(1) $25 Amazon Gift card & (10) e-book copies of the “shorts” in the Enigma Series
In the new digital world, there is no tolerance for privately owned supercomputers. Globally, computers are hunted and destroyed for the greater good, by the new cyber police CESPOOL. The information this group receives is manipulated by subversive hidden machine learning devices, the MAG running on the dark net.
Judith and Xiamara are freebooters who steal machine time for their PaaS, porn as a service business. The machine they chose for delivery is the last untapped supercomputer not in the hands of a sovereign. Their activity is spotted by the MAG, but the renegade R-Group steps in to alter the outcome. Leroy teams up with Zara to help these opportunists escape prosecution. They are drafted as reluctant participants in the fight.
Jacob and Quip are trapped in the Chihuahuan Desert trying to reconstruct the base of ICABOD’s logic core. The stress of their isolation is taking a toll. Their wives and children are safe in Brazil for the time being, but Interpol is prowling for answers.
The R-Group has assembled a way to communicate with orphaned satellites. While the next R-Group plans the ultimate honey pot to trap their nemesis who is driving their corrupted agenda. The odds are against R-Group’s success, but they have creative surprises on their side.
The stakes have never been higher. The R-Group young and old must rise to defeat the MAG.
4Wills Blog Tour Day 7
We wanted to share some of the feedback we have received. Also, we want to encourage you to leave a fair and honest review for all authors you read.
Breakfield and Burkey have received various reviews and comments. All our stories are reviewed by Kirkus along the way. Those comments have been positive. We also use portions of these on our Amazon pages and in social media. Overall, the comments have been positive. Other formal reviewers we solicit have picked out elements that are good as well as suggestions.
Individuals are those we pay a lot of attention to. Burkey looks at them and comments back in some cases. We appreciate the comments from people who hope the books will become a film or TV series. Many like specific characters. We have one reader who has kept up with the series and as one evil character evolved, she repeated indicated the character was vile. Many enjoy the series overall and comment as such.
We respect people who leave fair and honest reviews. However, we have found the anonymity of the Internet provides people a platform to vent behind a mask. This is the same for many social media exchanges. Rudeness is the focus, laced with meanness. Some have commented that the stories are not realistic. The technology is real and applied in a manner that may not be apparent in very day use in our digital world. It could be that their frame of reference is like someone who has just discovered the miracle products of Teflon and Velcro.
For better or worse, we have lived the technology evolution wave, so we have the knowledge and experience for the facts we embed in the stories. Some people simply don’t have our broad-based exposure to multiple technologies, some of which were surpassed by the newest shiny object. When some people do not understand something, it can embarrass them, so they attack to make it irrelevant. We suspect it is simply a different frame of reference.
The technology is the foundation of a story, but they truly are the struggles of the cyber good guys and gals versus the bad actors from the Darknet, who are also gender neutral. The Darknet is after all an equal opportunity employer. Technology has been a male dominated industry, but with programs like STEM more females are embracing this industry. Toward that we have strong female characters on both sides of the digital battlefield.
More than a few people have said that the stories we tell are all too frighteningly real. They ask what they might do to protect themselves against cyber thieves. In response to these requests, we point them to our cyber security health kit and provide some tips and tricks for people to protect themselves on line. We offer free tips and tricks sheets on how to build a good secure password, avoiding email phishing, and ways to avoid identity theft. You are welcome to email us Authors@EnigmaSeries.com if you are interested in learning more.
We like giving back to the community based on what we have witnessed over the years in the high-tech arena. We even have a free coloring book as a download with a cyber security quiz in the back of it as a fun exercise to make folks think. Our books are geared to an adult, but the coloring book is fine for children. It may help them learn as they become more connected in our digital playground.
We would also invite you to take a look at our Kickstarter campaign for The Enigma Threat. You can learn a bit more about us, watch the book trailer, and support our efforts to start down the path to a screenplay.
Meet The Authors
Breakfield is a 25+ year technology expert in security, networking, voice, and anything digital. He enjoys writing, studying World War II history, travel, and cultural exchanges. He’s also a fan of wine tastings, winemaking, Harley riding, cooking extravaganzas, and woodworking.
Burkey is a 25+ year applied technology professional who excels at optimizing technology and business investments. She works with customers all over the world focusing on optimized customer experiences. She writes white papers and documentation, but found she has a marked preference for writing fiction.
Together they create award-winning stories that resonate with males and females, as well as young and experienced adults. They bring a fresh new view to technology possibilities today.
Connect and Purchase Your Copy!
Connect and follow on Social Media:
LinkedIn: https://www.linkedin.com/in/charlesbreakfield and
To follow along with the rest of the tour, please visit the authors’ tour page on the 4WillsPublishing site. If you’d like to book your own blog tour and have your book promoted in similar grand fashion, please click HERE. Thanks for supporting these authors and their work!