These authors are full-time technologists who write about emerging technologies and the growing threat of cybercrime, and share their predictions and visions of the future.
by Breakfield and Burkey
Breakfield and Burkey are full-time technologists who see tremendous technology inroads misused and weaponized depending upon who creates and executes the programs. For hundreds of years, across nations of the world’s diverse people, greed has played a role in how products are traded, consumed, and discarded. As storytellers, we focus on real technology as today’s cyber threats in our novels to alert folks that bad actors are ready to attack them from the dark net. The results are often unexpected, even when a follow-on investigation uncovers the plans that were in motion from the beginning.
To that end, we focus on the disturbing possibilities visible on our modern-day horizon with technology in the hands of the greedy and power hungry:
1: We envision someone will decide to commission a Global Cyber Police (GCP) force to patrol cyberspace around the planet. The global agency would likely consist of two distinct branches. The first is a back-office group trolling the Internet, hunting for bad actors. The second would be a physical team sent to collect the evidence and perpetrators for trial.
The GCP would be a strike team against cybercrime that propagates disinformation. One of the mandates of this group is to detect and intercept deep fake technology used to masquerade as a legitimate source of information. People need to feel confident that the leadership offering guidance is authentic.
Brilliant authors & free books direct to your inbox. Subscribe (for free) to get it all!
2: We have seen the rise of cyber bounty hunters across the digital landscape. We expect a pushback by some nations with the GCP entering the country and whacking bad actors operating from the dark net. Today, tracking software is available sophisticated enough to pinpoint your geolocation. The next stage would see rewards posted for persons of interest operating in countries that provide sanctuary for the bad actors.
We expect pushback from some nations with cyber police entering their countries and whacking bad actors operating from the dark net.
3: We expect to see the emerging technology of metaverse colliding with software gaming companies to produce a whole new way of delivering stories to the general population. We envision internet on-ramps for readers/gamers to enter stories as active or passive participants. This approach can provide story settings in a virtual existence that readers/players can join via augmented reality.
Visitors to the virtual world use cryptocurrencies and NFTs (non-fungible tokens), allowing the author to monetize their created worlds—ticket sales, souvenirs, avatars, etc. The metaverse is the next author publishing platform.
4: We believe the battle between cryptocurrency and standard fiat money will end in a draw. Cryptocurrency will inherit strict regulations to eliminate the Ponzi schemes foisted on an unsuspecting public, thus resulting in a similar status as fiat money. Both forms of currency will continue near-term interdependencies in the future. Neither has any intrinsic value, but cryptocurrency’s portability enhances a person’s financial strength if tied to fiat currency with the backing of a sovereign nation. Solid regulations governing cryptocurrency and legitimate digital to analog currency arbitrage will rise to a global standard. We expect independent cryptocurrency mixers to be outlawed or displaced by standard financial organizations.
We took elements of the above points into The Enigma Beyond as a foundation for artificial intelligence exploitation. The technology thriller steps into today’s world, where decisions are moving from people to machines. People seem oblivious to how quickly they are relinquishing their freedoms. The theme continues in the novel The Enigma Threat to a surprising outcome. Both stories explore cyber combat between humans and AI-enhanced supercomputers. Each side is determined to win while painting an uncomfortable future where we live and work today.
Breakfield is a technology expert in security, networking, voice, and anything digital. He enjoys writing, studying World War II history, travel, and cultural exchanges. Charles is a fan of wine tastings, winemaking, Harley riding, cooking extravaganzas, and woodworking.
Burkey is a technology professional who excels at optimizing technology and business investments. She works with customers all over the world focusing on optimized customer experiences. Rox writes white papers and documentation, but found she has a marked preference for writing fiction.
Together these Texas authors create award-winning stories that resonate with males and females, as well as young and experienced adults. They bring a fresh new view to technology possibilities today in exciting stories. You can connect with them on Facebook, Instagram, and Twitter. Learn more about the Enigma Series at their website.
Share this article! Select your favorite social site below: