Project Arc 16
- Liz Alvarez
- May 20
- 4 min read
This post isn’t lighthearted and it’s not supposed to be. Unforunatly its the reality of things. Especially when its connect to IoT and Quantum Computing. It’s rooted in lived experience, forensic pattern recognition, and strategic awareness that’s been unfolding over time. Im not here to fear mongering but keep us aware and prepared. Because if you know how to look, the signals are already live.
April 14, 2030 marks the projected moment when current public-key cryptography systems the kind that protect your bank accounts, government systems, transportation systems, power plants, and personal data could be cracked by quantum computing. It’s a countdown officially launched by the Cloud Security Alliance (CSA) in 2022 under their Y2Q (Years to Quantum) initiative.
"We have set a countdown clock to April 14, 2030 — the estimated date when quantum computers may be able to break RSA and ECC encryption." — CSA
You can view the CSA announcement here.
Why It Matters to ARC 16 That exact date also happens to be my daughter's 16th birthday, and that alignment wasn’t something I searched for it was leaked, repeatedly, by three separate individuals, each in a different context. At the time, I didn’t fully understand the meaning, but the repetition made something in my system take notice. It wasn’t just about a birthday it was about the year she turns 16, which now perfectly aligns with CSA’s public quantum threat timeline.
Their code names for this project:
Gile – leaked it during an emotionally charged moment years ago while referencing the future 16th birthday, back when our daughter was still a baby and I was doing a separate study.
Neil – brought it up indirectly a number of times in reference to the same year as the closing of a "divorce contract agreement," subtly threading in Anna’s age once and echoing the time frame again with strategic undertones.
Mimi --- never said it aloud but communicated through highly specific, timed imagery and object placement involving location, dates, and coded patterns
They didn’t collaborate openly but their messaging synced.
One thing I’ve learned: When emotions are at most high, pay attention to what is being said. When nonverbal cues, repeated phrasing and number like 3:13 pop up too frequently, and timing line up across disconnected people something deeper is being field-tested.



What Does “16” Symbolize? In covert ops communication, the number 16 is often linked to sudden changes, ambushes, or surprise operations the kind that are planned in silence and activated in a moment.
The rest of the deeper code? You’ll need to download and learn the full system to see what they’ve been embedding all along.
(13+3=16)



The “badda bing badda boom” moment for me? I attended a Summit recently and it was mentioned CSA had confirm April 14, 2030. It matched what I sensed, what I was shown, and what’s been silently layered through lived patterns.
One moment that raised a red flag for me and start paying more attention, came not at the airport, but before check-in during a subtle interaction that played out inside the apartment Neil and I lived summer 2024. As we prepared for our holiday I had declined his offer to check in early from his computer. I found this to be slightly off as The use of the web cab was needed and he wanted me to sit right in front. I stating I'd prefer to do it at the airport. He insisted, referencing a picture-based check-in system, that is when I knew something wasn't aligning.
Shortly after, I was on the phone with a Delta agent. What they said next confirmed my suspicion: they referenced information that I had not shared, and that should not have been visible in their system yet. It was a subtle slip-up — but it revealed the bigger truth: the most dangerous errors in tech systems aren’t software-based. They’re human.
This wasn’t about early check-in. It was about premature access, embedded oversight, and a false sense of choice. That’s when I knew the cloud wasn’t passively collecting data it was being fed, directed, and tested often without consent.
For reference, this moment closely mirrors what occurred during the 2023 Delta incident that later drew public scrutiny around premature biometric engagement and privacy boundaries see 2023 Delta Biometric Pre-Check Incident. That’s when I knew the cloud wasn’t passively collecting data it was reacting, adapting, and potentially testing real-time access boundaries. This leads to the greater point; Threats to our borders aren’t just about who enters physically it’s about who’s already embedded digitally. Our perimeter is no longer a line on a map. It’s our devices, our data, our signals. And these breaches often arrive wrapped in smiles, screens, or systems we think are neutral.
This isn’t just about what you post. It’s what you give away without knowing:
Body language in front of devices
Facial ID scans in ambient light or while sleeping
Your child’s age-linked data patterns (searches, app behavior, timing)
Emotional states monitored via smart home tech or educational platforms
Be stingy with your data not because you have something to hide, but because your field is valuable. And yes, it’s being tested against.
This isn’t all doom. Think of this as an opportunity for the ultimate comeback! Like the New York Knicks dropping 20 points then rallying hard in the 4th quarter — we are in the fourth quarter. We still have time to build awareness, shift the narrative, and create protective fields, especially for the next generation.
We may not have the budget, the labs, or the classified tech but we have discernment, pattern recognition, and field integrity. When we align and unite the best way we can, we truly are unstoppable, That’s our comeback play.
What happens when the cloud doesn’t just hold your data, but begins to influence your diagnosis, your prescriptions, your children’s mental records?
WHAT NOW?
Dialogue is the next step. This platform is open-source.
We’re just the ones willing to say it out loud before the system says it for us.
And while this post focused on quantum systems, the next layer of this puzzle hits even closer to home our bodies, our families, our community and our borders.





Comments