Writer - Inventor - Technologist
          KeyMail, Blackpool, UK.      

TALKS / BOOKS / DESIGNS: 2015 - 2016

My new book: Absolute Security: Theory and Principles of Socially Secure Communication, is available on Amazon ($ 13.99).

[ 174 pages, 6*9 inch paperback. ISBN: 978-1523408061 ]

Absolute Security

Theory and Principles of Socially Secure Commuication

Outlined is a new philosophy of Absolute Security for digital information sharing; and developed is the fundamental theory of ‘socially secure communication’. The subject at hand is the safe transfer of meaning between individual human beings - using networked computers. Clarified are terms, concepts and principles related to the secure communication of private ideas / thoughts / concepts / datum(s) - and in a format easily digestible by non-technical people.

Why Security is All About Copies
Aetiology of a Secure Network
Building Actor Coherent Defences
Primary Network Design
Encryption Theory
The Beholder's Share
Bigger Brain versus Stealth
Security and Privacy: The Big Picture
Theory of Absolute Security
Real Life Scenarios

Absolute Security (174 pages) is available from Amazon; and has 28 illustrations.

REVIEWS for Absolute Security

Review by Bill Montgomery - CEO Connect In Private Corp.

ABSOLUTE SECURITY: THEORY and PRINCIPLES of SOCIALLY SECURE COMMUNICATION should be considered required reading for anyone focused on secure and private communication.  In this book, Alan Radley makes sense of the complexities which ordinarily restrict this topic to IT people only.  What’s more, Alan’s no-nonsense approach and fearless honesty, is refreshing.  I recommend this to everyone who is interested in making certain that their communication is more private, secure and resilient. - Bill Montgomery (23/01/2016)

Review by Vic Hyder - Chief Strategy Officer - Silent Circle (Commander U.S. Navy, retired) - Founding Member - Silent Circle (Blackphone).

Excellent read! Succinct and accurate on a subject that normally wanders into tangential discussions confusing and diffusing the goal. Radley breaks down today’s hottest topic in a way that provides reference to students as well as guidance to the more learned. Absolute Security will give you an optimistic understanding that, even in an ever-increasing world of digital surveillance and criminal threats,  “… absolute security is eminently achievable.

Thank you again for the opportunity to pre-read Absolute Security. I found it spot on and a fine addition to the body of work on cyber security but specifically to the discussion of privacy within communications. We created Silent Circle in 2012, with Phil Zimmermann, Jon Callas, and Mike Janke to provide a simple yet absolutely secure solution to this increasingly difficult problem. Your breakdown of what is required to achieve absolute security is reflective of the efforts we have made over the past few years. I see this short book as a reference document for students studying cyber security as well as an excellent read for CTOs, CSOs, CISOs, and CEOs laboring over how to analyze their needs for increased security. Absolute Security allows you to hit the highlights or dive deeper into the subject with your many charts, diagrams, and glossary of terms. Well done.  - Vic Hyder (29/01/2016)

Review by Professor Richard Benham - Professor in Residence, UK National Cyber Skills Centre, Visiting Professor of Cyber Security Management, University of Gloucestershire, University of Staffordshire and Coventry Business School.

As cyber education evolves to meet the pace of change in our digital world so does the need for good reference books. Absolute Security is a timely and spot on publication that I shall be recommending to my students; well done Dr Radley. - Richard Benham (1/2/2016)

Review by Christian Rogan - Vice President, Business Development, Royal Holloway, University of London.

Absolute Security: Theory and Principles of Socially Secure Communication; this book is a very concise body of work, that belies its length for the practical application of useful data in a highly complex area. Beyond its obvious sage advice with working diagrams and imparted wisdom I particularly like the implied moral assertion that the state undermining best IT security practice is to the detriment of all. Further this should be required reading for anyone providing third party services whereby their security claims cannot be held up without transparency. Ignore this work at your peril. - Christian Rogan (3/2/2016)

Review by Professor John Walker - Hexforensics (Digital Expert Witness) - Visiting Professor at Nottingham Trent University.

This is a unique piece of work which correctly recognises the socio-economic implications of modern day embracement, and dependency on technology, and the ever present interface between man-and-machine. The book provides the reader with an accurate and objective view of the life-cycle of the exposures and vulnerabilities which are associated with the technological shadow cast over all individuals, and organisations. As an Expert Witness in the discipline of Digital, this publication also provides very useful descriptions in ‘people-speak’ and includes very accurate definitions of the complex, transposed into understandable terminology. This is an excellent read, and deserves a place on every security professional’s bookshelf who is seeking a balanced and objective of the current, and futuristic Cyber Security Landscape. - Professor John Walker (4/2/2016)

Review by Vitali Kremez - CISSP (A), CEH, CFE, CNDA, C-CPA - Cybercrime Investigative Analyst, New York District Attorney's Office.

