CATEGORIES
HOME
THE ROBIN HOOD VIRUS - DISCOVERY
Chapter 1
The Robin Hood Virus is computer virus that
is undetectable and will never be discovered.
This virus utilizes a back-door that has never
been thought of in the black-hat hacker world.
We also developed a virus that we employ on
cell phones. This virus is called "Ranger".
We have taken 11 billion dollars from various
countries, corporations, and individuals and
donated it to charity.
PLEASE CRITIQUE THIS CHAPTER AT: solartoys@yahoo.com
IF YOU WANT TO READ THE NEXT CHAPTER EMAIL ME: solartoys@yahoo.com
|
Welcome to The Robin Hood
Virus Series
by Robert Nerbovig
Table of Contents
Attempts to Steal The Virus
Working with INSCOM
Holding Russia Hostage
DC-10 Aerial Firefighting Systems
Hacking Russian Oligarchs
Exposing Kremlin Hackers
45's Relationship with the Kremlin
Homes for Homeless Veterans
Hacking the NRA
North Korean Payback
Hacking APT1 in China
Mobile Disaster Hospitals
Contact Us
THE BLOG
|
|
CHAPTER 1
Attempts to Steal The Virus
This continuing story centers around a computer virus that we will call "The Robin Hood Virus". This computer virus is undetectable and will never be discovered. We received an email from INSCOM thru one of our anonymous email addresses. This email informed us of chatter they had intercepted. The subject of the chatter concerned finding the author, the hardware, and the software for The Robin Hood Virus. The location of the chatter was Moscow, Russia. INSCOM passed us the I.P. address of the chatter. We immediately entered the computer associated with this I.P. address. We also entered the computers in this network and the cell Phones in the area looking for related conversations. We discovered very high-level conversations concerning The Robin Hood Virus. It is obvious that they are assembling a large covert operation involving many black-hat hackers with unlimited resources, software,
and equipment. We believe they will use all legal and illegal methods to try and discover who we are and where we are. We received another email thru one of our anonymous email addresses stating that they knew who we are and where we were located. This email was from the hacker team in Russia. They must have hacked INSCOM or one of the sites that we hacked to obtain our anonymous email address. They went on to offer us $250,000,000.00 for our hardware and our software. They indicated that if we did not agree to sell that they would take The Robin Hood Virus, its hardware and its software. They assured us that they had the where-with-all to get whatever they wanted. They gave us one week to accept their offer. They also indicated that they represented one of the deputy prime ministers and their orders to acquire The Robin Hood Virus came from a very high place. They also told us that failure was not one of their options. We sent them an email from one of our other anonymous email addresses that we received their email message and we would respond to their offer in a timely manner.
The Robin Hood Virus utilizes a back door that has never been thought of or used in the black-hat hacker world. We also developed the same type of intrusion system to locate and enter cell phones and monitor all suspicious calls by screening keywords that we have chosen. When we encounter a keyword we then utilize our locator software to determine the location of the caller's computer and enter the caller's computer and the recipient's computer to examine their plans and motives. If we determine that they are engaged in illegal activities, violating the rule of competitive fairness, or plotting against the United States we will take aggressive action to stop them in their tracks and empty their bank accounts. We will divert resources (goods and money) to non-profit entities such as food banks, homeless shelters, orphanages, families going thru catastrophic health issues, small rural non-profit hospitals struggling to survive, a new national rural hospital start-up, a Mobile Disaster Hospital Corporation, and our newest charity, The DD214 Foundation. We will find other needy groups or individuals to help with the fruits of our labor.
We have assembled a very knowledgeable and loyal team consisting mostly of former military veterans who know the value of protecting each others backs. They have served in Iraq, Vietnam, Afghanistan, the USA, and the pentagon. Both their military duties and their civilian duties involved computer programming, or network set-up and analysis, or database creation and maintenance. We all have a current mission to help eradicate hacking and the damage that is done by hackers.
OUR TEAM:
TEAM LEADER
Arjay, a former hospital controller with a intricate knowledge of computer hacking techniques and methods who has been programming computers for over 45 years mainly in healthcare.
SOFTWARE ENGINEER
Paula, our software engineer, has 35 years experience designing and developing business applications. She has extensive knowledge in designing database systems for efficient, secure operations. She also has experience writing and testing anti-virus software for large entities.
NETWORK SECURITY SPECIALIST
Paco, our network security specialist, has been actively involved in protecting vital government military installations both in Iraq and here in the United States. He has implemented anti-virus network protection and the tools to determine intruders and their location. He has supported security operations
for an academic enterprise, the U.S. Army at a forward operating base in Iraq, and he constructed and monitored very large wide area networks to prevent intrusion.
