Security Implications of Dark Web – Copy

Security Implications of Dark Web

Dark web is one of the three layers of web on the world wide web; other are surface web and deep web. This article highlights some of the activities on dark web and their overall security implications. Surface web: also known as clean or visible web is a part of the web for public use. This is where most people routinely use every day for their online needs through search engines like google, Bing, yahoo, LinkedIn, YouTube, Facebook, and company websites. One of the unique features of surface web is that its web resources are indexed by search engine, thereby making them searchable and accessible. It is a powerful but fraction part of the web which is said to constitute about ten percent of web resources. No login credential is required to access most websites on surface web. Deep web: this is the web beyond surface web. The web resources on deep web are not searchable by search engines; and they require authentication (that is, login credentials) for access. Deep web play host to reserved and protected data which is not for public consumption. Such reserved data may include but not limited to government record, medical record, financial record, classified military records, online library resources, organization websites for internal use and other related data. Deep web is reported to playing host to about ninety percent of entire web resources. Dark web: also known as darknet is a subset of deep web. The striking features of this layer of web is that it is the deepest part of the web and it is only accessible through a special web browser known as TOR (The Onion Router); and overlay networks such as I2P. The strongest attraction of dark web is its anonymity (secrecy) For instance, TOR resources loudly guaranteed users of protection against tracking, surveillance and censorship. Dark web is also reported to constitute about five percent of deep web. Dark web, generally known as underground web market for criminals and other merchants of illegality is also used by genuine and law-abiding people for purpose of information gathering and sharing while remaining anonymous. See below, some type of information mostly traded on dark web and their security implications: Stolen information: confidential and personal information such as login credentials, passwords, codes, pin, social security number, payment card details, etc. are exchanged on dark web for facilitation of cybercrimes. Breached data: stolen information like classified government records, account details, company trade secrets, customer details, payrolls, medical records, intellectual properties, company financial records, etc. are traded on dark platform and used to commit various crimes against the owners and sometimes the public. Fraud guide: various cyber criminal forums use dark web to recruit and train cyber fraudsters through sharing fraud guide resources. These guides further drive s and promotes multiplication of criminals. Hack guide: cyber criminals use dark web as hands-on academy to train hackers. This in turn drives and promotes multiplication of cyber criminals who prowl the internet to carry out crimes against individuals and organizations. Malwares: different types of malicious wares such Ransomware, DDoS, Trojan horses, infested USB and other plug-n-play devices are sold on dark web. These malwares are then used to lunch attacks against the public. Drug peddling: drug cartels across the globe use dark web as a market place for sourcing, distribution and retail of control substances. The substances then spread with wide implications for both users and non-users, Gun running: illegal trade of guns and ammunitions amongst criminal merchants have identified as one of the notable trades on dark web platform. Illegal use of guns inevitably drives violent crimes and leads to destructions of lives and properties. Human trafficking: criminal merchants also carry out trade of humans for purpose of forced labor and sexual exploitation through dark web. This inhuman criminality is a huge assault on humanity and a drain on human resources. In conclusion, dark web is a special kind of web, used by special kind of people and for special kind of purpose. While its original intent for creation was genuine however; like other resources, its been overtaken by criminals who hide under its anonymity to engage in trades that holds so much risks to individuals and corporate organizations. ALSO READ: Entrepreneur: 7 Reasons Why You Need A Website