In “Absolute Security: Theory and Principles of Socially Secure Communications”, Dr. Radley exhibited an extraordinary passion for cybersecurity and privacy in the mold of the principles that conform to secure and just society. In a world full of privacy breaches, Radley timely develops a framework that delves into complexity of technical and human-centric factors that affect our perception of privacy and cybersecurity. I recommend this book to everyone who is interested in making our cyber world more secure. - Vitali Kremez (6/2/2016)

Review by Michael Lester - MSEE, MBA, CIPP/US, CISM - Chief Information Security Officer, Magenic.

It is not very often that one is exposed to a work that is truly ground breaking in a field, but “Absolute Security” is one of those works. Rather than expounding on the implementation of security as many do, Dr. Alan Radley astutely asks (and then suggests an answer for) the rather naive, yet deceptively complex question “What is security?”, or more precisely “How does one characterize a communication system that provides secure (private) data transfer?

As Dr. Radley examines this question, the reader becomes aware that the answer is much more elusive than one first assumes. As Dr. Radley builds a working compendium of definitions needed to examine the issue, the reader becomes more and more aware that the current vernacular is insufficient for discussing secure communication at a philosophical level, and if we cannot agree on what it means to be secure or private in thought, how can we accomplish it in act? It is here, laying the foundation of formal definition of socially secure communication, that Dr. Radley’s work “Absolute Security” is groundbreaking and will no doubt be referenced by many works to come. - Michael Lester (23/2/2016)

Review by Arno Brok - Chief Executive Officer, Australian Information Security Association.

For someone with over 20 years in IT Security and almost 40 years in ICT it is invigorating to read a book that introduces terminologies that would resonate with the academic world and is not burdened with technical jargon. Reading Absolute Security also raises optimism that as an industry we have a chance in the imbalanced battle against cyber criminals. This also means that the statement ‘there is no such thing as 100% secure’ might be proven wrong.   An excellent read and would definitely recommend this to our AISA members as a read to get a different perspective on security. - Arno Brok (21/3/2016)

Review by Pantazis Kourtis - Member of the Board of Directors at London Chapter at ISACA.

Absolute Security is a brilliant book! Did it make me wiser? I say it did, however, it depends on the angle you are reading it from, your expectations and probably your background. You cannot suspect what is coming when you start reading. Definitely a very interesting approach on Information Security. One thing is for certain, this piece of work is not for the light-hearted. - Pantazis Kourtis(21/3/2016)

My new book: Self as Computer, is available on Amazon ($ 25).

[ 400 pages, 8*10 inch paperback, 1000 illustrations. ISBN: 1499171609 ]

Self as Computer

Blueprints Visions and Dreams of Technopia

In Self as Computer, Alan Radley looks at the computer not as a tool, or as a bicycle-for-the-mind, but simply as self. He argues that humans are becoming so enmeshed with the computer, in terms of how we think, act and communicate; that soon it may no longer be possible to identify where the self ends, and the computer begins, and vice-versa. Predicted by some, are marvellous benefits for technology; in terms of enhancements to our social, creative and personal lives.

But already clear, is that not all of the associated problems lie in the realm of speculation. One example, is that the Internet is moving ever further away from the free and open system as foreseen by its original designers; whereby citizens are routinely censored, hacked and/or spied upon. Other questions arise; such as who builds today’s systems, and in what sense(s) are they useful, humane or democratic?

Explored are human-friendly designs for the computers of tomorrow, whereby the wishes, plans and actions of society may be aligned to benefit all.

Emerging Self-Computer
Hyper-Media / Hyper-Thoughts
Augmented / Virtual Realities
Cyborgs, Robots and Automata
Surveillance / Hacking / Privacy
Artificial / Simulated Intelligence
Natural + Machine-Implanted Thoughts
World-Brain + Freedom of Thought / Action
3D User Interfaces / Wearables + Smart-Things
Mechanised-Dystopia / Technopia + Techno-rights
Ethical, Moral and Spiritual dimension(s) of Computers

Self-as-Computer (400 pages) is available from Amazon; and has 1000 illustrations.

