Welcome to the Science Of Cybersecurity—where we establish the first founding principles of a new science of Information Security.

Cybersecurity is impossible to develop as a logical subject of study—without first establishing an observational science that identifies what we are dealing with in the first place. Ergo, we become able to know what kinds of phenomena to look for, measure, model and control.

Accordingly, we seek to establish a foundational framework for the entire field of Information Security; and by means of logical, integrated and holistic perspective(s)—combined with use of the scientific method. Whereby our new Cybersecurity science—must be—above all—a science that focusses on definition, classification, axioms and establishing taxonomies of threats and effective countermeasures.

KeyMail Technologies

This site is administered by KeyMail Technologies. The KeyMail team includes scientists, engineers, and developers who posses a shared vision of providing Absolute Security for private and secret information online.

Together, our team is committed to developing the most secure, fastest, easy-to-use and widely distributed security tools necessary to fully protect data online. Our team combines proven mathematical, scientific and technical knowledge; and includes expertise obtained from many years working with/for: NASA, General Dynamics, SAIC (NSA), MOD, British and American Governments, Raytheon Systems, British Aerospace, plus Secret National Organisations in the US and UK etc.

Alan Radley – Founder and CEO

Alan Radley is the founder and chief editor of; and he is the CEO of KeyMail Technologies.

Alan holds a Ph.D. in Physics from University College London, and he has worked as a Senior Research Scientist plus Lecturer at NASA / ESA, University College London and General Dynamics. He has given private security briefings to the Secretaries of Defence of both the United States and United Kingdom, and also advised the CEOs of organisations such as General Dynamics, British Aerospace, Raytheon Systems and SAIC (NSA).

Alan is a regular public and keynote speaker, and he has taught over 500 students on undergraduate and postgraduate courses in physics, astronomy and computing. Alan holds 1 granted patent, and has several others under development. He serves on a number of scientific committees for the International Association of Interactive Communication. Alan has been a member of 60 professional organisations; and he has attended over 100 scientific / technology conferences and meetings worldwide (often as a presenter / keynoter).

Alan has been a co-author / co-editor of 5 handbooks on computing (he is a member of the Editorial Advisory Board for Blue Herons Computing Editions); plus he is a member of the scientific committee for the international Alaipo conferences in Italy and Spain and the CCGIDIS Communicability Symposia.

Alan is the author of several books including in 2017 the well-received “Science Of Cybersecurity”, and in 2015 the encyclopaedic ‘Self As Computer’.

Chris Green 

Chris Green is chief technologist at KeyMail. Chris has worked as a senior engineer at British Aerospace and General Dynamics, where he has co-invented products such as the Datastick, being a next-generation information fusion user interface used today by the MOD and various Intelligence Services in the US and UK.

Chris has held the very highest security rating in the UK – including Top Secret.


This site is based on the 2018 book: ‘The Science Of Cybersecurity: A Treatise On Communications Security”; which grew out of the “Absolute Security Bulletins” first published in 2015 on LinkedIn.



The Science Of Cybersecurity

A Treatise On Communications Security

How can we characterise Cybersecurity? How do data breaches, hacks, system exploits and computer intrusions happen – and why? What occurs when Cybersecurity really works effectively, and can we systemise it? Or will the clever hacker always break into any networked device, sweeping all defences aside?

On a quest for insightful answers in this ground-breaking book, Dr Alan Radley proceeds to completely deconstruct, rationally analyse, meticulously rebuild and then sanely reassess the entire field of Cybersecurity.

A rigorous scientific methodology is applied to networked system design, leading to a comprehensive new model – and accurate taxonomic tree – of all possible types and classes of cyber attacks and associated countermeasures. The upshot is a wholly original, astute and fearlessly honest – yet practically oriented – treatise on Cybersecurity.

Outlined here for the first time is a logical explanation of the fundamental theory and principal axioms of Cybersecurity as developed from first principles, and in a format ideally suited to both – the engineering-minded professional – and the less technically-oriented.

You can purchase “The Science Of Cybersecurity” on Amazon.

List of Contributors / Reviewers

‘The Science Of Cybersecurity’ has been approved (and contributed to) by over 100 prominent cybersecurity experts, and most are listed below.