5 Ways to Manage a Healthy Gut for Optimal Well-Being – Copy

5 Ways to Manage a Healthy Gut for Optimal Well Being

5 Ways to Manage a Healthy Gut for Optimal Well-Being As humans, having a healthy gut plays a crucial role in maintaining overall health. It boosts not only digestion, but also the immune system, mental health, and energy levels. Your gut naturally contains trillions of bacteria that influence these functions, which makes them important to nurture this environment. A gut environment with more harmful bacteria than beneficial ones, can lead to various problems such as bloating, constipation, or even more serious health problems. Fortunately, there some effective dietary and lifestyle changes that will help you achieve and manage healthy gut.   Eat a Balanced diet, rich in fiber One of the important factors in gut health is a balanced diet but most importantly, a fiber-rich diet. Fiber helps to keep your digestive system running smoothly, by bulking up stool and moving it smoothly through the intestines. It also acts as food for the beneficial bacteria in your gut. Eating this type of diet also enhances digestion, reduce inflammation and oxidative stress. Incorporating a variety of fruits, vegetables, legumes, and whole grains into your daily diet helps nourish your gut microbiome and supports digestion. Foods like apples, bananas, carrots, lentils, and brown rice are excellent choices for gut-friendly fiber. Incorporate Probiotics and Prebiotics Probiotics and prebiotics are essential for maintaining a proper balance of good bacteria in your gut. Probiotics are live bacteria when administered in adequate amounts function like the beneficial bacteria found in the gut. Popular probiotic-rich foods include yogurt and kimchi. These foods help to introduce and increase the population of beneficial bacteria in your gut. Prebiotics, on the other hand, are types of fiber that feed the good bacteria already present in your gut, helping them grow and thrive. They also improve gut motility. Common sources of prebiotics include garlic, onions, and bananas. The combination of probiotics and prebiotics in your diet, will aid a thriving gut for digestion and immunity. Stay Hydrated Hydration plays a critical role in keeping your gut healthy.  Drinking water and staying hydrated aids digestion, motility, eliminate waste and lubricate gut lining. Dehydration can affect your digestive system and lead to constipation and other digestive discomforts. It is medically recommended to drink at least eight glasses of water a day, although individual hydration needs can vary depending on factors such as age, activity level, and climate. Water-rich fruits and vegetables, like cucumbers and watermelon, are also great ways to boost hydration. By ensuring that your body stays hydrated, it is beneficial for your gut to get the moisture it needs to function effectively.   Limit Processed Foods and Sugars A diet high in processed foods and sugars can cause a negative impact gut health. They enhance the growth of harmful bacteria in the gut, which can lead to an imbalance known as dysbiosis. Processed foods are often low in fiber and nutrients, thereby contributing to digestive disorders. To maintain a healthy gut, it’s important to reduce your daily intake of highly processed foods. Instead, consume whole, nutrient-rich foods that promote gut health, such as fruits, vegetables, nuts, seeds, and lean proteins. Manage Stress Stress and lack of sleep can have a significant impact on your overall health and that includes your gut health as well. The gut and brain are closely connected through what’s known as the gut-brain axis, meaning whatever stress is exerted on your brain will negatively impact your gut. High levels of stress can lead to symptoms such as bloating, gas, and irritable bowel syndrome (IBS). To manage stress, relaxation techniques such as yoga, meditation, sleeping or deep breathing exercises can be carried out or incorporated into your regular routine. Regular physical activity can also help reduce stress levels and improve digestion. Aim to sleep for an average of 8hours per night to allow your body to repair and maintain a healthy digestive system.   Conclusion Maintaining a healthy gut requires a combination of both change in dietary plan and lifestyle. Therefore, eating a balanced diet rich in fiber, incorporating probiotics and prebiotics, staying hydrated, limiting processed and sugary foods, managing stress and getting adequate sleep, you can support your gut’s health and, in turn, your overall well-being. These will help keep your digestive system in balance, promoting better digestion, immunity, and energy levels required for proper body function. Also Read : Stay Young And Healthy The Right Way

5 Food Security Measures to Ensure In Your Homes – Copy

5 Food Security Measures to Ensure In Your Homes

                                          5 Food Security Measures to Ensure In Your Homes   Food security is a critical global issue that needs to be addressed, with 1 out of 9 people suffering from hunger. Food security according to the World Health Organization (WHO), is defined as ‘when all people have physical, social, and economic access to sufficient, safe, and nutritious food that meets their dietary needs and food preferences for an active and healthy life’. We live in a time of economic instability and uncertain climate. Accessing nutritious food, is important now than ever. The foundation of food security starts at home but it is now a major challenge for households worldwide. Ensuring your family’s access to nutritious food is crucial for stability and sustainability. This will protect your household from food shortages and increase your resilience. This article will discuss 5 ways to can protect your home, each offering a practical guide on how to empower your household against food insecurity.   Proper Meal Planning Meal planning is a very essential tool that helps protect your home from food insecurity. It ensures food availability, reduce unnecessary food wastage and promotes healthy living. A proper guide to carry out this plan is; Assessment of each family member’s dietary needs- it is important to put this into consideration while planning. Creation of a weekly food plan- meals for an entire week should be planned Making a food item or grocery list- this itemizes everything you need for meal preparation. Shopping for food items- purchase of listed items should been done, also, remember to check the expiry date of good products you purchase if you’re going to be buying in bulk or storing for a long time.   2. Proper Food storage This is another important means to ensuring food security in your home. Food storage will help prevent spoilage and contamination of food items, prevent wastage and increase the shelf life of food. Some tips to ensure proper food storage are; Dry storage for grains- clean and air tight containers should be used to store grain products such as beans and rice to help prevent contamination and spoilage. Refrigeration of perishable products at 40°F(4°C) Proper labelling of containers or bags used for storage for proper identification. Non-perishable goods such as canned foods should be stored well too.   3. Growing your own food Cultivating your own food in your backyard or that unused land can help boost food security. It helps to increase food availability, reduce cost of external food supply, as a food source during emergencies. If you want to start cultivating your own food; Prepare an organic fertilizer rich soil Start will small crops to grow Plant the seeds, water them regularly to ensure efficient growth When it’s harvest time, harvest carefully to avoid wastage and properly store the excess product harvested.   4. Pest Control Pests are organisms that destroy plant and crops. This can cause food insecurity in a home. Effective pest control helps protect your crops or food items against damage, reduce food wastage and contamination. Reduce pest infestation by; Proper food storage Ensuring the kitchen and storage area is clean always. Use of pest repellants plants.   5. Emergency food supply During financial or economic crises, emergency food supply will protect your household against food insecurity.  Stock non-perishable food items such as canned goods in bulk. Examples of food items that should be classified as emergency food supply are canned meat, vegetables, grains, water.   In conclusion, each home has to be protected against food insecurity by all means. Therefore, proper meal planning, food storage, encouraging gardening, pest control and emergency food supply will help empower a household against food insecurity. All these should be known and implemented to promote food security in a home! Also Read : How To Promote Food Security Through Security In Nigeria

