Welcome to Day 2 of “THE ENIGMA THREAT” Release Blog Tour! @enigmaseries @1rburkey @4WillsPub @RRBC_Org #RRBC

THE ENIGMA THREAT Release Blog Tour!


(1) $25 Amazon gift card

(10) e-book copies of the “shorts” in the Enigma series

It is with pleasure that I present to you The Enigma Threat Release Blog Tour of Breakfield and Burkey. Here is …

4Wills Tour Day 2

Breakfield and Burkey wanted to share what’s behind a series based on cyber-crime?
Breakfield & Burkey are experienced techno-geeks with education and professional careers at leading technology manufacturers. Initially, our business leaders felt we were well-suited to consult and delivering analytical reviews of technology and processes. We conducted many workshops for customers and partners, were named top subject matter experts for several years and contributed to many white papers separately and with teams.

This activity led to our being asked to complete technical books, non-fiction, for publication. Good books but outdated nearly after they were published. After Burkey started writing the first book in what would become the Enigma Series, several things occurred. It was almost a perfect storm.

As a result of our experience in the technology industry, coupled with our travel and professional interactions, we saw the signs of what was possible and happening. In our roles, we were exposed to bleeding-edge technology innovations for business and personal use in advance of adoption. We agreed we could influence and increase people’s awareness with fictional stories based on relevant facts for today’s adults. Dropping the textbook approach and telling a story allows faster more enjoyable knowledge transfer.

Technology has shifted exponentially over the years. The Enigma Machine, which is a premise for the information gathering of the R-Group in the series, was critical to dominance in World War II. It is also the foundation of today’s computer. We lace in some history so people can realize the digital world we use today is due to the work of many visionary people worldwide.

Breakfield listened to an interview with A. G. Riddle, who is also a techno-thriller writer. Riddle stated his opinion that we heartily agreed with; the Techno-Thrillers genre is an under-served market. His marketing and following are admirable, as well as what we are working to achieve. We released our first books in similar timeframes. During the interview, someone in the audience asked him what he preferred to read. His immediate response was technical thrillers and suspense.

In our professional careers, Breakfield and Burkey frequently research and comment on different technology elements. Burkey has a focus and passion for user experience. Breakfield is always scanning the technical horizon for new trends and technological evolution. When we find exciting and innovative shifts involving people, business, and technology, we pick out the elements we want for our books.

Cyber-crimes are desperately interesting because they are the economic weapons of war here in the 21 st century. Sovereign nations have their black ops teams trying to destabilize competing countries. The insidious criminal elements enjoying the challenges found outside of civilized boundaries lurking in the Darknet now apply university-level business models to their extortion efforts. There is a multitude of ghastly exploits to write about as a central focus for a story.

What is your approach to the latest novel, The Enigma Threat?

Artificial intelligence and machine learning are rampant. The direction of designers is to take these capabilities to new levels, and so they are funded to gain wide adoption fast. The Enigma Threat is based on A.I. and the guardrails that may or may not be in place by the creators. Questions of what is happening to the tsunami of information being gathered are only recently occurring. In our estimation, it is a little like closing the gate after the horse is out of the corral.

We want to be fair in relating our approach. We write thriller/suspense novels, with technology as the catalyst for creating conflict between the cyber heroes and the cyber thugs. You don’t need a voice, data, or networking engineering degree to understand the plot or feel our stories’ drama. Those who have a more technological background will notice the real-world impacts a little quicker.

In fictional writing, it is the storytelling that brings the reading value to people. As with most industries, there are information systems acronyms. We go out of our way to poke fun at the technology world by making up insanely funny acronyms to defuse the technobabble that permeates the high-tech world. These have resonated with readers and reviewers. One of favorite was the Kirkus review that highlighted POPTARTS in The Enigma Ignite. If you have not read it, POPTARTs is defined as Polymorphic Operational Programming of Technology to Aggregate Recurring Temporal Synergies. If you want to laugh, please check out our Concepts and Terms listed on our website, which states the book in which each term appears.

