Welcome to The Robin Hood Virus Series
by Robert Nerbovig

The Robin Hood Virus-Discovery
DOLLARS EXTRACTED
TO DATE $1,564,350,000
DONATION TOTAL
TO DATE $1,548,000,000

The Robin Hood Virus-Discovery
DOLLARS EXTRACTED TO DATE $6,242,350,000
DONATION TOTAL TO DATE $6,226,000,000

                                                                                                                                   COMING SOON

                                                                                                                                                                               BOOK 4

The Robin Hood Virus-Discovery

The Robin Hood Virus-Discovery


BOOK 5
The Robin Hood Virus-Vindication


THE ROBIN HOOD VIRUS
4/10/2023 Treatment
FORMAT DESCRIPTION:
A major motion picture or a T.V. series of 50 or more episodes.

LOGLINE:
This story centers around a computer virus called "The Robin Hood Virus". This computer virus is undetectable and will never be discovered. This virus utilizes a back-door that has never been thought of in the black-hat hacker world. We also developed a virus that we employ on cell phones. This virus is called "Ranger". We use this virus to hack into corrupt countries, corporations, and individuals to extract billions of dollars and divert these resources to non-profit entities such as food banks, homeless shelters, orphanages, families going thru catastrophic health issues, small rural hospitals struggling to survive, and creating much needed llc's such as a national rural hospital corporation, DC-10 fire tanker company, homes for homeless veterans, mobile disaster hospitals, building a national water pipeline, preventing water run-off after a forest fire, and more. We soon find ourselves targeted by powerful enemies who will stop at nothing to steal the virus and destroy them.

SETTING:
We developed an intrusion system to locate and enter cell phone's and monitor all suspicious calls by screening keywords that we have delevoped. When we encouter a chosen keyword we utilize our location software to determine the location of the caller's computer and enter the caller's computer and the recipient's computer to examine their plans and motives. If we determine that they are engaged in illegal activities, violating the rule of competitive fairness, or plotting against the United States, we will take aggressive action to stop them in their tracks and empty their bank accounts. We have taken over 11 billion dollars and deposited it in several off-shore bank accounts. We will divert these resources to non-profit entities such as food banks, homeless shelters, orphanages, families going thru catastrophic health issues, small rural hospitals struggling to survive, and creating much needed llc's such as a national rural hospital corporation, DC-10 fire tanker company, homes for homeless veterans, mobile disaster hospitals, building a national water pipeline, Preventing water run-off after a forest fire, and more. We will find other needy groups or individuals to help with the fruits of our labor. We also enter the databases of the U.S. Government to find information on subjects that interest us and to tell the real story. We will tell the real story of Roswell (Majestic 12), The Philadelphia Experiment, and violators in the witness protection databases. If the world ever finds our that we are invading their computer systems and cell phones, without detection, and what we are doing with the information we are gathering, the manner in which everyone uses their computer systems would change drastically.

CHARACTER BIOGRAPHIES:
We have assembled a very knowledgeable and loyal team consisting mostly of former military veterans who know the value of protecting each others backs. They have served in Iraq, Vietnam, Afghanistan, the USA, and the pentagon. Both their military duties and their civilian duties involved computer programming, or network set-up and analysis, or database creation and maintenance. We all have a current mission to help eradicate hacking and the damage that is done by hackers. We have occupied the computer networks of various government agencies including the IRS, the FBI, and several District Attorney's offices. We are monitoring these systems to find companies under surveillance for fraud, or other illegal activities. We are currently in the process of reviewing various companies, individuals, and countries to establish a schedule of computer entry. When we find violators we will enter their computer systems and cell phones to determine the improper activity and assess a proper penalty.

TEAM LEADER:
Arjay, a former hospital controller with an intricate knowledge of computer hacking techniques and methods who has been programming computers for 50 years, mainly in healthcare. He has written systems for hospitals, nursing homes, medical clinics, various medical specialty offices, and dental offices. He also programmed one of the first electronic medical billing systems in the country. He has re-constructed computer systems after severe virus attacks and has been instrumental in designing and developing anti-virus software. He has written "The Robin Hood Virus" software and developed the necessary hardware and software to enter computers all over the world without detection. Arjay is a former active duty Marine as are other team members. Semper Fi.
SOFTWARE ENGINEER:
Paula is our software engineer. She has 15 years experience designing and developing business applications. She has extensive knowledge in designing database systems for efficient, secure operations. She also has experience in designing and writing and testing anti-virus software for large entities.
NETWORK SECURITY SPECIALIST:
Paco, our network security specialist, has been actively involved in protecting vital government military installations both in Iraq and here in the United States. He has implemented anti-virus network protection and the tools to determine intruders and their location. He has supported security operations for an academic enterprise, the U.S. Army at a forward operating base in Iraq, where he constructed and monitored very large wide area networks to prevent intrusion. His background and experience more than qualifies him for Manager of Cyber warfare.
HOSPITAL ADMINISTRATOR:
Duck is a retired hospital administrator with 38 years experience in small rural hospitals who will head our Medical Services Division. He has defined proper business conduct for the medical service industry and the he will oversee the entry, the verification of business practices, and planned corrective action if business violations occur(rates too high, etc.). The medical services division will also oversee the "World Rural Hospital Corporation" (WRHC).
DATABASE/WEB DEVELOPER:
Trent, our database/web developer, has 25 years experience designing and developing very sophisticated index methods for storing and tracking various business operations. He has written complex web pages for various clients in various vertical markets.
TELEPHONE NETWORK ENGINEER:
Pablo is our telephone network expert who has been designing and developing telephone networks and software for the last 15 years. He has installed numerous, very complicated, telephone networks all over the world.
LANGUAGE, LINGUISTICS EXPERT:
Rob, our language expert, is proficient in several languages including Arabic, Farsi, and most languages in the middle east. He has designed language conversion programs that we will use to monitor conversations of suspected violators.
We use our team members, working in their desired vertical market, to discover private, corporate, and governmental hacking, foreign and domestic, by entering various large computer networks to extract or divert resources for humanitarian purposes.
We have developed a group of computer devices and cell phone devices that does just that! We have entered the computer systems of suspected individuals, companies, and governments engaged in illegal activities with spectacular results. We have established offices throughout the world in the most desirable vacation locations chosen by our team members. They will spend 6-9 months at each location before moving to another location of their choice. We have setup a method to destroy the hardware and software that is out in the field with our teams if proper authentication is unsuccessful or if the team member is threatened in any way. We established a non-profit foundation for each team member in order to send our anonymous donations for operating expenses. The team leader will operate the network operations center from the basement command center in his log home in Arizona. All of the daily operating specifics will be handled using encoded emails. We set up data encryption for transferring data communications. We have developed a very complex encryption algorithm. There is no known cryptanalysis of our algorithm. Because of the need to ensure that only those eyes intended to view our sensitive information can ever see this information, and to insure that the information arrives un-altered, our security systems ENCODE THE DATA PRIOR TO ENCRYPTION.
EPISODE OUTLINES:
Episode 1:
We conduct our activities from our operations center located in an underground bunker(Command Center) in the basement of a large log home (owned by the team leader) located in the mountains of Arizona on 2500 acres with a 100 acre lake. We designed the secure bunker with these features:
1. We built it in the right location, quiet, picturesque, and ultra secure.
2. We have redundant utilities, electricity, water, voice and data.
3. When we built the log cabin we designed the basement to have foot-thick walls and foundation.
We designed our network operations center to have the utmost flexibility for data storage, transmission and flexibility. A 24 foot 55" LCD video wall with 17 screens capable of displaying 12 companies each and including interactive touch. We designed this video wall in order to instantly control up to 192 network intrusions at the same time. We have written the controller software to display a different background color on each of the display screens depending on the severity of the violation. A light red background is most severe and requires immediate attention. Backgrounds such as light green, light blue, white, and magenta denote the severity of the violation. It makes the viewing of the surveillance data much easier to monitor. We wrote our video software to monitor all of our current network incursions that we determine to be critical and take the appropriate action when needed. We have established the monetary limits to assess violators based on the severity of the violation. The more severe the violation the more money we assess to the violating country, company, or individual. We have conducted our incursions from this network operations center for about 6 years. We recently decided to take working vacations in various parts of the world. The team members perform their functions from their chosen locations all over the world. Some of the offshore locations include: Waimanalo Hawaii, Belize, Cancun, Paris, Rome, Barcelona, London, Maui, Hana Hawaii, Puerto Rico, Sidney, U.S. Virgin Islands, Vancouver, Rio de Janeiro, Zurich, Edinborough, Montreal, Prague, Crete, Bora Bora, Budapest, Maldives, Cape Town, Aukra Norway, and the Bahamas.
The team members will use a copy of all our developed software and log into our network operations center in Arizona from their location to conduct business, as usual, to access, evaluate, and penalize the target individuals, companies, or countries they have chosen based on their area of responsibility.
We have established divisions within our company to match the expertise of our partners. The partners and their divisions are:
Team Leader - Monitors the network operations center for alerts and insures appropriate action is taken. All punitive action is taken automatically.
Network Security Engineer - Cyber warfare Combat & Tactics
Hospital Administrator - Medical Services Division
Database/Web Developer - Commercial Division
Telephone Network Designer - Develops and installs cell-phone monitoring software
Language, Linguistics Expert - Worldwide terrorist activities
Our hardware and software networks are setup so the various partners will select the various companies, entities, or individuals to monitor in their respective divisions. That information is transmitted to the network operations center in Arizona. One of the several displays will constantly monitor the company, entity, or individual. When the parameter limits are exceeded the pre-determined actions are instituted. The entity is warned, resources are extracted and forwarded to our off-shore accounts, and the entity is monitored in the background. This system has worked extremely well. We are currently monitoring 192 entities in the background for repeat offenses. When there are repeat offenses the pre-determined actions are again instituted, the background color is upgraded, and this time the penalty is more severe. There is no way to determine who we are, how we entered their systems, or what we are accessing in their systems. We have successfully entered several computer networks and we continue to occupy most of the computers that we have entered. Key elements of each of the particular systems are monitored on our screens to identify repeat violations and assess additional penalties. We place our logo in the lower right-habd corner of all of their communications to let them know we are in their system.
EPISODE ONE | THE BREAK DOWN:
FADE IN:
INT. THE HOME OF THE MISSIONS HOSPITAL CORPORATION CHAIRMAN. HE IS PLUGGING IN HIS CELLPHONE TO RE-CHARGE.

AN AERIAL VIEW OF THE ARIZONA LANDSCAPE TO INCLUDE SUNRISE, MOUNTAINS, SKY, FOOTHILLS, FLOWERS, ARJAYS 2500 ACRE PROPERTY ON A LARGE LAKE.
EXT. ARJAYS HOME NORTHERN ARIZONA.
INT. ARJAY'S LARGE LOG HOME - UPSTAIRS MANCAVE - EVENING
WIDER ANGLE
ARJAY is sitting at his laptop, (as usual), surrounded with some of his collections of vintage post cards, valuable sports cards, wire art, posters, and 1930s magazine covers and advertisements. He continues to test the program (virus) he has been working on for 6 years. He has developed the hardware and software that enables him to hack into any computer in the world. The back-door entry that he has invented has never been discovered. He is able to remain in the hacked system without detection. He has stolen $1,564,000,000 from bad actors and used it to buy a 2,500 acre compound in Northern Arizona. He has constructed two 3 bedroom log homes with stables and a very large log home with a basement for the Command Center.
ARJAY (V.O.)
I am a former hospital controller with an intricate knowledge of computer hacking techniques and methods and I have been programming computers for over 50 years. I have re-constructed several computer systems after severe virus attacks and I have been instrumental in designing and developing anti-virus software programs. I have developed this virus to stop cyber-criminals from holding people, hospitals, insurance companies, and governments hostage.
I have developed the hardware and software necessary to hack into any computer and cell-phone in the world. I call this virus "The Robin Hood Virus" because I take from the rich and give to the less-fortunate. This computer virus is undetectable and will never be discovered. This virus utilizes a back-door that has never been thought of in the black-hat hacker world.
We also developed a virus that we employ on cell phones. This virus is called "Ranger". We monitor all suspicious calls by screening keywords that we have chosen. When we encounter a keyword we then utilize our locator software to determine the location of the caller's computer and enter the caller's computer and the recipient's computer to examine their plans and motives. If we determine that they are engaged in illegal activities, violating the rule of competitive fairness, or plotting against the United States we will take aggressive action to stop them in their tracks and assess a heavy penalty.
We use this virus to hack into corrupt countries, corporations, and individuals to extract billions of dollars and divert these resources to non-profit entities such as food banks, homeless shelters, orphanages, families going thru catastrophic health issues, small rural hospitals struggling to survive, and creating much needed LLC's such as a national rural hospital corporation, a DC-10 fire tanker company, homes for homeless veterans, mobile disaster hospitals, building a national water pipeline, a company to prevent damaging water run-off after a forest fire, a secret branch of The Salvation Army to donate money to families struggling due to health problems, and more.
We soon find ourselves targeted by powerful enemies who will stop at nothing to steal the virus and use it for their own illegal purposes.
INT. THE ROBIN HOOD VIRUS COMMAND CENTER
The Robin Hood Virus network operations center (NOC) showing a video wall with a 24 foot 55" LCD video wall with 17 screens capable of displaying 12 companies each and including interactive touch. The center screen is used to display various data such as a running total of DOLLARS EXTRACTED TO DATE And DONATION TOTAL TO DATE. We will update totals as we get them. (initial totals are: $1,564,000,000 and $1,528,000,000).
On one of the desktop computer screens we see DUCK entering the following command: “execute locator latitude 39.163795 longitude -119.767401” for the home of the Chairman of Missions Hospital Corporation. Data now splashes across the screen, "Locator program: running."
On another desktop computer screen we find Paco and Pablo working with a very large set of video screens, arranged in a half circle of a desk-high counter with 8 CRT workstations. We have continuing communications with various entities to monitor conditions and to oversee various established companies. We are looking for repeat offenders, or to inquire into the on-going operation of our companies. Those entities include:
We have setup a U.S. Government communication channel that does not know our identity. We have sent numerous pieces of information that they have verified to be true and have welcomed our continued forwarding of information concerning people, places, activities, I.P. Addresses of major hackers, military plans and activity, individuals we have identified as terrorists and their location and activities. Our communications channel is with INSCOM.
INSCOM oversees a number of major subordinate commands, and coordinates efforts between the various command groups in order to gather and best use the information received. This can include providing linguistic support to various commanders throughout the Army, ensuring the security and maintenance of US Army computer systems and servers, working with other intelligence agencies such as the National Security Agency, and providing location specific support and analysis in numerous military theaters across the world.
Wildfires have become an increasingly common occurrence, especially during the summer months. The risk of wildfires poses a significant threat to communities, wildlife, and natural resources. To combat this risk, firefighters have employed various techniques and technologies to suppress fires effectively. One such technique is using DC-10 tankers and night vision. Aerial attack is often the quickest and most effective response to a large wildfire front - fixed-wing aircraft or helicopters can dump water or fire retardant chemicals directly onto the advancing fire front in large volumes that dwarf the comparatively puny streams put out by a fire truck. Where the smaller planes and helicopters have carried around 1000 gallons, the DC-10 fire bomber carries 12,000 gallons.
We have acquired an existing DC-10 fire bomber company that we will call DC-10 Aerial Firefighting Systems, LLC. The company has 35 DC-10's, hangars and support equipment. They also have all of the parts and equipment and hangars to modify existing DC-10's to our specifications. All of our DC-10 fire bombers have night-flight characteristics. This includes night vision goggles with modifications made to the panel lights, sensor data and processors that will fuse together information and display it to pilots so they can get a real-time view of the terrain and fire environment, infrared systems, a GPS controlled illuminated laser pointer to inform the DC-10 fire bomber where to drop the loads, twin adjustable Night Suns, and lead plane searchlights. We have also developed safe and effective drop heights across a variety of illumination levels in different terrain. For example, dealing with moonlit and starlit-nights and low-light scenarios, working toward setting requisite minimums for illumination levels for terrain and drop height. We have established DC-10 fire bomber bases with complete refueling support in: Victorville, California San Diego, California Los Angeles, California Sacramento, California Portland, Oregon Roswell, New Mexico Denver, Colorado Amarillo, Texas
These fire bases will house multiple DC-10 fire bombers, lead aircraft, all equipment and crews. When a fire breaks out we hope to get multiple DC-10 fire bombers in the air whether day or night. We believe that if we can put 4, 5, or 6 DC-10 fire bombers in the air at the same time, on an aerial fire line to attack the flames, that the spread of the fire would be drastically minimized.
We utilize video newsreels to highlight illegal activities in Russia, China, and North Korea.
We also continually monitor and enter into the computers of 25 Russian Oligarchs, North Korea, The Kremlin, Black-Hat Hackers, OPEC, and many more countries, corporations, databases, and individuals for evidence of illegal operation. Key elements of each of the particular entered systems are monitored on our screens to identify repeat violations and assess additional penalties.