Especial thanks to Professor Kim Veltman, Professor Francisco V. Cipolla-Ficarra, Nigel Pugh, Ruth Grundy, Chris Green, Bill Montgomery, Frank Rowland, Vic Hyder, Ross Johnson, Richard Vizor, Michael Krausz, Julian Cordingley, Eugene Panferov, Christian Rogan,Vitali Kremez, Professor John Walker, Sean McGurk, Ahmed W, Troels Oerting, Kent Schramm, Peter E. Sand, Dr Merrick S. Watchorn, Richard Stiennon, Daniel McGarvey, Bruce Roberts, Ricardo Baretzky, Kevin T. McDonald, Jim O’Conner, Jonathan Trull, Marcus H. Sachs, Subrahmanya Gupra Boda, Ross Johnson, Sunil Varkey, David Jordan, Pantazis Kourtis, Benoit Piton, Graham Thompson, Martin Lee, Utkarsh Sinha, Dr Rizwan Ahmad, Laszlo Dellei, Ratan Jyoti,Tony Robinson, Ido Naor, Anthony Scarola, Stuart Naisbett, Anand R. Prasad, Kevin Hickey, Allan Watt, Jonathan Coombes, David Marugan, Dave Brown, Martin Visser, Michael Lester, Paul Kearney, Michael Hopkins, Cedric Thevenet, Colonel John Doody, Paul Crespo, Richard Redditt,Alex Smirnoff, Patric J.M.Versteeg, Christophe Duhamel, Arno Brok, Peter Bassill, Carl Landwehr, Adam Shostack, Roy Maxion, Dusko Pavlovic, Fred Schneider, Ged Austen,Tim Burnett, Sanjay Basu, Bobby Woodard, Bradley Rotter,Tony Collings (OBE) and Professor Richard Benham for reading/correcting/inspiring and discussing the manuscript—and for supplying expert advice/support inspiration.

Sample Reviews

Excellent read! Succinct and accurate on a subject that normally wanders into tangential discussions confusing and diffusing the goal. Radley breaks down today’s hottest topic in a way that provides reference to students as well as guidance to the more learned. Absolute Security will give you an optimistic understanding that, even in an ever-increasing world of digital surveillance and criminal threats, … absolute security is eminently achievable… I found it spot on and a fine addition to the body of work on cyber-security but specifically to the discussion of privacy within communications… I see this short book as a reference document for students studying cyber security as well as an excellent read for CTOs, CSOs, CISOs, and CEOs laboring over how to analyze their needs for increased security. Absolute Security allows you to hit the highlights or dive deeper into the subject with your many charts, diagrams, and glossary of terms. Well done.

Vic Hyder – Chief Strategy Officer at Silent Circle. Commander, U.S. Navy (SEAL), retired.

“Absolute Security” will no doubt be recognized as one of the seminal works on security, establishing definitions and clarity where others have dealt with assumptions. It is not very often that one is exposed to a work that is truly ground breaking in a field, but “Absolute Security” is one of those works. Rather than expounding on the implementation of security as many do, Dr. Alan Radley astutely asks (and then suggests an answer for) the rather naive, yet deceptively complex question “What is security?”, or more precisely “How does one characterize a communication system that provides secure (private) data transfer?”

Michael Lester, MSEE, MBA, CIPP/US, CISM
Chief Information Security-Officer/ Vice President, Magenic.

ABSOLUTE SECURITY: THEORY and PRINCIPLES of SOCIALLY SECURE COMMUNICATION should be considered required reading for anyone focused on secure and private communication.  In this book, Alan Radley makes sense of the complexities which ordinarily restrict this topic to IT people only.  What’s more, Alan’s no-nonsense approach and fearless honesty, is refreshing.  I recommend this to everyone who is interested in making certain that their communication is more private, secure and resilient.

Bill Montgomery – CEO – Connect In Private Corp.

This is a unique piece of work which correctly recognises the socio-economic implications of modern day embracement, and dependency on technology, and the ever present interface between man-and-machine. The book provides the reader with an accurate and objective view of the life-cycle of the exposures and vulnerabilities which are associated with the technological shadow cast over all individuals, and organisations. As an Expert Witness in the discipline of Digital, this publication also provides very useful descriptions in ‘people-speak’ and includes very accurate definitions of the complex, transposed into understandable terminology. This is an excellent read, and deserves a place on every security professional’s bookshelf who is seeking a balanced and objective of the current, and futuristic Cyber Security Landscape.

Professor John Walker – Nottingham Trent University.

As cyber education evolves to meet the pace of change in our digital world so does the need for good reference books. Absolute Security is a timely and spot on publication that I shall be recommending to my students; well done Dr Radley.

Professor Richard Benham – National Cyber Skills Centre, UK.

In “Absolute Security: Theory and Principles of Socially Secure Communications”, Dr. Radley exhibited an extraordinary passion for cybersecurity and privacy in the mold of the principles that conform to secure and just society. In a world full of privacy breaches, Radley timely develops a framework that delves into complexity of technical and human-centric factors that affect our perception of privacy and cybersecurity. I recommend this book to everyone who is interested in making our cyber world more secure.

Vitali Kremez – CyberCrime Investigative Analyst.

For someone with over 20 years in IT Security and almost 40 years in ICT it is invigorating to read a book that introduces terminologies that would resonate with the academic world and is not burdened with technical jargon. Reading Absolute Security also raises optimism that as an industry we have a chance in the imbalanced battle against cyber criminals. This also means that the statement ‘there is no such thing as 100% secure’ might be proven wrong.   An excellent read and would definitely recommend this to our AISA members as a read to get a different perspective on security.

Arno Brok – Chief Information Security Officer – Australian Information Security Association.