THE ENIGMA THREAT Release Blog Tour!
(1) $25 Amazon gift card
(10) e-book copies of the “shorts” in the Enigma series
It is with pleasure that I present to you The Enigma Threat Release Blog Tour of Breakfield and Burkey. Here is …
4Wills Tour Day 2
Breakfield and Burkey wanted to share what’s behind a series based on cyber-crime?
Breakfield & Burkey are experienced techno-geeks with education and professional careers at leading technology manufacturers. Initially, our business leaders felt we were well-suited to consult and delivering analytical reviews of technology and processes. We conducted many workshops for customers and partners, were named top subject matter experts for several years and contributed to many white papers separately and with teams.
This activity led to our being asked to complete technical books, non-fiction, for publication. Good books but outdated nearly after they were published. After Burkey started writing the first book in what would become the Enigma Series, several things occurred. It was almost a perfect storm.
As a result of our experience in the technology industry, coupled with our travel and professional interactions, we saw the signs of what was possible and happening. In our roles, we were exposed to bleeding-edge technology innovations for business and personal use in advance of adoption. We agreed we could influence and increase people’s awareness with fictional stories based on relevant facts for today’s adults. Dropping the textbook approach and telling a story allows faster more enjoyable knowledge transfer.
Technology has shifted exponentially over the years. The Enigma Machine, which is a premise for the information gathering of the R-Group in the series, was critical to dominance in World War II. It is also the foundation of today’s computer. We lace in some history so people can realize the digital world we use today is due to the work of many visionary people worldwide.
Breakfield listened to an interview with A. G. Riddle, who is also a techno-thriller writer. Riddle stated his opinion that we heartily agreed with; the Techno-Thrillers genre is an under-served market. His marketing and following are admirable, as well as what we are working to achieve. We released our first books in similar timeframes. During the interview, someone in the audience asked him what he preferred to read. His immediate response was technical thrillers and suspense.
In our professional careers, Breakfield and Burkey frequently research and comment on different technology elements. Burkey has a focus and passion for user experience. Breakfield is always scanning the technical horizon for new trends and technological evolution. When we find exciting and innovative shifts involving people, business, and technology, we pick out the elements we want for our books.
Cyber-crimes are desperately interesting because they are the economic weapons of war here in the 21 st century. Sovereign nations have their black ops teams trying to destabilize competing countries. The insidious criminal elements enjoying the challenges found outside of civilized boundaries lurking in the Darknet now apply university-level business models to their extortion efforts. There is a multitude of ghastly exploits to write about as a central focus for a story.
What is your approach to the latest novel, The Enigma Threat?
Artificial intelligence and machine learning are rampant. The direction of designers is to take these capabilities to new levels, and so they are funded to gain wide adoption fast. The Enigma Threat is based on A.I. and the guardrails that may or may not be in place by the creators. Questions of what is happening to the tsunami of information being gathered are only recently occurring. In our estimation, it is a little like closing the gate after the horse is out of the corral.
We want to be fair in relating our approach. We write thriller/suspense novels, with technology as the catalyst for creating conflict between the cyber heroes and the cyber thugs. You don’t need a voice, data, or networking engineering degree to understand the plot or feel our stories’ drama. Those who have a more technological background will notice the real-world impacts a little quicker.
In fictional writing, it is the storytelling that brings the reading value to people. As with most industries, there are information systems acronyms. We go out of our way to poke fun at the technology world by making up insanely funny acronyms to defuse the technobabble that permeates the high-tech world. These have resonated with readers and reviewers. One of favorite was the Kirkus review that highlighted POPTARTS in The Enigma Ignite. If you have not read it, POPTARTs is defined as Polymorphic Operational Programming of Technology to Aggregate Recurring Temporal Synergies. If you want to laugh, please check out our Concepts and Terms listed on our website, which states the book in which each term appears.
We have some choice ones within The Enigma Threat. Two of the favorites are PaaS, defined as porn as a service, and CESPOOL, defined as Cyber Elite Social Police for On-line Operations and Logistics. They genuinely have a place within the story too!
We look forward to your review of our Kickstarter campaign to start the screenplay efforts!
Connect and follow on Social Media:
LinkedIn: https://www.linkedin.com/in/charlesbreakfield and
BREAKFIELD AND BURKEY TOUR SHEET – THE ENIGMA THREAT
In the new digital world, there is no tolerance for privately owned supercomputers. Globally, computers are hunted and destroyed for the greater good, by the new cyber police CESPOOL. The information this group receives is manipulated by subversive hidden machine learning devices, the MAG running on the dark net.
Judith and Xiamara are freebooters who steal machine time for their PaaS, porn as a service business. The machine they chose for delivery is the last untapped supercomputer not in the hands of a sovereign. Their activity is spotted by the MAG, but the renegade R-Group steps in to alter the outcome. Leroy teams up with Zara to help these opportunists escape prosecution. They are drafted as reluctant participants in the fight.
Jacob and Quip are trapped in the Chihuahuan Desert trying to reconstruct the base of ICABOD’s logic core. The stress of their isolation is taking a toll. Their wives and children are safe in Brazil for the time being, but Interpol is prowling for answers.
The R-Group has assembled a way to communicate with orphaned satellites. While the next R-Group plans the ultimate honey pot to trap their nemesis who is driving their corrupted agenda. The odds are against R-Group’s success, but they have creative surprises on their side.
The stakes have never been higher. The R-Group young and old must rise to defeat the MAG.
Breakfield is a 25+ year technology expert in security, networking, voice, and anything digital. He enjoys writing, studying World War II history, travel, and cultural exchanges. He’s also a fan of wine tastings, winemaking, Harley riding, cooking extravaganzas, and woodworking.
Burkey is a 25+ year applied technology professional who excels at optimizing technology and business investments. She works with customers all over the world focusing on optimized customer experiences. She writes white papers and documentation, but found she has a marked preference for writing fiction.
Together they create award-winning stories that resonate with males and females, as well as young and experienced adults. They bring a fresh new view to technology possibilities today.
To follow along with the rest of the tour, please visit the authors’ tour page on the 4WillsPublishing site. If you’d like to book your own blog tour and have your book promoted in similar grand fashion, please click HERE. Thanks for supporting these authors and their work!