4 minute read

Writing About Technology

Next Article
Mark Leslie

Mark Leslie

by Charles Breakfield and Rox Burkey

Breakfield and Burkey are full-time technologists who see tremendous technology inroads misused and weaponized depending upon who creates and executes the programs. For hundreds of years, across nations of the world’s diverse people, greed has played a role in how products are traded, consumed, and discarded. As storytellers, we focus on real technology as today’s cyber threats in our novels to alert folks that bad actors are ready to attack them from the Darknet. The results are often unexpected, even when a follow-on investigation uncovers the plans that were in motion from the beginning. To that end, we focus on the disturbing possibilities visible on our modern-day horizon with technology in the hands of the greedy and power hungry.

Advertisement

1: We envision someone will decide to commission a Global Cyber Police (GCP) force to patrol cyberspace around the planet. The global agency would likely consist of two distinct branches. The first is a backoffice group trolling the Internet, hunting for bad actors. The second would be a physical team sent to collect the evidence and perpetrators for trial.

The GCP would be a strike team against cybercrime that propagates disinformation. One of the mandates of this group is to detect and intercept deep fake technology used to masquerade as a legitimate source of information. People need to feel confident that the leadership offering guidance is authentic.

2: We have seen the rise of cyber bounty hunters across the digital landscape. We expect a pushback by some nations with the GCP entering the country and whacking bad actors operating from the Darknet. Today tracking software is available sophisticated enough to pinpoint your geolocation. The next stage would see rewards posted for persons of interest operating in countries that provide sanctuary for the bad actors.

3: We expect to see the emerging technology of Metaverse colliding with software gaming companies to produce a whole new way of delivering stories to the general population. We envision Internet on-ramps for readers/gamers to enter stories as active or passive participants. This approach can provide story settings in a virtual existence that readers/players can join via Augmented Reality.

Visitors to the virtual world use cryptocurrencies and NFTs (NonFungible Tokens), allowing the author to monetize their created worlds—Ticket sales, souvenirs, Avatars, etc. The Metaverse is the next author publishing platform.

4: We believe the battle between cryptocurrency and standard fiat money will end in a draw. Cryptocurrency will inherit strict regulations to eliminate the Ponzi schemes foisted off on an unsuspecting public, thus resulting in a similar status as fiat money. Both forms of currency will continue near-term interdependencies in the future. Neither has any intrinsic value, but cryptocurrency›s portability enhances a person›s financial strength if tied to fiat currency with the backing of a sovereign nation. Solid regulations governing cryptocurrency and legitimate digitalto analog currency arbitrage will rise to a global standard. We expect independent cryptocurrency mixers to be outlawed or displaced by standard financial organizations.

We took elements of the above points into The Enigma Beyond as a foundation for artificial intelligence exploitation. The technology thriller steps into today’s world, where decisions are moving from people to machines. People seem oblivious to how quickly they are relinquishingtheir freedoms. The theme continues in the novel, The Enigma Threat, to a surprising outcome. Both stories explore cyber combat between humans and AI-enhanced supercomputers. Each side is determined to win while painting an uncomfortable future where we live and work today.

Read our featured book, The Enigma Beyond.

Can the R-Group Terminate the Poisoned Supercomputers in Time?

US Congressional leaders are investigating the technology stronghold of the MAG leaders. It may be too late. MAG has geopolitical ambitions using artificially intelligent supercomputers to control politics, social media, finances, healthcare, and military defenses across the world.

Jacob, Petra, and other key members of the R-Group, including ICABOD find evidence of extensive and deadly cover ups by unknown culprits.

Now they’re forced to use the current crisis to train their next generation of cyber savvy techno geeks against the AI cyber threats infused into every aspect of human life.

With all that the R-Group youth have been taught, will it be enough to unravel the mystery involving the US and Chinese defense space stations? Will the R-Group find the solution before humans become servants?

CONNECT AND FOLLOW ON SOCIAL MEDIA:

Tech·nol·o·gy (tek’näl je) is Today’s weapon of choice….

Breakfield is a technology expert in security, networking, voice, and anything digital. He enjoys writing, studying World War II history, travel, and cultural exchanges. Charles is a fan of wine tastings, winemaking, Harley riding, cooking extravaganzas, and woodworking.

Burkey is a echnology professional who excels at optimizing technology and business investments. She works with customers all over the world focusing on optimized customer experiences. Rox writes white papers and documentation, but found she has a marked preference for writing fiction. Together these Texas authors create award-winning stories that resonate with males and females, as well as young and experienced adults. They bring a fresh new view to technology possibilities today in exciting stories. Visit their website for more information and free stuff.

LinkedIn: www.linkedin.com/in/charlesbreakfield and www.linkedin.com/in/roxanneburkey Twitter: @EnigmaSeries and @1rburkey Facebook: www.facebook.com/TheEnigmaSeries/ YouTube: www.youtube.com/channel/ UC6Vz4x5ctTnx3yUhZk1OJkw Pinterest: www.pinterest.com/enigmseries/ Instagram: www.instagram.com/enigmabookseries/ Email: Authors@EnigmaSeries.com Website: www.EnigmaSeries.com/ Blogs: EnigmaSeries.com/the-enigmachronicles/category/blog-statement/ https://wwww.RoxBurkey.com

This article is from: