Featured

Fantasies

Opening my eyes only to see that Light follows the trails of Darkness, a girl whose faith went far beyond the reach. She who stood against the truth and screamed, against all the odds that defied her faith. A goddess in her armor, she held her wild fantasies ahead of her only to follow her path. Allowing her fantasies only to manifest on her body; thus, she shines and lures the thoughts of others. Lying on the couch, showing off her infinite grandeur with pleasure and honor. Lying on the couch, she does on my legs allows me to see the Light rises. Composing the finest piece upon her world, and I was wondering and wandering the alleys of her bright land. I slipped my hand inside back and forth, cooling her down, make it easy for her to start feeling the pleasure of life to endure the pain of body. Her world was dark as Death, black as night, and opaque just like her. Her elevation surfaces as a glowing beam of Light, and she only could stand with glory. Our blood is what defined us, what connects us to our souls; I was home to behold her revelation, her confession of what we are.

Featured

Liberation

Restrictions are those repressive shackles inflicted upon us, whether by an external factor or even by ourselves. Those shackles serve as a concrete hindering force evidently imposed to stress certain false or true beliefs; however, most of us can’t even see through the real intentions of such thoughts or implications. If we are upon to talk about restrictions or shackles, we shall also discuss Liberation as an essential key of redemption or resistance. Naturally, we are always bound to that strangling chain of orders specifically traditions and religious doctrines; they also represent an entity or structure built upon “undoubted” and “unquestionable” pillars of conviction. A large segment of people are being driven by that force, only to feel that there is a way to follow because most of them share the same feeling of pursuing matters of belief whether real or not. In the present time, Liberation can be seen as an outlet for so many; it inspires those who feel silenced or restrained to rise and rebel against all odds. They wish to have their souls liberated and freed, then Light shall prevail upon those who feel and endure the pain. Everyone is doomed to be a cog in the machine without prior knowledge, they act and perform their roles in the perfect way only to be rewarded in the end. They found themselves born in a world governed by oppressive rules or orders, which may lead to unexpected outcomes in the future. Their pursuit of redemption and Liberation can be the spark to topple the entire perception of suppression; thus, they will have to spearhead a new kind of revolution to inspire others to create and rebel.   

Into the Minds of Egypt’s Brilliant Visual Artists

Art, as so many of you know, is a wide spectrum of human imaginative works and creations typically in visual forms. These creative works are usually the products of what the artists perceive, in other words, they are the epitome of conceptual ideas and inner feelings. Most of these works weren’t only hailed for their aesthetic contribution but for their emotional power. But, when it comes to the visual side of art, I believe visual art is the one to be considered for its expressive imagery nature. It is perceived as the conscious creation of a significant aesthetic work of art through utilizing our natural talents.

Speaking of art and artists, I have finally come to the major point of our discussion by which I’m up to share my first-hand experience into one of the most prominent exhibitions in Downtown called ” the 29th letter of the alphabet exhibition”. The exhibition was curated by Alexander Stock and organized by an Egyptian company for art consultancy, Art D’Égypte. The exhibition came as a part of a program for “Re-imagined Narratives”. Over 40 contemporary artists participated in the exhibition to promote art and fuse heritage with contemporary works. As an organizer and art consultant, Art D’Égypte’s role exemplifies an unrivaled opportunity to preserve the ancient heritage through linking the past with the present by hosting exhibitions inside major historical sites.

My first touch of reality started when I got into the historic ” Tamara” building in Downtown where the exhibition was organized. It felt like going through a portal or God knows what, another world I presume. First, I had to inspect the lower floor that faces the gate I went through. At that time, I really had a very powerful impression going there until I found collections of visual portraits under the spotlight. While taking a tour inside, I met “Sara”, one of the organizers and a passionate fine arts student. She was very helpful to give me a detailed account of the exhibition, the paintings and the artists. With her help, I managed to talk to one of the artists, Imane Ibrahim, a 29 year-old Egyptian visual artist, writer and a fine arts scholar. Ibrahim has exhibited a part of her new collection of paintings at” the 29th letter of the alphabet exhibition” titled “ Lovers and Dreamers “ series, referring mainly to her grand project “I’m Mounira From Egypt” in which she composes words with paintings. Her focus is centered on Feminism, gender discrimination and the ways of treating and reforming these existing issues. In her art projects, she states using various forms of storytelling, survivors memoirs, traumas narrations and prisoners diaries in her way to examine and reform the perceptions of life. As a contemporary, her work is both corrective and instructive at the same time; as she is trying to reflect and treat what is on the ground for the sake of “a healthier society”. Indeed, Ibrahim has devised an elaborate technique to blend Arabic fiction with painting, that is, through painting, she can deliver such stories or reveal social issues to the readership. It is as if paintings serve as a vessel that carries what on the artist’s mind.