Because of our continuing efforts to stop illegal activities by large corporations and foreign countries, we have become the target of several unscrupulous entities, foreign and domestic. They are trying to discover our identity and location. We have discovered their inquiries by intercepting emails on the MHC Hospital network. They are a group of hackers located in China. If it were possible for them to get their hands on our hardware and software they could create a major catastrophe the likes of which has never been seen before. We have entered their network and have determined their identities and their plans. We have setup an electronic transfer of $120,000,000 of their bank balance to our offshore account. We then immediately dispersed the amount into several of our other offshore accounts. We expect they will continue to attempt to determine who we are and where we are located in an effort to steal the device and our software. We have found other email inquiries trying to find us. We are neutralizing those inquiries by entering the systems of the inquirer and emptying their bank accounts.
INSCOM passed us the I.P. address of a location in Russia. They have determined that Russia will acquire The Robin Hood Virus at all costs. We immediately entered the computer associated with this I.P. address. We also entered the computers in this network and the cell Phones in the area looking for related conversations. We discovered very high-level conversations concerning The Robin Hood Virus. It is obvious that they are assembling a large covert operation involving many black-hat hackers with unlimited resources, software, and equipment. We believe they will use all legal and illegal methods to try and discover who we are and where we are. We received another email thru one of our anonymous email addresses stating that they knew who we are and where we were located. This email was from the hacker team in Russia. They must have hacked INSCOM or one of the sites that we hacked to obtain our anonymous email address. They went on to offer us $10,000,000,000 for our hardware and our software.
They realize that if they get their hands on The Robin Hood Virus that they will then control the world’s financial markets, money flow, the political landscape, and all else that matters. They indicated that if we did not agree to sell that they would take The Robin Hood Virus, its hardware and its software. They assured us that they had the where-with-all to get whatever they wanted. They gave us one week to accept their offer. They also indicated that they represented one of the deputy prime ministers and their orders to acquire The Robin Hood Virus came from a very high place. They also told us that failure was not one of their options. We sent them an email from one of our other anonymous email addresses that we received their email message and assured them that if they were to acquire The Robin Hood Virus that we would cause their country to go dark. Our team members have the hardware and software that will enable us to shut down the Moscow power grids. We have installed a self-destruct code in the command center software that will render the software totally useless. What they don’t know is that without the very specialized hardware there is no way to use The Robin Hood Virus because of the way we enter cell-phones and computers.
There is no way to determine who we are, how we entered their systems, or what we are accessing in their systems. We have successfully entered several computer networks and we continue to occupy most of the computers that we have entered. Key elements of each of the particular systems are monitored on our screens to identify repeat violations and assess additional penalties. We install our logo in their systems and print or display it whenever possible. They know we are watching!