HOSPITAL ADMINISTRATOR
Duck is a retired hospital administrator with 38 years experience in small rural hospitals who will head our Medical Services Division. He has defined proper business conduct for the medical service industry and he will oversee the entry, the verification of business practices, and planned corrective action if business violations occur (rates too high, re-imbursements too low, etc.). The medical services division will also oversee the "World Rural Hospital Corporation" (WRHC).
DATABASE/WEB DEVELOPER
Trent, our database/web developer, has 25 years experience designing and developing very sophisticated index methods for storing and tracking various business operations. He has written complex web pages for various clients in various vertical markets.
TELEPHONE NETWORK ENGINEER
Pablo is our telephone network expert who has been designing and developing telephone networks and software for the last 15 years. He has installed numerous, very complicated, telephone networks all over the world.
LANGUAGE, LINGUISTICS EXPERT
Rob, our language expert, is proficient in several languages including Arabic, Farsi, and most languages in the middle east. He has designed language conversion programs that we will use to monitor conversations of suspected violators.
The team members perform their functions from their chosen locations all over the world. Some of the offshore locations include: Waimanalo Hawaii, Belize, Cancun, Paris, Rome, Barcelona, London, Maui, Hana Hawaii, Puerto Rico, Sidney, U.S. Virgin Islands, Vancouver, Rio de Janeiro, Zurich, Edinborough, Montreal, Prague, Crete, Bora Bora, Budapest, Maldives, Cape Town, Aukra Norway, and the Bahamas.
The team members will use a copy of all our developed software and log into our network operations center in Arizona from their location to conduct business, as usual, to access, evaluate, and penalize the target individuals, companies, or countries they have chosen based on their area of responsibility. We have set up non-profit foundations for each member to draw salary from and we donate anonymously to those foundations. We fund their individual operating accounts with offshore transfers from various offshore accounts. The team leader will operate the network operations center from his log home in northern Arizona. All of the daily operating specifics will be handled using encoded emails.
We have established offices throughout the world in the most desirable vacation locations chosen by our team members. They will spend 6-9 months at each location before moving to another location of their
choice. We established a non-profit foundation for each team member in order to receive our anonymous donations for operating expenses. The team leader will operate the network operations center from the basement in his log home in Arizona. All of the daily operating specifics will be handled using encoded emails. We set up data encryption for transferring data communications. We have developed a very complex encryption algorithm. There is no known cryptanalysis of our algorithm. Because of the need to ensure that only those eyes intended to view our sensitive information can ever see this information, and to insure that the information arrives un-altered, our security systems ENCODE THE DATA PRIOR TO ENCRYPTION.
We have also developed codes for critical information...dollar amounts, people, team members, locations, weekly progress and new ideas.
Our team has the necessary hardware and software to perform all of the necessary intrusions. They are
able to be very productive in any and all locations.
Our security team is continuing to enter into the computer systems of large corporations to determine overpricing, product monopoly, business coercion, hacking, and dishonest activities on behalf of corporations, politicians, and foreign governments. When we find illegal or improper activities that are conducted by these entities we will extract money and resources and divert it to the non-profit endeavors that we have previously identified and make those donations in a pre-determined timeframe. We will also warn the offending entity if the illegal or improper activities continue, we will extract more severe penalties.
We are continuing to enter various networks and we perform our tasks without detection. The results of these intrusions will be divulged in further chapters. We continue to enjoy the occupation of the
computers that we have entered. There is no way to determine who we are, how we entered their system, or what we are accessing in their systems. We have developed an extensive package of computer programs that will enable us to modify hacker software. The modifications include:
1. Publishing the I.P. Address of the hackers’ Computers.
2. Logging all computers that they attack.
3. Nullifying all negative impact of the hacking attempt.
This will allow us to have a log of all of their intrusions so a severe penalty can be assessed. We hope that once the existence of this anti-hacker software is made public that eventually hackers will be dissuaded from hacking. We will make the penalties extremely severe. We will obtain i.p. addresses of suspected hackers from the computer systems of Homeland Security, the IRS, the FBI, existing hacked companies, the defense department, and the state department. That will give us a very good starting point on which base our initial intrusions. We will describe the results of our hacker intrusions in a later chapter.
One of the devices that we have developed is used to determine the exact location of the target computer system. We have a checklist of computer systems that we will enter. We will enter each system on our schedule. Once in the computer system we will create, modify, delete, and email documents as necessary to accomplish our mission.
We keep a log of all systems we enter including the entry specifics, task, operational specifics, results obtained, and reactions of the system owner, if any.
The network computer invasion system(NCIS) consists of several software programs and several pieces of hardware that are used for various coupled processes that determine a target, locate its' exact coordinates, execute the mapping program, determine the extent of the network, log node addresses for
entry, connect to the nodes simultaneously, perform basic functions to determine proper business conduct and take appropriate action. The data will be logged to facilitate the re-entry into all of these networks.