Ibrahim’s figurative artwork “Lovers and Dreamers” is a highly representational work of art for its strong reference to our real world and particularly to the human figures. She takes us on a journey into her own world where faceless figures are having a live, yet speechless conversation with each other. These faceless figures, males or females represent anybody in our world. They appear to be looking at each other with vacant eyes, trying their way to figure out what they are going through. For the moment, I sensed that there are boundaries surrounding them, yet they’re trying to go beyond. Eventually, Ibrahim’s series seems to shed some light on social subject matters like individuality, introversion and lack of identity. Such subject matters are universally spread in our community, a matter which requires an immediate intervention from the artist.

Social Engineering

Social Engineering is a technical skill, defined as the art of manipulating and penetrating human beings unknowingly skillfully in order to gain access and getting anything for free against the intended target. It is defined also as manipulating a person into knowingly or unknowingly giving up information; essentially ‘hacking’ into a person to steal valuable information. Nowadays, many people are unaware of sharing data with people, a matter which allows others to steal data and make use of it. Social Engineering relies on the goal of its user, who gives truthful illusive questions, proofs and information to fulfill the goal he intendeds to access. It is utilized stealthily in everyday life there are many types of Social Engineering for example, when parents convince their children to take up a medicine because of illness or something like that and they reply; here the parents managed successfully to penetrate their children’s mind and convince them to do what they want. Political speeches are one of the types of social engineering when the government intends to frame their messages truly, they choose to use the power of manipulation and deception to persuade the people that what they say is totally true. Advertising is another type of social engineering when a company manager aspires to distribute a product widely; he cunningly makes-up his product whether by adding false promises, background and information to the public. Even spies are experts in this field, they are taught how to fool and manipulate people to make them believe what they say. This art depends on two fundamental elements performed by the social engineer such as credibility and trust; those elements enable the one to the final path which is gaining access to someone’s mind. A social engineer should have enough skills and power of knowledge to perform those attacks, a matter which depends on the human weakness or may be called “Vulnerability”. Performing Social Engineering may take people deeply into the infrastructure of the human being, analyzing its weakness and ways of penetrating it skillfully differs from one to one. Human being infrastructure in Social Engineering can be viewed as a building which may be insecure or vulnerable full of security holes; in this case the task comes to the social engineer to scan it showing its weakness points and penetrate it. Social Engineering can take on many forms, it can be malicious and it can be friendly; it can build up and tear down. A successful social engineer who makes use of knowledge and education in a practical way to distract and manipulate the target, as knowledge represents the power element of logical persuasion in the attack against the target. Social Engineering consists of significant techniques performed by the attacker in his or her way to gain access such as information gathering, elicitation and pretexting etc.

Information gathering is one of the effective primary phases in which the social engineer counts on at first to gain information about a certain target. It is the social engineer primary stage, of collecting data about the target using skillful methods of reconnaissance or surveillance stealthily. This technique drives the skillful social engineer to active interactions with the target and opening up discussions lead to some valuable information which may later help the social engineer. Gathering information is like building a house. If you try to start with the roof your house will surely be a failure. A good house will be built using a solid foundation and from there it will be built literally from the ground up. As you gather information you may be overwhelmed with how to organize and then use this data, so starting a file or an information gathering service to gather this data in is a good idea. Social Media has become one of the effective ways of streaming information of people; it touches a large number of critical information of its users a matter which provides anyone of identifying someone’s identity. Many of the skills or methods that a social engineer may use come from other fields. One field that is great at gathering information is sales. Salespeople tend to be very talkative, easygoing, and very good at collecting data about those with whom they interact. Using simple wording can get a person to open up and refer family, friends, and maybe even coworkers. Harvesting, or gathering this information and then storing it, allows the sales people to have what they call “warm leads” to call on. A warm lead is where they have a person with an “in,” a way to get in the door without having to cold call. The salesperson gathers information from his present client, and then he relays that information in a way that will make the new “target” more susceptible to listen and let him in. This technique is effective in that it builds trust, uses familiarity, and allows the target to feel comfortable with the salesperson, or the social engineer, giving their mind a bridge over the gap that normally would exist there. The first ingredient in any recipe for a social engineer is information. Every attacker utilizes some tactics or tools for gathering information such as pretexting, which is creating fake scenarios or incidents to convince the victim with it and to gain information unknowingly. Identity theft is one of the tactics used in surveillance processes; with it a social engineer can disguise himself as another one to the target to collect information. Every tiny piece of information may help greatly in penetrating someone rapidly.