Five Sources of Workplace Violence and How To Prepare For Its Prevention and Response

Five Sources of Workplace Violence and How To Prepare For It

Workplace violence is an inevitable security risk which your organization should get ready to deal with. Having emergency preparedness plan in place will provide formidable leverage for your business risk and resilience team. Workplace violence is any act of verbal, physical or emotional assault and harassment carried out against a victim within the confines of a workplace. It may include abuse and shout, hitting, beating, or attack, bullying and intimidation, and sexual harassment. Here are five key questions to get your team started for this security threat. Does your organization believe workplace violence poses a security risk to be taken seriously? Does your organization have response plan in place for workplace violence? How confident is your organization in dealing with workplace violence? What kind of workplace violence have been identified to be common to your industry? What kind of workplace violence has your organization experienced in the past five years? Providing answers to above questions should not be done loosely. It requires thoughtful insight which must consider size, assets, industry, complexity, experience, capabilities and resilience of the organization. Note also, factors that could possibly motivate persons to lunch acts of violence in workplace vary; however, it may include frustration, revenge, crime, rejection, and mental instability. Here is highlight and description of five sources of workplace violence to prepare for: Criminal intent: violence of this nature oftentimes originates from an external criminal who aims to obtain by force from a target inside the workplace. This may result to injury or fatality, and damage to assets. Customer based: is when a customer aggressively acts or reacts to a situation connected to the business transaction in the workplace. Such aggression may target a worker, a fellow customer or others. For instance, when a customer assaults an employee because their expectations are not met. Worker based: violence occurs when employee attacks, assault or harasses a customer, a fellow employee, the employer or others in the workplace. For example, a worker punches a fellow worker who has offended him/her beyond breaking point or attacks a superior who has refused to recommend a promotion or pay rise. Domestic based: occurs when a relative of a worker, employer, customer or others traces them to a workplace and carries attack. For instance, a jilted or rejected lover who visits and attacks a partner in the workplace.   Ideological based: violence is a situation where an adherent of a particular belief or faith lunches attack in workplace perceived to provide or promote a service that offends such faith. For instance, a religious fanatic who carries out assault on workers or customers in a brothel and disrupt its business activities. How to prepare for inevitable workplace violence: Prepare with PPT – activate emergency response plan through people, process and technology. This requires having in place a capable security team who can follow a process backed by technology to deter, detect and promptly respond to acts of violence in the organization. Build strong security culture – strong security culture demands strong tone from the top. When an organization does not tolerate permissive behavior, it will send message that support strong security culture. In such organization, policies and standards are enforced regardless of whether an act is considered a serious one or not. Enforce background check – background check gives insight to past behaviors and profile of a candidate. It also, provides a red flag of what such person can do if granted access to join organization. For instance, someone who has history of rape in the pass will likely attempt sexual harassment in a workplace. Provide workplace violence awareness – training employees to recognize signs and safety risks associated with workplace violence and encourage them to speak up against it is a good prevention method. For example, Human Resources unit should have a dedicated channel for people to freely and fearlessly report acts of violence. Have onsite security visibility – having security personnel physically seen in a business premises promotes sense of safety, deters some would-be attackers from attempting to attack and generally promotes peace and security. Promote data driven security operation – when a security team is being guided by a verifiable data; trends and patterns can be used for planning, execution and insightful delivery.  Data driven security operation can show connection between violence and a particular season e.g. weekend, evening, end of month, festive period, etc. Integrate CCTV surveillance to security visibility – CCTV camera have strong deterrent effect on occupants of its space. The system serves to caution people to be law abiding or make attempt and get caught. Encourage open communication – “see something, say something” is a safety and security slogan that must be encouraged amongst workforce. Sometimes a victim of covert workplace violence may not have the courage to speak up, especially if the avenue for such communication is not explicitly provided. Train your team for threat identification – employees and others in the workplace should be trained to easily recognize threats of workplace violence and report same without fear or inhibition. Deploy weapon detection technology – deploying weapon detection devices at company’s main access points will prevent entrance of lite weapons into the premises. With this in place, the risks of lethal attacks will be very low. Workplace violence can originate from five main sources. However, it preventable through application of some security measures outline above. ALSO READ 10 Ways To Prevent Workplace Violence

