HOME
THE ROBIN HOOD VIRUS
Screenplays
CLICK EPISODE NAME
TO READ SCREENPLAY
Episode 1
"Pilot"
Episode 2
"World Rural Hospital Corporation"
Episode 3
"World-Wide Military Tactics"
Episode 4
"Putin Ejected from Ukraine"
Episode 5
"Hacking Russian Oligarchs"
Episode 6
"Wall Street Infection"
Episode 7
"Digital Diversion"
Episode 8
"Rural Hospital Startups"
Episode 9 COMING SOON
Episode 10 COMING SOON
Contact Me
|
THE ROBIN HOOD VIRUS Screenplay
Episode 6
"WALL STREET INFECTION"
by
Robert Nerbovig
Series created by Robert Nerbovig
a Turquoise Software expression
therobinhoodvirus.com & dd214foundation.org
Payson, Arizona 85541
solartoys@yahoo.com
Learn more about the world of The Robin Hood Virus at www.therobinhoodvirus.com or www.wireart3d.com
Distribution, sale, duplication, or any other unauthorized use of this material in whole or in part is strictly prohibited.
Copyright 2025. All rights reserved.
FADE IN:
1 INT. NETWORK OPERATIONS CENTER NORTHERN ARIZONA - MORNING
1
"THE ROBIN HOOD VIRUS"
EPISODE 7: "DIGITAL DIVERSION"
FADE IN:
EXT. NORTHERN ARIZONA - SUNSET - ESTABLISHING
The sun sets behind majestic red rock formations, casting long shadows across the desert landscape. A single-lane road winds through the terrain toward a modern, low-profile building partially concealed among the rocks.
ARJAY (V.O.)
When you think of high-tech operations that can bring terrorist organizations to their knees, you probably imagine some windowless room in Langley, or a military base in some classified location.
INT. NOC (NETWORK OPERATIONS CENTER) - NORTHERN ARIZONA - NIGHT
A state-of-the-art operations center with multiple workstations, each with 3-4 monitors. Wall-mounted screens display global maps, data streams, and surveillance feeds. The facility is modern but not flashy—functional, purpose-built.
ARJAY (V.O.)
But sometimes the most effective operations happen where nobody's looking. Welcome to our Network Operations Center, hidden in the heart of Northern Arizona. From here, we wage a different kind of war.
Five people work intensely at different stations. This is the ROBIN HOOD VIRUS TEAM:
PAULA (40s), intense, brilliant, former intelligence analyst, monitoring multiple feeds;
PACO (30s), coding prodigy with a military haircut, fingers flying across keyboards;
ROB (40s), methodical, precise, eyes never leaving his screens;
PABLO (30s), cybersecurity expert with an easy smile despite the tense situation;
TRENT (20s), youngest team member, headphones on, in his own world of code.
At the center stands ARJAY (50s), salt-and-pepper hair, weathered face, eyes that have seen too much. He moves between stations, checking progress.
ARJAY (V.O.)
We aren't sanctioned. We aren't official. But we get results where others can't. The Robin Hood Virus isn't just a program—it's a mission. Take from the terrorists, give to those fighting them. Today, that mission has led us to one of the most dangerous terrorist networks in the Middle East.
PAULA
(urgently)
Arjay, I've got movement on the target accounts.
The team gathers around her station.
ON SCREEN: Financial transfers, account numbers, transactions of millions of dollars in real-time.
ARJAY
Show me.
FADE OUT.
OPENING CREDITS
ACT ONE
FADE IN:
INT. NOC - NORTHERN ARIZONA - NIGHT
The team is gathered around a central table with a digital display. A map shows hotspots across Syria, Iraq, Iran, and Afghanistan.
ARJAY
INSCOM's intel puts the terrorist headquarters somewhere in Northern Iraq, but they've been frustratingly vague on specifics.
TRENT
(scrolling through data)
They never share the good stuff.
PAULA
That's why we're here. Official channels have limitations we don't.
ARJAY
Exactly. Our advantage isn't firepower or manpower—it's invisibility.
Arjay activates a holographic display showing a complex network diagram.
ARJAY (CONT'D)
Our infiltration of their cell networks has been active for three weeks. We've been passively collecting data, but tonight we move to the next phase.
PABLO
(concerned)
Active collection risks detection.
ARJAY
The risk is justified. We've confirmed they're holding American prisoners.
This creates a moment of somber silence among the team.
PACO
(determined)
Then we don't have a choice.
ROB
(pragmatic)
We'll need to focus on their financial infrastructure first. Cut off the money, you cut off the operation.
