Welcome to Day 9 of “THE ENIGMA THREAT” Release Blog Tour! @enigmaseries @1rburkey @4WillsPub @4WP11 @RRBC_Org #RRBC

I’m delighted to Welcome Breakfield and Burkey to Day 9 of “THE ENIGMA THREAT” Release Blog Tour! @enigmaseries @1rburkey @4WillsPub @4WP11 @RRBC_Org #RRBC

Please leave a comment to win:

(1) $25 Amazon Gift card

(10) e-book copies of the “shorts” in the Enigma Series

I invited my guests to introduce themselves and their book to you.

We want to talk about our inspiration for writing.

The paradox about being a writer is that you must be a reader as well. Inspiration for Breakfield and Burkey comes from the daily consumption of written words for work and pleasure, as well as thoughts from other writers and podcasters. 

Each of us receives a daily stream of material for blog posts, correspondence from colleagues, technical presentations from vendors, and books from other authors. We read, listen, and see a great deal of material during our work week. We use these three media types then aggregate the data onto the idea conveyor belt that feeds our imaginations. Current events from streaming media, voice actor audio reviews, reading reviews on our work, and non-technical publications discussing world economics or security are all excellent sources of ideas for our storylines.

Each of these informational feeds provides a level of research snippets into the real world. These are not like deep-dive research with cross-checking you might require for a historical novel, but they often capture our imaginations and drive us to research further. This is especially true with emerging technologies we are exposed to for solving our customers’ problems. 

A perfect example of real-world input that impacts one of our novels was the buzz around cryptocurrencies, built on the underlying blockchain technology. This is a complex subject that is applied in multiple ways. However, we were interested in all the speculation of the various currencies, which made us do some more in-depth research into the history of it and how each operates.

As this was in progress, we started looking at the vulnerabilities blockchain has around cryptocurrency applications.  Finally, we explored how their adoption in different locations around the world would affect our global economy.  After we completed that research, we launched into the fictional aspects of what could happen when the cyber bad guys drive toward their specific agenda of power and greed. 

We then took this research a step further to create an intriguing story of competing cryptocurrency providers. We introduced bad actors from the Darknet that had motives of corruption, power, greed, and control. Voilà, you have the concept of our TechnoThriller, story The Enigma Source.  See how easy that was? J

Admittedly cryptocurrency is an easy technology to find greed lurking nearby. Money and materialism tend to work together. The whole focus of artificial intelligence and machine learning captured our attention as more vendors were offering solutions with those technical capabilities at the foundation. The promise of we’ll do that for you sounds the alarm bells in our minds. The evolution of technology takes aspects and then builds upon them to be more and do more.

Machine learning is best accomplished with oodles of data to learn from. We have that in bulk with social media today. Think about the content of social media. If this is being used as the classroom for artificial intelligence, what is it learning? If the computer creators using these capabilities goals are misaligned to societal norms, then the end game could be unexpected.

We took this as the foundational basis for our newest story, The Enigma Threat. This book has cyber heroes battling cyber thugs from the Darknet, both with supercomputers as resources doing their bidding. It is a battle of wits from machines, some have guardrails, and some do not. You’ll need to read to learn all the details or listen as the ebook, paperback, and audible will be available on January 8th, 2021. We also have launched a Kickstarter campaign to help start work on a screenplay for this book. We invite you to check it out to support or share it with your friends. The campaign has additional information about the story and a book trailer you might enjoy.

Make no mistake, we are inspired by the world around us and the technology we use to live, work and play.

Book Information

BLURB:

In the new digital world, there is no tolerance for privately owned supercomputers. Globally, computers are hunted and destroyed for the greater good, by the new cyber police CESPOOL. The information this group receives is manipulated by subversive hidden machine learning devices, the MAG running on the dark net.

Judith and Xiamara are freebooters who steal machine time for their PaaS, porn as a service business. The machine they chose for delivery is the last untapped supercomputer not in the hands of a sovereign. Their activity is spotted by the MAG, but the renegade R-Group steps in to alter the outcome. Leroy teams up with Zara to help these opportunists escape prosecution. They are drafted as reluctant participants in the fight.

Jacob and Quip are trapped in the Chihuahuan Desert trying to reconstruct the base of ICABOD’s logic core. The stress of their isolation is taking a toll. Their wives and children are safe in Brazil for the time being, but Interpol is prowling for answers.

The R-Group has assembled a way to communicate with orphaned satellites. While the next R-Group plans the ultimate honey pot to trap their nemesis who is driving their corrupted agenda. The odds are against R-Group’s success, but they have creative surprises on their side.

The stakes have never been higher. The R-Group young and old must rise to defeat the MAG.

Video Teaser

About the Authors

BIO:

Breakfield is a 25+ year technology expert in security, networking, voice, and anything digital. He enjoys writing, studying World War II history, travel, and cultural exchanges. He’s also a fan of wine tastings, winemaking, Harley riding, cooking extravaganzas, and woodworking.

Burkey is a 25+ year applied technology professional who excels at optimizing technology and business investments. She works with customers all over the world focusing on optimized customer experiences. She writes white papers and documentation, but found she has a marked preference for writing fiction.

Together they create award-winning stories that resonate with males and females, as well as young and experienced adults. They bring a fresh new view to technology possibilities today.

Contact the Authors

Email:            Authors@EnigmaSeries.com

Website:       www.EnigmaBookSeries.com

Blog:              https://EnigmaBookSeries.com/the-enigma-chronicles/category/blog-statement/

Connect and follow on Social Media: 

LinkedIn:      https://www.linkedin.com/in/charlesbreakfield  and

https://www.linkedin.com/in/roxanneburkey

Twitter:        https://twitter.com/EnigmaSeries  

and https://twitter.com/1RBurkey

Facebook:    https://www.facebook.com/TheEnigmaSeries/

YouTube:           https://www.youtube.com/channel/UC6Vz4x5ctTnx3yUhZk1OJkw

Pinterest:     https://www.pinterest.com/enigmseries/

Instagram:    https://www.instagram.com/enigmabookseries/

Bublish:         https://bublish.com/author/breakfieldandburkey

RRBC:            https://ravereviewsbookclub.wordpress.com/about-breakfield-burkey-enigmaseries-rrbc-rrbc_community/

To follow along with the rest of the tour, please visit the authors’ tour pageon the 4WillsPublishing site.  If you’d like to book your own blog tour and have your book promoted in similar grand fashion, please clickHEREThanks for supporting these authors and their work!

41 comments

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.