We have some choice ones within The Enigma Threat. Two of the favorites are PaaS, defined as porn as a service, and CESPOOL, defined as Cyber Elite Social Police for On-line Operations and Logistics. They genuinely have a place within the story too!
We look forward to your review of our Kickstarter campaign to start the screenplay efforts!



Website: http://www.EnigmaBookSeries.com

Blog: https://EnigmaBookSeries.com/the-enigma-chronicles/category/blog-statement/

Connect and follow on Social Media:

LinkedIn: https://www.linkedin.com/in/charlesbreakfield and


Twitter: https://twitter.com/EnigmaSeries

and https://twitter.com/1RBurkey

Facebook: https://www.facebook.com/TheEnigmaSeries/

YouTube: https://www.youtube.com/channel/UC6Vz4x5ctTnx3yUhZk1OJkw

Pinterest: https://www.pinterest.com/enigmseries/

Instagram: https://www.instagram.com/enigmabookseries/

Bublish: https://bublish.com/author/breakfieldandburkey

RRBC: https://ravereviewsbookclub.wordpress.com/about-breakfield-



In the new digital world, there is no tolerance for privately owned supercomputers. Globally, computers are hunted and destroyed for the greater good, by the new cyber police CESPOOL. The information this group receives is manipulated by subversive hidden machine learning devices, the MAG running on the dark net.

Judith and Xiamara are freebooters who steal machine time for their PaaS, porn as a service business. The machine they chose for delivery is the last untapped supercomputer not in the hands of a sovereign. Their activity is spotted by the MAG, but the renegade R-Group steps in to alter the outcome. Leroy teams up with Zara to help these opportunists escape prosecution. They are drafted as reluctant participants in the fight.

Jacob and Quip are trapped in the Chihuahuan Desert trying to reconstruct the base of ICABOD’s logic core. The stress of their isolation is taking a toll. Their wives and children are safe in Brazil for the time being, but Interpol is prowling for answers.

The R-Group has assembled a way to communicate with orphaned satellites. While the next R-Group plans the ultimate honey pot to trap their nemesis who is driving their corrupted agenda. The odds are against R-Group’s success, but they have creative surprises on their side.

The stakes have never been higher. The R-Group young and old must rise to defeat the MAG.


Breakfield is a 25+ year technology expert in security, networking, voice, and anything digital. He enjoys writing, studying World War II history, travel, and cultural exchanges. He’s also a fan of wine tastings, winemaking, Harley riding, cooking extravaganzas, and woodworking.

Burkey is a 25+ year applied technology professional who excels at optimizing technology and business investments. She works with customers all over the world focusing on optimized customer experiences. She writes white papers and documentation, but found she has a marked preference for writing fiction.

Together they create award-winning stories that resonate with males and females, as well as young and experienced adults. They bring a fresh new view to technology possibilities today.

To follow along with the rest of the tour, please visit the authors’ tour page on the 4WillsPublishing site.  If you’d like to book your own blog tour and have your book promoted in similar grand fashion, please click HEREThanks for supporting these authors and their work!

About Shirley Harris-Slaughter

I love old buildings and history. That's why I ended up writing about the history that surrounded me all of my life - "Our Lady of Victory, the Saga of an African-American Catholic Community." Plus our church had closed and the school is torn down, so I felt it was imperative that we preserve the history or it would be lost forever.
This entry was posted in THE ENIGMA THREAT" Release Blog Tour and tagged , , , , , . Bookmark the permalink.

30 Responses to Welcome to Day 2 of “THE ENIGMA THREAT” Release Blog Tour! @enigmaseries @1rburkey @4WillsPub @RRBC_Org #RRBC

  1. Wendy Scott says:

    Seeking new trends makes your storylines cutting edge – a real melding of today’s and future technology. I have to admit my techno solutions usually involve the off & on button – I’m so out of your league!

    Liked by 1 person

    • roxburkey says:

      Wendy we all have different experiences. You aren’t out of anyone’s league, just a different frame of reference. The point is whether the story is good or not! Happy new year.