ARJAY
Precisely. Paula has identified multiple accounts across Pakistan, Kuwait, Qatar, and Afghanistan.
PAULA
(bringing up data)
Combined balances of over half a billion dollars. They're primarily funded through oil theft and extortion.
ON SCREEN: Banking details appear showing massive account balances.
ARJAY
Tonight, we start the transfer process. $250 million from the Pakistani account, $100 million from Qatar.
TRENT
(whistles)
That's a lot of terrorist cash.
PABLO
What's our cover story for INSCOM? They'll notice funds disappearing.
ARJAY
No cover story. This isn't an INSCOM operation. We feed them actionable intelligence, nothing more.
PAULA
They'd shut us down in a heartbeat if they knew.
ROB
Or worse.
ARJAY
That's why nobody outside this room can know about the financial transfers. We track, we monitor, we pass intelligence. The money... that's our operation alone.
PACO
(typing rapidly)
I've established the secure tunnels to both banking networks. Pakistani system has surprisingly robust security.
TRENT
But not robust enough, right?
PACO
(smirks)
Not even close.
ARJAY
Begin the first transfer. Let's see how they react.
The team moves to their stations. Screens light up with activity.
ARJAY (V.O.)
Our Robin Hood Virus isn't actually a virus in the traditional sense. It's a suite of sophisticated tools—backdoors, trojans, key-loggers, authentication bypass systems—all designed to do one thing: move money from the bad guys to the good guys without leaving a trace.
ON SCREEN: Complex code executes as the team infiltrates the banking system.
PACO
We're in. Authentication bypassed.
PAULA
Mapping their transaction approval process now.
ROB
I've got their security team's communication channels. They're completely unaware.
ARJAY
Start the first transfer. Pablo, make sure our offshore routing is clean.
PABLO
Using three proxy jumps and a custom-built ledger mask. They'll chase ghosts for weeks.
The screens show progress bars as the money begins to move.
TRENT
(excitedly)
It's working! First fifty million redirected!
ARJAY
Stay focused. This is just the beginning.
ARJAY (V.O.)
In our business, the real danger isn't getting in—it's what happens after. One wrong move, one digital fingerprint left behind, and we're not just compromised—we're finished.
The team continues working as the money transfers progress. Suddenly, an alert flashes on Rob's screen.
ROB
(concerned)
We've got activity—someone's checking the transaction logs at the source bank.
PAULA
Security protocol or routine check?
ROB
(analyzing)
Hard to tell. Could be coincidence.
ARJAY
Pause the transfer. Let's see what they do.
Tension fills the room as they wait.
PACO
They're running a verification script.
TRENT
(nervously)
Are we burned?
PABLO
Not yet—their script is only checking recent timestamps, not actual balances.
ROB
They're moving on. False alarm.
ARJAY
Resume the transfer. Let's finish this first phase.
The transfer continues. Finally, a confirmation appears.
PAULA
Transfer complete. $250 million from Pakistan, rerouted through our system.
TRENT
(grinning)
Robin Hood rides again.
ARJAY
(serious)
This isn't a game, Trent. That money funded beheadings, bombings, kidnappings.
TRENT
(sobering)
Sorry. You're right.
ARJAY
Let's move to the Qatar account. Same protocol, different entry point.
The team refocuses, beginning the next phase of their operation.
ARJAY (V.O.)
People ask why we do this—why risk everything. The answer is simple: because no one else can. Governments are bound by laws, treaties, jurisdiction. We're bound only by our conscience.
As they work, a new alert appears on Paula's screen.
PAULA
Arjay, I've got something. Cell communications from Northern Syria. Keywords matching our search parameters.
ARJAY
(moving to her station)
Show me.
PAULA
Intercepted call between field operators. They're planning attacks on Aleppo and Happa. Staging from Afreen and Kobani.
ARJAY
This is exactly what INSCOM needs. Download everything, prepare a secure packet.
PAULA
Already on it.
ARJAY
(to Rob)
How's our Qatar transfer looking?
ROB
Nearing completion. $85 million transferred, $15 million to go.
PABLO
(suddenly alert)
Hold up. I've got unusual network traffic at the Qatar bank. Could be an automated security response.
ARJAY
Can you bypass it?
PABLO
(working furiously)
Working on it... they've implemented a new verification protocol since our last incursion.
PACO
I'll help reroute.
Tension builds as they work to complete the transfer while avoiding detection.
TRENT
Security sweep incoming! Thirty seconds!
ARJAY
Accelerate the transfer. Get what we can and get out.