WE WILL CONTINUE DOING WHAT WE HAVE BEEN DOING AT ALL COST.

THE CENTRAL MESSAGE:
The Robin Hood Virus is creating havoc with countries, corporations, companies, and individuals who are conducting illegal activities. We have developed a plan to force Russia out of the Ukraine. It involves shutting down the 11 different power grids in Moscow. We shut 1 power station each day until Putin agrees to our demands. The Robin Hood Virus is a topical virus in that we find new targets every day.


BOOK REVIEWS:

F Pelletier says of The Robin Hood Virus
"Pickup a copy of The Robin Hood Virus and learn how some with skills and abilities are changing their world, for the better. Tracking with todays events in the world of cyber security and international intrigue, this is a fast moving tale of how the "white hat" hackers can change the world. In this cyber world the computer virus is used like the Crusader's swords of a bygone age. The sharp blade of retribution cuts and cuts deep. Just what can happen when individuals with social consciousness an agenda and a means to deliver all band together to change the world. Pickup a copy of The Robin Hood Virus and learn..Film Threat"

Gary says of The Robin Hood Virus
Wow! Bob, this is so timely, it's unbelievable! The CIA's got its tit in a wringer, the NSA is deflecting any knowledge of Trump's alleged hacking (having worked for both of them, I ain't believing either one) and you're proposal of a t.v. series is . . spooky. I'd watch it!

Teddy wrote: I just finished reading your book The Robin Hood Virus! Wow, good job. What a great story. The possibilities where you can take the story line is endless. You say it is fiction, but it seems so real and so do-able as you describe every detail. It made me question a few things in the here and now! Your book made me wonder about is the 2020 Presidential election and maybe it is possible to flip the vote without detection! wow. I’m looking forward to reading the second book in the series. I see this continuing on into almost any situation. It would make a good and timely TV series or movie, too. I bought the book on Amazon. I still like having hard copies. The home on the cover is beautiful.





This site is designed and maintained by: Robert Nerbovig