfectly between my breasts, she caught me. “You demented thief!” she shrieked. She tore at the lappa covering my breasts and retrieved the piece of meat I had stolen. She held me and then dragged me home shouting all the way. It attracted other villagers who followed and called me a thief. “Your daughter has desecrated this land, she came to my house to steal!” Anwuli told my mother. I could see my mother’s eyes turn into a ball of surprise and shame. She had raised me well and took pride in the fact that though I was an only child, I was ten in one. This would dampen her pride and voice whenever she talks in the clan women’s meeting, especially when the topic is centred on their children. I needed to protect that pride and my reputation as well. So I lied. I called Anwuli a liar and said I would never do such a thing. I was content with the food I ate in my mother’s house and would never steal to quench an unknown hunger. What is meat that I can’t eat in my father’s house? That annoyed Anwuli further. She has no children of her own and took to her trade with the utmost dedication and commitment that one could muster, such lavish obligation that she couldn’t give to a child. Now I call her a liar. She was insulted by a child of another woman in her clan. Right there, she told my mother, “Get ready then; we will go to Ani tomorrow, and this thief of yours will swear that she did not steal from me. Then we would know who the true liar is from the person’s death that would follow.” She pushed me slightly as she turned and walked out of our yard. The other villagers followed her out. I could see in her walk the triumph of victory and also that of wickedness. That was rather too harsh. To go to Ani just because of a piece of meat. I turned to my mother quickly, “I can explain this.” “Shut up!” Mother said. She had tears in her eyes as she sank to the ground slowly. “I’ve always known that you would ruin me but I never thought you would want to render me childless.” She started weeping, wiping her tears with the edge of her lappa. I knew then that the matter was settled. Other villagers had witnessed the affair, and Anwuli is not one to back down on anything, particularly when it has to do with her precious trade. I went into my hut and then the heaviness of my sin began to make sense. I would die for I indeed stole from Anwuli. In my justification, at least I didn’t eat the meat. Ani would spare me because I was only a teenager and did not even taste what I stole. I would be free, I consoled myself. Then again, my mind reproved me further; I was simply being foolish with my consolation; Ani would kill me. Father came home later in the evening. He was humming the tune of a song I’ve never heard before. He was calm, the very picture of peace and happiness at the same time. I waited for Mother to tell him of my crime and also to get him to quickly go to Anwuli or even to Ani to plead my case, to see if it could be dismissed. I didn’t hear Mother’s teary voice. I didn’t hear Father’s raised angry voice either. No one beckoned on me to hear the truth or even the lie. I waited for minutes, and when Mother came to call me, I gave in to sorrow and followed her to my Father’s obi in torment. I was going to die even before I eventually died. “I have accepted the white man’s Chukwu,” Papa said smiling. “I did not go to the farm as you both must have thought, I was in their meeting place at Umokpu. I listened to their spokesperson and I believed what he said about … Read more