We have established a very extensive set of conditions to guide us thru computer entry, evaluating business operations, and setting the standards for proper business conduct based on the type of business and the violations that are occurring. We utilize our scanning alert system to identify prospective violations. We have also established a set of dollar penalties based on the type and severity of the of the misconduct. We have developed a formula for off-shore dollar transfers and which charities or organizations to donate to on a daily, weekly, and monthly basis.
We conduct our activities from our operations center located in an underground bunker(NOC) in the
basement of a large log home(owned by the team leader) located in the mountains of Arizona on 10 acres with 500 feet of lakefront property. We designed the secure bunker with these features:
1. We built it in the right location, quiet, picturesque, and ultra secure.
2. We have redundant utilities, electricity, water, voice and data.
3. When we built the log cabin we designed the basement to have foot-thick walls and foundation.
We designed our network operations center to have the utmost flexibility for data storage, transmission and flexibility. We have upgraded our data storage to 4 RAID DRIVES (15TB each), a standalone server that we can access remotely from our desktop’s, multiple mirrored drives that are hot swappable from the front of the cabinet with 16gb of DDR2 dual channel memory and hi speed 64bit quad processors, a 64gb desktop that we use to control the server, and a 14 foot by 55 foot LCD video wall with 21 screens capable of displaying 12 companies each with interactive touch. We designed this video wall in order to instantly control up to 252 network intrusions at the same time. We have written the controller software to display a different background color on each of the display screens depending on the severity of the violation. A light red background is most severe and requires immediate attention. Backgrounds such as light green, light blue, white, and magenta denote the severity of the violations. It makes the viewing of the surveillance data much easier to monitor.
We wrote our video software to monitor all of our current network incursions that we determine to be critical and take the appropriate action when needed. We have established the monetary limits to assess violators based on the severity of the violation. The more severe the violation the more money we assess to the violating country, company, or individual.
We have conducted our incursions from this network operations center for about 6 years.
We utilize data encryption for transferring data between team members in whatever location they happen to be working. We have developed a very complex encryption algorithm. There is no known cryptanalysis of our algorithm. Because of the need to ensure that only those eyes intended to view our sensitive information can ever see this information, and to insure that the information arrives un-altered, our security systems ENCODE THE DATA PRIOR TO ENCRYPTION. We have also developed codes for critical information...dollar amounts, people, team members, locations, weekly progress and new ideas.
We will extract information, obtain passwords, emails, ledgers, accounting reports, and insert documents including emails, currency transfer requests with authorizations, purchase requests, and general ledger entries without detection. Using their encryption keys, data about the target's VPN configurations, and Adobe signing keys, we have the ability to sign .PDF documents as if we were the owner of the key.
The network computer invasion system(NCIS) will allow us to do anything in the system that we deem necessary.
There will be systems and procedures created to process all info gained from each incursion:
1. How to decipher it
2. How to categorize it
3. How to proceed if the data meets the criteria as to importance.
4. Develop and execute a plan to gather
information on specific companies.
5. Use the information gathered to discredit these companies if they fail our proper business conduct tests.
6. Modify banking records and cause disruption in those companies.
7. Transfer funds to the master off shore accounts to be distributed to other worldwide accounts for distribution to our pre-designated non-profits and needy causes.
8. Divulge confidential information when necessary and put these companies on the run.
We have established divisions within our company to match the expertise of our partners. The partners
and their divisions are:
TEAM LEADER - Monitors the network operations center for alerts and insures appropriate action is taken. All punitive action is taken automatically.
SOFTWARE ENGINEER - Political Division
NETWORK SECURITY ENGINEER - Cyber warfare Combat & Tactics.
HOSPITAL ADMINISTRATOR - Medical Services Division.
DATABASE/WEB DEVELOPER - Commercial Division.
TELEPHONE NETWORK DESIGNER - Develops and installs cell-phone monitoring software.
LANGUAGE, LINGUISTICS EXPERT - Worldwide terrorist activities.
Our hardware and software networks are setup so the various partners will select the various companies, entities, or individuals to monitor in their respective divisions. That information is transmitted to the network operations center in Arizona. One of the several displays will constantly monitor the company, entity, or individual. When the parameter limits are exceeded the pre-determined actions are instituted. The entity is warned, resources are extracted and forwarded to our off-shore accounts, and the entity is monitored in the background. This system has worked extremely well. We are currently monitoring 182 entities in the background for repeat offenses. When there are repeat offenses the pre-determined actions are again instituted, the background color is upgraded, and this time the penalty is more severe. There is no way to determine who we are, how we entered their systems, or what we are accessing in their systems. We have successfully entered several computer networks and we continue to occupy most of the computers that we have entered. Key elements of each of the particular systems are monitored on our screens to identify repeat violations and assess additional penalties.
DOLLARS EXTRACTED TO DATE $1,564,350,000
DONATION TOTAL TO DATE $1,548,000,000
|
| |
|
This site is designed
and maintained by:
Robert Nerbovig
|