4 Types Of Phishing Attacks And 10 Signs To Know A Phishing Email

4 Types Of Phishing Attacks And 10 Signs To Know A Phishing Email

Phishing is a type of social engineering attack built on manipulating and deceiving people to reveal confidential and private information which is then used to carry out further crime against them.  This attack takes advantage of gullibility and vulnerability of human emotion to steal from people. Phishing attacks have become a popular, easy to use and very dependable tool for cyber criminals. When in operation; criminals would reach out to users through any communication channel, pretend to represent a legitimate authority; maybe a financial service provider, health insurance provider, a family member or trusted friend, proffer assistance, then request for inimical action from the user. Actions that maybe required from users during phishing attacks include but not limited to; Reveal private and confidential information, e.g. password, date of birth, social security number, BVN, code, etc. Click a link that will further direct users to secondary resource where confidential information will be stolen. Open attachment which in most case will contain malwares that will launch further attack on the device and network. Request for cash to enable a staged problem to be solved. Reveal a sent code to enable completion of a proposed solution. With automation and Artificial Intelligence dominating and directing modern interactions and commerce, people shall depend more on digital channels of communication. Available facts have proven that oftentimes, phishing attacks regardless of its type have more success rate than failure. This means more people are falling victim to these exploits. Hence, the benefits of deepening your understanding about them. Let’s dive into four common types of phishing attack. And how to identify email based phishing attack. Four types of phishing attacks. Spear phishing – this type targets specific category of persons, e.g. insurance or bank customers, students, male mine workers, etc. Whaling attack: is a sub-spear type of attack that targets high net worth and high-profile individuals like company executives, politicians, celebrities, etc. Just like implication of the name “Whale” biggest fish – this attack targets only “big fish”. That is, wealthy people. Smishing attack: this is an SMS based phishing where short message service is used to deceive a receiver into providing private and confidential information or taking other action. This is catchy because, it does not require internet connectivity to hit its intended targets. Vishing attack: this type is a direct opposite of smishing. It uses voice call to reach out and deceptively request for confidential and private information from receiver. In the same vein, internet connectivity is not required to execute this attack. Ten Signs to know a phishing email It will come from a stranger: oftentimes phishing emails come from unknown person or agent. It will come from a public email domain: examples of public email domains are yahoo.com, gmail.com, hotmail.com. Domain name will either be misspelt or corrupted: when it pretends to come from private domain, such domain will never spell correctly as the genuine one. There will be a form of misspelling or corruption of it. It will disguise as proffering assistance: merchants of phishing attacks always pretend to offer one form of assistance or the other. Shylock assistance you may call it. The mail content will be poorly written: content of mail will likely lack expected quality of a business communication. Mail will include suspicious attachment or link: this would require further actions like follow or open. It calls for urgent action: whatever is the call for action from phishing attack always comes with “urgency”. It will request user to provide personal information to enable closure of an event. It may request user to send cash to enable a staged problem to be solved. It will appeal to a defined sentiment. Phishing is a low end and cost-effective tool for cybercrime. It is a social engineering attack that exploits inherent weakness in people to get through and steal from them or carry out other crimes against targets. Getting basic knowledge about method of attacks and the techniques to identify them is a better way to go to prevent being a victim. ALSO READ: Cybersecurity Threat Of Social Engineering

Travel Security Understanding TSA Approved Locks

Travel Security Understanding TSA Approved Locks

Travel security refers to measures taken by an intending traveler to ensure protection for self and luggage. In an increasing global village, travelling both local and overseas has become a routine part of most corporate duties especially for executive personnel and others based on personal demands. Travel security speaks to millions of people who throttle around the globe periodically for one purpose or the other. For each trip security and safety should be of significant concern and must be synonymous with such trip. TSA means Travel Security Administration. TSA is an agency of US Department of Homeland Security. It has authority over the security of transportation systems within the United States. This agency was created as part of response to September 11, 2001 attacks on US to improve airport security protocols in harmony with other federal law enforcement agencies. One of the key recommendations of Travel Security Administration is a specified luggage lock known as TSA lock. A TSA-approved lock is any lock that has approval of TSA and authorized to emplaced Travel Sentry logo – the red diamond. When it comes to securing your travel luggage, using a TSA-approved lock is important for hassle-free trip. These locks feature a universal master key that may allow TSA agents to open and relock a luggage without having to cut or destroy such luggage lock. TSA-approved locks are gaining traction within global air transportation system. Although, each state has their individual air travel security regulations and practices, however most of them are adapted to TSA approved type when it comes to luggage lock. It is however, recommended for intending travelers to check the country’s specific luggage lock standard in advance of any trip. See the benefits of using TSA-approved lock on your luggage when travelling. • It will give you peace of mind. • It shows your knowledge of travel security. • It will ensure security of your personal effects. • It will align you to international travel requirement • It saves you the embarrassment of having your luggage lock cut or destroyed during routine airport security checks. Types of TSA-approved luggage locks There are specific types of these locks currently in open market. One striking feature to look out for as symbol of TSA approval is the “red diamond” logo. • Combination lock: this requires a specific combination of digits to lock and unlock. • Key lock: requires insertion of key and twist of tumbler to unlock. • Cable lock: allows for a sort of chain lock of multiple luggage together. Where to buy TSA Locks Local Stores: the keys can be found in most local travel stores or malls in the airport or within the community. Online Stores: notable online stores like Amazon, and Alibaba also sell TSA locks. In conclusion, travel must be synonymous with safety and security. While thinking safety first is crucial during any trip, the security of personal belongings oftentimes packed in luggage during such travel should also receive baseline attention. By understanding what a TSA lock is and its purpose, you should align your travel security to this regulatory requirement, at same time secure your luggage within acceptable standard. ALSO READ: Solo Travels

Strong Beyond Measure

Strong Beyond Measure

“Baby, you are strong. You can do anything you want. You can be the best. Only if you believe in yourself.” Those were Mama’s words every morning. I woke up to the sound of them. They seemed to energize me and spur me into action each day. On the wall in my room hung my medals, awarded to me for excelling in each class. My dressing table held my awards; they stood tall, telling tales of my success: Best in this and best in that. The biggest of them boasted to everyone that I had recited Psalm 119 in Sunday school. I faced my opponents the same way, looking them in the face and saying, “I am your fear” as Mama taught me. And they’d all scramble like rams, letting me emerge the winner. I never knew I could do all that, but Mama said I could. But what about me? What was I saying? Deep down lay great fear. I jumped the rod not because I believed I could; I jumped it because I was afraid I couldn’t. I strained myself because I was afraid to fail. I hated to see the disappointment on my mama’s face. I waited to hear my name each time, knowing nothing but excellence would be enough. I could see the heights of expectancy on her face, and they’d wear off by inch if I wasn’t called yet. Then they would rush back in a moment when I was announced as the overall best in my class. I cried each time, not tears of joy, but tears of fear that I could have failed altogether. “Baby, you are strong.” “No, Mum, I’m not!” “You can do anything you want.” “I do them all for you.” “You can be the best!” “I’m so scared I won’t be.” “Only if you believe in yourself.” “I can’t even find myself.” My voice was so lost in hers; my world revolved around her. Maybe because I never saw Dada; he died the day I was born. I was told too much joy killed him; he never believed he could be a father. He had a disability that confined him to a wheelchair just before he married my Mama. I only have a picture for keeps, and I praise Mama for her bravery. I wished I could find my own place too, and make her proud in my own way. I wanted to get to the top not for the money or for the fame but simply because I loved it. I really wanted to believe in myself. I wanted to go beyond my room and be the best in my own way. But what I wanted didn’t matter unless it was what Mama wanted. My choices were pointless, my dreams nightmares unless Mama said otherwise. She had planned out my life already. “At 22, you should be a barrister. The world would applaud you for being so young. People would bow to your wisdom,” she said. It sounded welcoming, and I’d do it for her. **** The goodbyes were slow, so slow that they drained me. College called immediately after high school, and I had to leave. I wouldn’t see Mama until summer break. The car moved slowly too; we waved and waved until we were out of each other’s sight. I wiped my tears and promised I’d make her proud. I lied. I failed. Two weeks went by, and I was in the other queue picking up a transfer form. I did not want to do law anymore. The wig and the gown never attracted me, but equations and formulas did. I called her. “I’m sorry, Mama. I have to disobey you this time. I know you won’t be proud, but please allow me to feel that pride even for once. Allow me to see my reflection in the mirror,” I said. She was not happy. Her voice sounded so low on the phone. She didn’t say “Baby, you are strong” in her usual way. I failed so many times. I had carryovers and stayed on probation. What happened to the usual overall best student? My medals and awards would be damned. They would walk off if they had the chance. Mama said it wasn’t too late to quit, and that I could still go back to my first course, but I wanted Mathematics, and I was ready to fight for it. I would conquer mathematics and physics to the end. I needed to jump this rod with so much faith. I needed to be me. But the end came too soon. It was convocation morning, and nothing had changed; I had been conquered. I sat in the back seat, according to our CGPA. I wasn’t the overall best. I wasn’t the best-graduating student. Tears stood in Mama’s eyes. Even when she smiled at the camera, they were still visible, but I wasn’t moved. For once in my life, I was ready to face the world with courage. I faced my post-college education. This time, I finally understood myself; I saw that failing wasn’t that painful. Failure is just a scratch. Mama’s words finally made sense. I am stronger than the ground. I can conquer fluid mechanics. I can do it because I believe I can. 1, 2, 3, 4, 5—57 times and eureka! I proved the existence and smoothness of the Navier-Stokes equation. I did what other students couldn’t do. I solved a millennium mathematics problem. Now and forever, my name is written in gold in the hall of fame of mathematics. Mama said with pride this time at my convocation, “Never forget, baby, that you are strong.” READ ALSO: How One Girl Faced Her Family’s Dark Legacy