REVIEWS for Self as Computer

Review by Dr Kim Veltman

This is a bold and important book. It is a new attempt to develop the idea of a World Brain: to offer theoretical rationales, practical criteria and guidelines for the creation of a Universal Library entailing nothing less than a reorganisation of all knowledge. Traditional visions (The Library of Babel, The Universal Library) were mainly updated versions of the Library of Alexandria. Radley’s vision is about much more: the creation of contextualised ideas, circuits of thoughts. Outlined are techno- rights, which make visible the thoughts, opinions, insights of everyman, and thus transform the vision of freedom of thought as outlined in the U.N. Declaration of Human Rights. The utilitarian goal is a new Internet: a technopia that will benefit the whole of humanity, rather than specific companies, interest groups and individuals.

This is not, as its title could suggest, simply another techno-optimist book by a scientist promising that computers offer a simple panacea to everything. On the contrary, it traces how early visions of networked knowledge (e.g. Otlet, Engelbart, Nelson) were narrowed into an Internet and World Wide Web which, although popular, preclude a systematic access to thoughts, ideas, knowledge as foreseen in this vision. It is often said: if it ain’t broke, don’t fix it. This book explores an implicit corollary. If the system has too many broken links, then we need to start again from scratch and build a new system. This entails creating a new mechanical device. But the larger vision is that this device will improve human thinking methods.

Part of the narrowing that has occurred in the past half century has been driven by the computer science community, especially the AI faction, whose claims concerning artificial intelligence, machine thinking, autonomous computing, continue to inspire visions of mechanical intelligence competing with and/or replacing human intelligence (transhumanism, post-humanism, cf. the predicted Singularity). Radley offers a radically different vision where man remains the master and computers are the tools, servants of man-made visions. To establish this, three chapters are devoted to the self, ideas and thinking, offering a telescoped history of Western philosophy from Plato and Aristotle to the present. Two chapters outline the limitations of current computers and machines. Further chapters outline emerging potentials of user interfaces, cyberspace, virtual reality and robots.

The central vision is of a World Brain, with circuits of thoughts leading to a city of thoughts and ultimately technopia. The author acknowledges that these are linked with dreams of utopia, but is also careful to outline competing dystopian visions. The margins are lined with c. 1,000 illustrations, which offer a visual account of these utopian and dystopian possibilities: ranging from comic strip cartoons and historical diagrams to numerous illustrations of patented devices. It ends with a Universal Declaration of Human- Techno Rights, a Technopian Manifesto and 10 Commandments for humans to computers. The media are filled with articles about how computers are revolutionising the world. Radley’s book suggests that the real revolution has yet to begin. It catalogues numerous dangers, but ultimately it is a paean of hope in and for human freedom.

Kim H. Veltman, 2015.

Professor Kim Veltman is a member of the International Who's Who of Professionals. In 1996, he was awarded the International Capire Prize for a Creative Future in the area of science and art integration. In 1998, he received a Learning Partnership Award (Toronto) and a Prix des Initiatives from Université d’été de la Communication (Hourtin). In November 2009, he was awarded a Silver Order: “Service for the Arts”, International Academy of Culture and Art (Moscow). In January 2015, Kim was awarded a World Media and Library Leaders Lifetime Achievement Award by the Satija Research Foundation for Library and Information Sciences (University of Delhi); and for his work as a 'Thinker, Researcher, Media Expert, Webologist, Linguist, Anthropologist, Science Historian and Art Connoisseur' and for his 'Dedication to Knowledge Organisation and Outstanding Scholarship'.

Books authored by Dr Kim Veltman ...
[1] The Alphabets of Life (2014).
[2] Understanding New Media;Augmented Knowledge and Culture (2006).
[3] Leonardo da Vinci Studies I: Linear Perspective and the Visual Dimensions of Science and Art (1986).
[4] Leonardo's Method (1993).
[5] Frontiers in Conceptual Navigation for Cultural Heritage (1999).
You can read more about Kim's work here.


Keynote talk: Collecting, Linking, Representing, Storing, Seeing and Accessing all of Humanities Vision(s), Action(s) and Thought(s): Building the World Brain at the Third International Conference on Multimedia, Scientific Information and Visualisation for Information Systems and Metrics. Malaga, Spain. January 26-28, 2016.

Keynote talk: KeyMail: An Enterprise Privacy Mail Platform built from the ground up for Absolute Security at the Fourth International Conference on Horizons for Information Architecture, Security and Cloud Intelligent Technology. Sanremo, Italy. January 6-8, 2016.