Elicitation is another powerful technique often used by social engineers to extract information from the targets. Elicitation is a technique used to discreetly gather information. It is a conversation with a specific purpose: collect information that is not readily available and do so without raising suspicion that specific facts are being sought. It is usually non-threatening, easy to disguise, deniable, and effective. The conversation can be in person, over the phone, or in writing, Conducted by a skilled collector, elicitation will appear to be normal social or professional conversation. A person may never realize she was the target of elicitation or that she provided meaningful information. It is used by spies, con men, and social engineers, as well as doctors, therapists, and law enforcement. Elicitation means to bring or draw out, or to arrive at a conclusion (truth, for instance) by logic. Alternatively, it is defined as a stimulation that calls up (or draws forth) a particular class of behaviors, as in “the elicitation of his testimony was not easy”. Many competitive business intelligence collectors and foreign intelligence officers are trained in elicitation tactics. Their job is to obtain non-public information. A business competitor may want information in order to out-compete your company, or a foreign intelligence officer may want insider information or details on US defense technologies. It is not uncommon for people to discover information about a person without letting on the purpose. For example, have you ever planned a surprise party for someone and needed to know their schedule, wish list, food likes and dislikes or other information without that person finding out you were collecting the information or for what purpose? The problem comes when a skilled elicitor is able to obtain valuable information from you, which you did not intend to share, because you did not recognize and divert the elicitation. There are many elicitation techniques, and multiple techniques may be used in an elicitation attempt. The following are descriptions of some of those techniques such as Assumed Knowledge, Bracketing, Confidential Bait, Criticism, Deliberate False Statements etc.

Pretexting is another effective technique of Social Engineering which is utilized by the most of social engineers to infiltrate people, organizations and companies etc. Pretexting is better defined as the background story, dress, grooming, personality, and attitude that make up the character you will be for the social engineering audit. Pretexting encompasses everything you would imagine that person to be. The more solid the pretext, the more believable you will be as a social engineer. Often, the simpler your pretexts, the better off you are. In social engineering playing a role or being a different person to successfully accomplish the goal is often imperative. Pretexting is also used in areas of life other than social engineering. Sales; public speaking; so-called fortune tellers; neurolinguistics  programming (NLP) experts; and even doctors, lawyers, therapists, and  like all have to use a form of pretexting. They all have to create a scenario where people are comfortable with releasing information they normally would not. The difference in social engineers using pretexting and others are the goals involved. A social engineer, again, must live that persona for the goals involved. A social engineer, again, must live that persona for a time, not just act a part. A very important aspect to remember is that the quality of the pretext is directly linked to the quality of the information gathered. The more, the better, and the more relevant the information the easier it will be for the pretext to be developed and be successful. For example, the classic pretext of a tech support guy would utterly fail if you went to a company that either had internal support or outsourced to a very small company of one or two people. As natural as you are when you converse with someone about who you really are is how easy applying your pretext should be. As with every skill, certain principles dictate the steps to performing that task. There are various principles of pretexting that may be used. By no means are these the only principles out there; maybe others can be added, but these principles embody the essence of pretexting: Extensive researching, providing personal interests, practicing dialects or expressions, simplifying the pretext, spontaneous pretext and providing logical conclusions.


In conclusion, Social Engineering plays a vital role in our everyday life, encountered by many people who are being deceived unknowingly. Social Engineering suggests an intensive analysis which delves deeply into the human being psychology to figure out its weakness points. This technique consists of many influential methods and tactics such as information gathering which is one of the skillful ways of collecting data and information about the target. Elicitation is one of Social Engineering powerful method of collecting data through conversations. Pretexting is another technique which is pretending to be someone else in order to fool and manipulate people to access particular information.

The Truth

It is beyond the senses of our mind to grasp the meaning, an unattainable truth shall survive the ashes of Death. Light shall prevail upon those who seek eternity as he who seeks the truth blessed forever. Despair follows the seekers wherever they go as their shadow fellow. In the land of Death they walk fearing nothing but the spirit of failure. In a dimmed fallen world, they come to represent the all-seeing eye of truth. A life grain is more than a symbol of truth but a life for those who follow the Light of eternity. Our eyes only see whatever they want to see but Fate always comes shadowy, it absorbs every grain of life ever exists in our realm. We are bound to see the shadows of Death wherever we go, thus we shall be purified from the reality we live. They have reached the end line of their journey, it was just the beginning of another one towards immortality. They are everywhere among us, dedicated their life to feel the pain to liberate us from the elusive nature of reality from ourselves. It is pathetic to think that our physical existence naturally continues to exist, nothing remains but our souls our consciousness. Those Specters dressed in bloody gowns are known as the holders of Light the holders of the truth.