A Journalist’s Dangerous Pursuit

A Journalist's Dangerous Pursuit

Amanda’s heart raced as she stepped into the dimly lit bar on Okeyilo Street in Shandam, Kaduna, a street renowned for housing dangerous criminals. The pungent smell of cigarettes and cheap liquor assaulted her senses, but she steeled herself. This was it—the breakthrough she’d been waiting for in her investigation of the notorious Ben Edet. Amanda had been tracking Ben’s activities as an investigative journalist for months. Rumoured to be a ruthless kidnapper and drug kingpin, Ben had recently made headlines by allegedly abducting the State governor’s son for a staggering 50 million naira ransom and has threatened to kidnap the first lady next if his demands were not met. With her wedding drawing close, Amanda was determined to crack the case, expose the truth and be back on time to get married. The bar’s patrons eyed her suspiciously as she ordered a beer, trying her best to blend in. It wasn’t until later that evening that Amanda realised her mistake—her conservative attire stood out like a sore thumb among the scantily clad women who frequented the establishment. Despite her initial setback, her persistence paid off. She learned two crucial pieces of information: Ben’s real name was Dogo Sylvester, and he had a weakness for women. Armed with this knowledge, Amanda knew what she had to do. She called her editor to give him the update and he simply told her to do what she has to do to get him the story. She would have to turn in her report to the state CID as well but, her newspaper house needs it firsthand. With a heavy heart, she called her fiancé, Jason, to explain her next move. “I have to go undercover,” she said, her voice barely above a whisper. “It’s the only way to get close to him.” Jason’s concern was palpable. “Be careful,” he pleaded. “Don’t let him touch you.” Amanda’s transformation into “Sandra,” a down-on-her-luck prostitute, was swift and convincing. She rented a room in a nearby brothel and immersed herself in the seedy underworld of Shandam’s red-light district. She had to blend in so they could trust her as one of them, she needed to get into Ben’s life by all means. Her act was so convincing that she soon caught Ben’s eye. On the night she was brought to him, she couldn’t believe her luck as she sat face-to-face with him. She forgot all about the report and was so scared for her life. He smiled at her and asked her to sit on the bed. He took in puff after puff of weed which he offered her but she refused. She thought of what to do but her mind was so dumb. She was still thinking of the next thing to say when he spoke. “So tell me about yourself, you see all the girls for your cabal I know them, all of them sweet- sweet girls but I’ve never seen you, so I want to know you.” Amanda broke down in tears as she told her story of woes, how she lost her parents and her uncle who was supposed to take care of her took away the properties of her father and left her to suffer. She had no other option than to do this dirty job to get money. She was surprised at her theatrical display and wondered where the story even came from. He looked at her strangely as she narrated her ordeals and what pushed her into this kind of life. He looked as though he knew she was lying but he said nothing. He kept looking at her and puffing his weed. “Come,” he said eventually. She walked up to him in her tank top and shorts praying he wouldn’t try to manhandle her. She was so defenceless except for the pepper spray she managed to tuck inside her bra. He sat her down on his lap looking deep into her eyes and spraying the smoke from the weed into her face. She held her breath as he did that wishing she could strangle him already. “I like you, I won’t hurt you as your uncle did and I can even help you kill him if you want.” Amanda’s stomach churned at his casual offer of murder, but she saw an opportunity, the possible way of making him talk about his escapades and confess to the various crimes attached to his name, she gave a sinister smile and hugged him then whispered into his ears. “I would love that!” Over the next week, Ben became infatuated with Amanda. She played her role to perfection, carefully extracting information while maintaining her cover. With each passing day, she gathered more evidence of his crimes, but she knew she needed a confession. On the night of reckoning, Amanda prepared herself for the most dangerous part of her mission. She set up hidden cameras and recorders, then invited Ben to her room. As they shared a bottle of wine—which she had laced with a mild sedative—Ben began to open up. His story was one of tragedy and pain. His father would come home drunk each night to beat him, his mother, and his younger sister. He hated his father. Each day brews new hatred for his useless father and all he wanted was to take care of his mum and sister but that never happened for his father killed his mum one day during their fights. His father was drunk as usual and everyone blamed it on the alcohol but Ben didn’t and the judge too didn’t and sentenced him to life imprisonment. His kid sister was assaulted by government officials who raked down their kiosk by the roadside alongside others calling it illegal. She fell sick after the manhandling and died weeks later. That incident changed him a lot and he took this path. He had no regrets as he looked at Amanda. He would avenge his sister and mother but first, he is starting with the State governor … Read more