  2. Thanks for hosting, Shirley! Rox and Charles–Things certainly have changed since I was a lowly secretary at MIT in the 1960s and the computer was bigger that the size of my ranch house, and it went down ten times daily. We had to keypunch cards to feed into the thing–probably the most boring thing I’ve ever done. Wiring connections: A1B, A2B, A3B, etc. Watching the evolution of computers has been amazing, but back then, we never dreamed that we’d be in the world of cyber crime/espionage. Thanks for taking this on in your novels!

    Liked by 1 person

    • roxburkey says:

      Wanda, I love this. I use to read punch cards to find errors and paper too! Tech has changed. I recall on some show where they used a card sorter to represent a computer processing and I laughed my socks off at the staging. Happy New Year.

      Liked by 1 person

  3. I know I have a couple of your books on my kindle. I like that you incorporate humor into the technical. It definitely makes it easier for readers to enjoy. I look forward to diving into this series. 🙂

    Liked by 2 people

  4. jinlobify says:

    Very interesting blurb. I am just at series one of your books, and it baffled me how very true to life your stories are. If the things you talk about are real, my word! Who is safe?! Thank you, Shirley, for hosting today.

    Liked by 1 person

  5. roxburkey says:

    Shirley, I love your site and appreciate your support. Thank you for all you do for authors. Rox

    Liked by 1 person

  6. Rox and Charles, it seems your tour is an absolute hit and you’re only on Day 2! WOW! Let’s keep the fun rolling!

    Thanks for the host, Ms. Beautiful Shirley!

    Liked by 1 person

  7. pdoggbiker says:

    Good luck on the launch of your new book, Charles and Rox! Thank you, Shirley, for hosting the tour.

    Liked by 1 person

  8. Jan Sikes says:

    Thank you for sharing this new book release for Breakfield and Burkey, Shirley. There is no question that this pair incorporates a tremendous amount of technology expertise and the way they have chosen to share it is perfect for folks like me who view technology like a foreign language. 🙂 Their stories are entertaining and enlightening!

    Liked by 2 people

  9. Patty Perrin says:

    Thanks for hosting, Shirley. Hi Rox and Charles! I was just reading an article about how easy it is for hackers to get into our accounts. Scary stuff. Congratulations on your new book! I love your creative use of acronyms. We used them in normal conversation in our military family, which made conversations flow so much better. Acronyms like yours would have sent us kids into fits of giggles. I look forward to reading your book!

    Liked by 2 people

    • roxburkey says:

      Patty, thank you for following this tour. Each business has a special set of terms. When we were children we used piglatin. I think it stuck. The terms for all the books are on our website and have made many a person giggle. Take care and stay safe. Rox


  10. Mark Schultz says:

    Thanks for sharing Shirley.

    Liked by 1 person

  11. markbierman says:

    I read and reviewed the first book of the Enigma series and was captivated. I had no idea they were on book 12 already! Congratulations, Breakfield and Rox! Thank you for spreading the word, Shirley!

    Liked by 3 people

  12. roxburkey says:

    Robbie, thank you for following this fun. The story is what counts and the technology is the backdrop to the problems. You take care.

    Shirley, you provided a perfect setting for today. Thank you.

    Liked by 1 person

  13. patgarcia says:

    Hi Rox, Hi Charles, Hi Shirley,

    I personally believe cyber crime is growing quickly. Hacking of computers in the Pentagon or other phishing for bank information is just a touch of what is really happening in the cyber world. It is good that you two have found a niche for your writing abilities and I wish you much success.

    Hi Shirley,
    Thank you for hosting Rox and Charles.

    Wishing you all the great 2021.

    Shalom aleichem

    Liked by 1 person

  14. Congratulations on your new book, Breakfield and Rox. It does sound intriguing. I was a bit worried I wouldn’t follow the technological references, but they seem well explained which resolves that. Thanks for hosting, Shirley.

    Liked by 1 person

    • roxburkey says:

      Hi Pat thank you for stopping by. We agree with you. Your kindness is appreciated.

      Shirley you are an amazing hostess!

      We hope to gain the support on Kickstarter, so please ask your friends to take a look! Happy New Year.


Comments are appreciated!

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.