Keynote talk: Atomic and Hyper-Networks, Knowledge Growth, Quality (Depth, Connectivity & Breadth), Evolution, Truth and Hopeful Prospsects for Human Destiny at the Fifth International Conference on Software and Emerging Technologies for Education, Culture, Enetrtainment, and Commerse (SETECEC 2016); and New Directions in Multimedia Mobile Computing, Social Networks, Human-Computer Interaction and Communicability. Venice, Italy. March 29-31, 2016.

Keynote talk: Atomic and Hyper-Networks, Natural-Thoughts and Open Publication: The Last Best Hope(s) for Freedom, Democracy and Sanity in the Age of Hacking, Newspeak, Double-Think, Black-Thoughts, Mini-Think and All-Pervasive State Surveillance at the International Conference on New Technologies, Editorial and Business Publishing. Toronto, Canada. July, 2016.


Keynote talk: Circuits of Thought at the International Conference on Multimedia, Scientific Information and Visualization for Information Systems and Metrics. Andalucina, Malaga, January 28, 2015.

Keynote Talk: Efficient and Effective Thought-Spaces at the International Conference on Software Technologies for Education, Culture, Entertainment and Commerce. Venice, March 11.

Keynote Talk: Computers, Self and the Global Village at the International Symposium on Communicability and Innovative Design for Interactive Systems. Madrid, Spain, May 29, 2015.

Keynote Talk: Private, Secret and Open Thoughts; Atomic Networks, and the Ethical, Spiritual and Moral Dimensions of Computers, at the Third International Conference for Information Architecture, Security and Cloud Intelligent Technology. Sanremo, Italy, 0-10 July, 2015. Sanremo, Italy, 9-10 July, 2015.

Keynote Talk: Humans versus Computers, Systems and Machines: A Battle for Freedom, Equality and Democracy, at the Sixth International Workshop on Human-Computer Interaction, Tourism and Cultural Heritage. Ravenna, Italy, 22-24 September, 2015. [pdf]

Keynote talk: Reflexive, Pro-Active and Creative Free-Will: Prospects and Evidences for Artificial, Simulated and True Intelligence in Computers/Systems/Machines, at the International Conference on Research and Development in Imaging, Nanotechnology, Industrial Design and Robotics. Cordoba, Argentina, November 20-21, 2015.


Keynote talk: Self as Computer, at the International Symposium on Communicability and Innovative Design. Venice, May 23, 2014. [pdf]

Keynote talk: Electric Men, at the International Conference on Information Architecture, Cloud & Security. Rome, July 28, 2014.

Keynote talk: Natural-Thoughts, Freedom and Atomic Networks.
Fifth International Workshop in HCI, San Marino, Italy, Sept 15. [pdf]

Keynote talk: Machine Implanted-Thoughts. Fifth International Conference on New Technologies, Cordoba, Argentina, Nov 10.


KeyMail is a new type of P2P electronic mail. Here messages (+ files) are sent directly from one USB key-drive to another.

KeyMail is a new kind of electronic mail that protects - high-value - and confidential items. We all have secrets of one kind or another - ideas / information that we just can’t risk falling into the wrong hands. And sometimes we wish to share our secrets with trusted friends, and without any chance of surveillance and / or outside interference. KeyMail is a private mail system that lets you share digital secrets (messages and files) with absolute security - and true piece of mind.

KeyMail is not a replacement for email, but is for those occasions when you wish to send files / folders to partners safely - and without any possibility of hacking, spying or compromised data. It’s a bit like a digital FAX - because both parties must be on- line together (c.f. Skype) - and the files are transferred device-to-device.

KeyMail is an impregnable counter-espionage / anti-surveillance measure; and is perfect for safeguarding Intellectual Property (IP), financial data, blueprints, media files, legal contracts; and for defending commercially private: messages, documents, reports, designs, plans, records, bids.

In all likelihood, file-sharing creates major risks for you and your business. When you send a file to someone using email or the cloud; you always get organisation copies, transfer copies, cloud copies etc. And all of these copies are vulnerable to hacking - potentially forever.

KeyMail avoids copies altogether with its single-copy-send and multi-encryption; whereby files transfer directly from one computer or USB key / thumb-drive to another (via our special servers).

No copies = no hacking chances = absolute security. Read more...


Author of two chapters in: Blue-Herons Computing Handbook: Strategies for a Creative Future with Computer Science, Quality Design and Communicability. [2014]

Author of chapter: "Natural Thoughts, Freedom and Atomic Networks" in: Blue-Herons Computing Handbook: Interactive Information Quality in Expanding Social Network Communications. [2015]

Co-Editor of : Blue-Herons Computing Handbook: New Challenges in Computer Graphics, Robot Vision, Visual Interfaces and Information Sciences. [2015]

> datasheet [pdf]