Awakening the Sleeping Giant

Awaken the Giant in You

In the ancient city of Nebothia, a legend whispered through the ages told of a mighty giant guardian named Elk. Placed by the supreme being to watch over the land. Elk was a giant of extraordinary strength, standing over 7 feet tall—a colossus among the natives. His prowess was unmatched; he hunted wild beasts with his bare hands, feasting on their raw flesh. Rumours have it that at night, he transforms into a bull-like creature with the appearance of a man and patrols the entire land, watching, guarding and defending the nation from even unseen forces. No one has ever seen him like this before but the tale has been passed down from one generation to the next and it was talked about in hush whispers, making Elk, the giant, to be feared greatly. Elk’s solitary nature led him to dwell in the hills and caves on the outskirts of Nebothia. The villagers rarely saw him, save for times of war. Unlike other cities with their grand armies, Nebothia had no standing force of great art or strength. They had only Elk—their one-man army. When danger loomed, an alarm would sound, and Elk would be summoned from his rocky abode. But the task of fetching this unpredictable giant fell to one person alone: a young lad named Elon. For Elk’s temper was as mighty as his strength, and many a messenger had fallen victim to his rage before even reaching the battlefield. Elon, however, possessed a unique ability to calm the giant while delivering news of impending threats. Each time Elk appeared, the natives rejoiced, for his presence assured victory. He always returned triumphant, a living legend among his people. But as time flowed like an endless river, Elk vanished from the hills he called home. The only trace of his departure was a cryptic message etched into a tree: “????’???????? ???????????????? ???? ???????????????? ???????????? ???????????? ????????????… ℎ???? ???????????????????? ????????????ℎ???? ???????? ???????????? ???????????????? ????ℎ???????????? ???? ????????????????????????????” The villagers, puzzled by the message’s origin and meaning, continued their daily lives unaware of the profound change about to unfold. When war once again threatened Nebothia, Elon was dispatched to fetch their saviour. He raced to the hills, his heart pounding with urgency. Reaching the cave at the foot of the hills, Elon called out: “Oh, great one! A nearby community who have not heard of your might is camping just by the seashore ready to attack us!” Silence greeted his words. Undeterred, Elon tried again, his voice echoing off the cave walls. “Great Elk of Nebothia! Your city is on the verge of attack by some invaders who are ready to strike us at any time. You need to come down quickly and save us!” “Are you talking to yourself?” A voice startled Elon from behind. Spinning around, Elon found himself face to face with a Dublin—a watcher of the sky, suspended in mid-air by wings attached to his legs. The Dublin’s piercing gaze seemed to look through Elon as he repeated his question. Confusion clouded Elon’s mind as the Dublin revealed a truth that would shatter his world: “Or rather, you were sent to get yourself to fight off the invaders!” “I don’t understand you,” Elon protested, his mission to fetch Elk momentarily forgotten. “What is there not to understand, dear son of Elk?” The words hit Elon like a thunderbolt. “What did you just say? Me? The son of Elk?” “Yes. Can’t you see it, Elon? Elk is your father sent to watch over and save Nebothia. He has finished his race and is gone. It’s your turn now to do the same.” “What are you talking about?” Elon asked, entering into more confusion. If he was the son of Elk, how did that come to be? What was he doing in the village with others? Why was he not on the hill with his father? As he asked these questions, realization dawned on him as the answers came. He has never felt normal, his body mass keeps increasing by the day and so is his appetite. He noticed he was also getting taller, even taller than most of the villagers. “But-” “There are no buts, can’t you see the handwriting on the wall, Elon? Your father has completed his race and has handed it over to you, you’re the next watcher and guardian of Nebothia” “But how come-” “How come you never knew right?” The Dublin asked, cutting him short. “Yeah,” Elon replied confused. “That’s because Elk, your father gave you up to the villagers at your birth. He wanted you to know everything about the people you’ve been sent to guard. He wanted you to fall in love with them first and so you can care for them. He didn’t have that opportunity and most times, he was quite violent towards them but he didn’t want the same for you and so he allowed you to live with them,” He explained. “So great son of Elk, what are you going to do with this information? Will you continue to be an errand boy, one sent to go call a giant or one who will take up his place and identity as THE GIANT and fight?” Elon was at a loss as he watched the Dublin, his mouth was open but no words came from it. The Dublin knew he had carried out his mission and so he left Elon with these parting words. “Awaken the giant in you or watch him die from sleep!” As the Dublin vanished into the sky, Elon remained rooted to the spot, grappling with his newfound identity. The weight of his destiny pressed upon him, demanding action. So all along, he was a giant and he never knew, no one knew. No one told him. ???????????????? ???????????????????????????? ???????????????? ????????????. And what did the Dublin say again, “What was he going to do with that information?” Elon roared, one that was heard even far beyond the land and stumped down the hill as … Read more

Confronting the Secrets of the Past

Confronting The Secrets of the Past

I saw Anna again after 15 years. I saw her but she wasn’t the little infant whose image has secretly been on my mind for eons. She wasn’t the 2-day old baby I left to die at the refuse dump. Anna was representing her school in the quarterly spelling bee competition and so far, she’s been scaling each phase without burning out her memory. She kept spelling till she got to the nationals where I happened to be one of the judges. I’ve been hearing a lot about this nerd who has been setting the whole central East on fire with her brains and I wasn’t surprised when I learned she would be at the competition. Her school is head-bent on milking all the awards through her. She’s their best student. “Anna Patrick for Greenfield High School,” The chief judge called her and proceeded to call others who made it to the nationals. She walked up to the stage and took her seat. She is my exact replica and I hid part of my face with my wig trying my best to comport myself. I met her two days ago when they arrived, she was in the company of a woman and a man, supposedly her foster parents and also the school proprietress. I met them at the entrance to the secretariat where every student would have to register. She had the mark on her face, on her neck, and her right hand. I had a baby when I was 15. I wasn’t ready and so was my boyfriend. It was best I got rid of it but I couldn’t for fear of losing my life in the process so I ran away from home. I had the baby, a little healthy baby in a cold dirty infirmary. She was so small and beautiful and I forgot my fears for once as I looked at her. My baby had those birthmarks, tiny starish marks close to her eyes, her neck, and on her right hand. I know I couldn’t take care of her so I opted for the easy way out. I rolled her in folds of wrappers and dumped her in her sleep at the refuse dump close to the area where I lived and I turned back and fled. Anna wrote down her name and I stared at her in shock, the room suddenly became so small for me and stuffy too. I couldn’t breathe and sweat broke out on my tiny frame. My colleague asked her for other information which she provided in that shrill voice the same as mine. She has my eyes and lips too. Anyone who looked at us closely would see the resemblance, I nearly fainted as she talked. I was just holding on to my sanity by a thread. She left with her parents and I walked back to my room complaining of a headache. My mind was cast back to that day when I dropped my motherly cloak and abandoned a child I brought into his world. Now fate has played a fast one on me by showing me how wicked I was and a treasure that I’ve lost to another family. I’ve not even been able to conceive in my marriage after 5 years already. I cried myself to sleep filled with guilt and sorrow. She was at the last two words that would crown her champion, she and another girl from the west were the only two remaining after defeating the other thirty-four contestants from other states. By missing a letter, the other girl fell out and it was remaining just Anna. My own Anna. I looked at the last word for her to spell. “Eccendentesiast” The chief judge said something else instead. “Spell Motherhood.” Anna looked at him with awe as her jaw dropped from high expectations. No one was expecting such a simple word to spell. I could see the sly look on the face of the proprietress and the triumphant look on the face of her parents, scratch that, her foster parents. I flinched in lethal dread. This shouldn’t be happening now. I was filled with sorrow as she asked for a dictionary definition. It’s such a simple word, why would she want a definition? Abiding by the rule, the chief judge said the definition. I was sitting there trying hard not to make my tears spill for it reminded me of how much I’ve failed. She brought the microphone close to her mouth and started. “I was told that I had a mother who gave birth to me but decided to throw me away for reasons best known to her — ” Anna wasn’t supposed to be doing this but I saw that the chief judge was quiet and didn’t try to stop her. I guess everyone wants to know about this brilliant girl and who she was. “I’m not angry at her action, I’m just sad that she hated me that much to want to end my life. I have a mother today, who picked me up from that dump and it’s to her I dedicate this.” Anna continued. She walked down the stage to where her parents sat, her mum was already in tears as she came closer. There My Anna spelled the word ‘Motherhood’. I wiped off my tears quickly as it ran down my cheeks. No one would ever see it and I managed to speak into the microphone. “Correct.” I watched the crowd grow wild in ecstasy as they clapped for the new national champion. Her parents hugged her tight crying. I slipped away into the restroom and sat on the cold tiled floor. I let go of reasoning as I sat close to the toilet bowl crying in heart-shattering pain. I couldn’t believe what I’d done to myself. I was too weak to even go back to the hall. How would I tell the story? She will hate me even more, that I walked away from her only … Read more