New Post

Deborah Swift

Breakfield and Burkey have added another tantalizing story to their Enigma Series, the plot of which is scary for the modern computer world.

In the new digital world, there is no tolerance for privately owned supercomputers. Globally, computers are hunted and destroyed for the greater good, by the new cyber police CESPOOL. The information this group receives is manipulated by subversive hidden machine learning devices, the MAG running on the dark net.

Judith and Xiamara are freebooters who steal machine time for their PaaS, porn as a service business. The machine they chose for delivery is the last untapped supercomputer not in the hands of a sovereign. Their activity is spotted by the MAG, but the renegade R-Group steps in to alter the outcome. Leroy teams up with Zara to help these opportunists escape prosecution. They are drafted as reluctant participants in the fight.

Jacob and Quip are trapped in the Chihuahuan Desert trying to reconstruct the base of ICABOD’s logic core. The stress of their isolation is taking a toll. Their wives and children are safe in Brazil for the time being, but Interpol is prowling for answers.

The R-Group has assembled a way to communicate with orphaned satellites. While the next R-Group plans the ultimate honey pot to trap their nemesis who is driving their corrupted agenda. The odds are against R-Group’s success, but they have creative surprises on their side.

The stakes have never been higher. The R-Group young and old must rise to defeat the MAG.

Caption here

Review by Linda Pirtle

Rox Burkey and Charles Breakfield have added another tantalizing story to their Enigma Series, the plot of which is scary for the modern computer world. The Enigma Threat harkens one’s memories of Orwell’s 1984, a science fiction story in which a totalitarian state governed a person’s thoughts and beliefs.  In Orwell’s book, cameras were used to spy on people, and friends would turn on each other in order to self-preserve.

Today, cameras are on practically every street corner as well as standard security devices for homes. And these innovative devices are governed by computers. There are very few people today who do not possess either a computer or a smartphone. Online shopping, banking, investing have all become the norm. This concept is exhibited in a conversation between two representatives of those who want to rule the world. G tells A “do not be despondent because they are not buying enough. We have put instant gratification into everyone’s hands with a smart device. We own them.”

In Burkey’s and Breakfield’s Enigma Threat, surveillance by supercomputers threatens individuality of thought and actions. However, there are always those in a society who will rebel against tyranny. A group of computer geeks in The Enigma Threat do just that.  Xiamara, Zara, Leroy, and Judith are led by JJ. They are in the process of mounting “storage towers in a particular order” with each one “linked to semi-master controllers which are in turn re-linked to other storage towers and their semi-master controllers. . .”

Mount Washington from Intervale, NH

When Judith complains about the complexity and danger of their plan, JJ’s response reaffirms the importance of their mission. “When the Nazis came to power in Germany in 1932, there was still law and order. The following year, Hitler came to power which started the inexorable loss of civil liberties, persecution of non-aligned political groups, and unjust laws skewed against anyone who wasn’t a Nazi believer.  . . Now, here we are again, bad laws being passed to insulate those who have usurped power. Those of us on the run, who intend to fight back against tyranny, are in the minority.”

Burkey and Breakfield use clever acronyms throughout the story. One example is CRUSH (Cyber Retribution Unleased Signifying Holocaust). The page-turning events of The Enigma Threat hold the reader’s attention as he/she roots for justice in a world ruled by supercomputers and robots.

Please click HERE to find The Enigma Threat on Amazon.

Related Posts