The team works frantically.
PACO
Got it! Redirecting through auxiliary channels.
ROB
Withdrawal complete. $97 million total.
PABLO
Clean exit. Leaving minimal footprint.
ARJAY
(relieved)
Good work, everyone. That's Phase One complete.
PAULA
Arjay, you need to see this. The cell intercepts from Syria—they mentioned an American Marine being held near Raqqa.
This catches everyone's attention.
ARJAY
Are you certain?
PAULA
(nodding)
GPS coordinates included. They were discussing guard rotations.
ARJAY
This goes to INSCOM immediately. Highest priority.
TRENT
(hopeful)
They could get him out?
ARJAY
If anyone can, it's them. This is exactly the kind of actionable intelligence they need.
ARJAY (V.O.)
Sometimes the most valuable thing we steal isn't money—it's information. Information that can save lives.
The team prepares the intelligence package for transmission as we:
FADE OUT.
END OF ACT ONE
ACT TWO
FADE IN:
INT. NOC - NORTHERN ARIZONA - LATER THAT NIGHT
The team has shifted focus. Multiple screens now display surveillance footage, maps of Northern Syria, and intercepted communications data.
ARJAY (V.O.)
In our line of work, flexibility is essential. One moment we're financial hackers, the next we're intelligence analysts. All with one goal: disrupting terrorist operations any way we can.
PAULA
INSCOM acknowledged receipt of the Raqqa intelligence. No details on planned action, as usual.
ARJAY
They won't tell us, but they'll act. That Marine is coming home.
PABLO
(monitoring communications)
I've got increased chatter from the Kobani region. Something's happening.
Rob pulls up satellite imagery showing troop movements near the Turkish-Syrian border.
ROB
Turkish forces are amassing at the border but not crossing.
ARJAY
They want Kobani to fall. They've been blocking Kurdish reinforcements.
PAULA
(disgusted)
Politics.
TRENT
Meanwhile, people are dying.
ARJAY
That's why we do what we do. Paco, what do we know about the Kurdish defense chief in the region?
Paco brings up a profile on screen.
PACO
Commander Farhad Kobani. Leading the resistance with limited resources. They're outgunned, outmanned.
ARJAY
Then let's balance the scales. How quickly can we move $10 million to their operation?
PACO
(surprised)
You want to directly fund them?
ARJAY
They need heavy weapons and ammunition. They're fighting our common enemy.
ROB
(cautious)
Direct funding is risky. More traceable than our usual operations.
PABLO
I can create a ghost donor profile. Anonymous source, untraceable.
ARJAY
Do it. And set up a secure communication channel—we need to know exactly what they need.
The team begins establishing the transfer protocols while Trent continues monitoring cell communications.
TRENT
(excited)
I think I've got something big! Cell intercept between what sounds like mercenary forces.
ARJAY
(moving to Trent's station)
Mercenaries? Let me hear it.
Trent plays the audio—foreign languages with real-time translation appearing on screen.
MERCENARY VOICE (V.O.)
(translated on screen)
The assault must be coordinated with American air power. The main base will be at maximum capacity in four days.
SECOND MERCENARY (V.O.)
(translated on screen)
Our ground forces are prepared. This will end their operations permanently.
ARJAY
(to team)
Did you hear that? Someone's planning a major offensive against one of the terrorist headquarters.
PAULA
Four days' timeline. Coordinated with U.S. air support.
ARJAY
This could be the break we've been waiting for. If they hit that headquarters, it could cripple the entire network.
ROB
But we don't know which headquarters they're targeting.
ARJAY
Then we need to find out. Pablo, can you triangulate the location of that call?
PABLO
Working on it, but these guys are careful. They're using encrypted satellite phones with location scramblers.
ARJAY
Focus on signal strength and background noise patterns. Cross-reference with our known locations of terrorist activity.
PAULA
I'll help. We can use ambient sound analysis to narrow the search.
As they work, Paco completes setting up the financial transfer to the Kurdish forces.
PACO
Kurdish funding channel established. Ready to transfer when you give the word.
ARJAY
Make it happen. $10 million now, with infrastructure in place for more if needed.
Paco executes the transfer while Arjay moves back to where Paula and Pablo are working on locating the mercenary forces.
PABLO
I've narrowed it down to three possible locations, all in Northern Iraq near the Syrian border.
ON SCREEN: A map with three highlighted areas.
PAULA
(analyzing data)
Wait—cross-referencing with SIGINT from last week's communications... The mercenaries mentioned U.S. air support.
She pulls up additional data, narrowing the search.
PAULA (CONT'D)
Only one of these locations has been under U.S. surveillance flights in the past 72 hours.
She highlights a single point on the map.
ARJAY
That's it. That's their target.
ROB
(checking databases)
According to our intelligence, that's one of the largest terrorist training facilities in the region. They're reportedly training up to 20,000 fighters there.
TRENT
If that facility goes down...
ARJAY
It would be a major blow to their operations. But we can do more than just watch.
PABLO
What are you thinking?
ARJAY
If they're planning an attack in four days, the terrorists will be communicating constantly—troop movements, security protocols, supply routes.
PACO
(understanding)
And we can disrupt all of it.
ARJAY
Exactly. Let's get into their networks now. By the time the attack comes, they'll be in chaos.
The team begins mapping out a strategy for digital sabotage.
ARJAY (V.O.)
Most people think cyberwarfare is about stealing secrets or taking down power grids. Sometimes, it's simpler than that. Sometimes, it's just about making sure the right hand doesn't know what the left is doing.
INT. NOC - NORTHERN ARIZONA - MONTAGE
Paco and Trent work together to infiltrate the terrorist communication systems.
Rob creates false security alerts that send guards to empty locations.
Paula intercepts and modifies supply route information, ensuring critical supplies won't arrive.
Pablo develops a virus that will steadily degrade their radio encryption, making them vulnerable to coalition forces.
ARJAY (V.O.)
For three days, we worked tirelessly. Every communication scrambled, every security protocol compromised, every contingency plan leaked to coalition forces. By the time the attack would come, they wouldn't stand a chance.
END MONTAGE
INT. NOC - NORTHERN ARIZONA - NIGHT - DAY THREE
The team is exhausted but energized. Their operations have been running continuously.
PAULA
(checking reports)
Kurdish forces received our funding. They've already purchased artillery and anti-tank weapons from black market sources.
TRENT
That was fast.
ARJAY
War has its own economy. Money talks, especially there.
ROB
(monitoring feeds)
Update from the border—Turkey has finally allowed Iraqi Peshmerga fighters to cross into Kobani with heavy weapons.
PABLO
Our intelligence must have made an impact.
ARJAY
Or they saw which way the wind was blowing. Either way, it's good news for the Kurds.
PACO
(at his station)
Arjay, I've got something unusual. There's an encrypted communication channel we haven't seen before, originating from the target base.
Arjay moves to Paco's station.
ARJAY
Can you crack it?
PACO
Working on it. Encryption is military-grade, not their usual protocol.
As Paco works, alarms suddenly sound throughout the NOC. Red warning lights flash.
PABLO
(alarmed)
We've got a breach attempt! Someone's trying to back-trace our connection!
ARJAY
Shut it down! Now!
The team scrambles to secure their systems.
ROB
Tracing the attack—it's coming from inside their network, but it's not their usual security team.
PAULA
These are sophisticated counter-measures. Professional level.
ARJAY
Get us disconnected before they can establish our location!
TRENT
(frantically typing)
Implementing burn protocols!
PABLO
They're persistent—redirecting through our dummy servers now!
The tension builds as they fight to maintain their anonymity. Finally, the alarms stop.
PACO
(relieved)
Connection severed. We're clear.
ARJAY
(concerned)
What just happened?
ROB
(analyzing)
That wasn't their regular security team. Someone else is in their network.
ARJAY
Another player? Who?
PAULA
(realizing)
The mercenaries. They must have their own cyber team preparing for the attack.
ARJAY
We nearly compromised their operation.
PABLO
And they nearly compromised ours.
ARJAY
We need to adjust our approach. If there's another team working against the terrorists, we need to make sure we're not interfering with each other.
TRENT
But how do we contact them? We don't know who they are.
ARJAY
(thoughtful)
We don't need to contact them. We just need to stay out of their way while continuing our own operation.
PACO
I think I can isolate which systems they're targeting and focus our efforts elsewhere.
ARJAY
Do it. We'll create digital chaos, but leave their attack vectors clean.
As they regroup, Paula notices something on her monitor.
PAULA
Arjay, direct communication from INSCOM. Priority Alpha.
This is unusual enough that everyone stops to look.
ARJAY
Put it on screen.
A coded message appears.
ARJAY (CONT'D)
(reading)
"Marine extraction operation authorized. 0300 hours. Electronic countermeasures requested at target location."
PAULA
They want us to disrupt communications at the Raqqa site during the rescue operation.
ARJAY
(to team)
Change of plans. The rescue takes priority. Paco, Pablo—prepare to hit every communications system in Raqqa.
PACO
What about the terrorist base operation?
ARJAY
We'll have to trust the mercenaries to handle their end. Our Marine comes first.
The team quickly shifts focus, bringing up maps and systems for the Raqqa location where the Marine is being held.
ARJAY (V.O.)
Sometimes the hardest part of what we do is prioritizing. Every decision means helping one group at the potential expense of another. But when American lives are directly at stake, the choice becomes clear.
FADE OUT.
END OF ACT TWO
ACT THREE
FADE IN:
INT. NOC - NORTHERN ARIZONA - NIGHT - 0245 HOURS
The atmosphere in the NOC is tense. All screens are focused on the Raqqa operation. Satellite imagery shows a compound on the outskirts of the city.
ARJAY (V.O.)
In our line of work, we rarely get to see the direct impact of our actions. We move money, we gather intelligence, we disrupt networks—but the human cost, the human benefit, usually remains abstract. Tonight would be different.
ARJAY
Status report.
PAULA
Coalition forces are in position, awaiting our signal. Drone surveillance shows minimal activity at the target location.
ROB
Thermal imaging confirms eight guards, one signature matching our hostage profile.
PABLO
I've mapped their communications infrastructure. Two primary systems—radio network and hardline connections to their command center.
PACO
I can disrupt both simultaneously, but the effect will be temporary. They'll realize it's a cyberattack within minutes.
ARJAY
Minutes is all our teams need. Trent, what about their backup systems?
TRENT
They have satellite phones as backup. I can jam the frequencies, but it'll drain our resources.
ARJAY
Do it. We need complete communication blackout when our forces move in.
ROB
(checking watch)
T-minus 10 minutes.
ARJAY
Begin pre-operation protocols. Full spectrum monitoring. I want to know the second anything changes on the ground.
The team works with focused intensity.
PAULA
(suddenly)
Movement at the perimeter! Three guards repositioning.
ON SCREEN: Thermal images show guards moving to new positions.
ARJAY
Is it routine patrol or have they detected something?
ROB
(analyzing)
Pattern matches their standard rotation. Still normal operations.
PABLO
INSCOM team is holding position, awaiting our signal.
The tension builds as they count down to the operation.
PACO
T-minus 5 minutes.
ARJAY
Begin communications disruption sequence. Execute on my mark.
Paco and Trent prepare their systems, fingers hovering over keyboards.
ARJAY (CONT'D)
Three... two... one... Mark!
They execute their commands simultaneously. On the screens, the communications signatures from the compound suddenly vanish.
PABLO
Communications blackout achieved! Their network is down!
PAULA
Sending the go signal to INSCOM.
ON SCREEN: The thermal images show sudden movement as special forces troops approach the compound from multiple angles.
TRENT
(excited)
They're moving in!
ARJAY
Stay focused. Monitor for any signs their communications are coming back online.
The team watches intently as the rescue operation unfolds in real-time through thermal and satellite imagery.
ROB
(tracking)
First team has breached the perimeter. No alarm response yet.
PAULA
Second team approaching the main building from the east.
PACO
Enemy communications still dark. No sign they're restoring systems.
The operation proceeds quickly as special forces move through the compound with precision.
PABLO
They've reached the detention area.
TRENT
(concerned)
Wait—I'm detecting attempts to activate their satellite phone.
ARJAY
Block it!
TRENT
(working frantically)
Redirecting resources to jamming!
ON SCREEN: The thermal images show a firefight breaking out in one section of the compound.
PAULA
Contact! They've encountered resistance in the north corridor!
ARJAY
(intensely)
Stay with me, people. Keep those communications down!
ROB
(tracking)
They've reached the hostage. Confirmation signal received!
A moment of hope spreads through the team.
PABLO
Extraction team moving toward exfil point.
TRENT
Satellite phone jamming holding, but they're persistent.
PACO
I'm detecting attempts to reset their main communication system. Countering now.
The tension remains high as they watch the extraction team move toward their exit point with the rescued Marine.
PAULA
They're almost clear!
ARJAY
Maintain blackout until they're beyond the perimeter.
ROB
(relief in his voice)
They're out! Extraction successful!
Cheers break out in the NOC as the screens show the special forces team clearing the compound perimeter with the rescued hostage.
ARJAY
(smiling)
Good work, everyone. Maintain communications disruption for another five minutes to cover their escape.
As the team celebrates this victory, Paula notices an alert on her screen.
PAULA
(concerned)
Arjay, I'm picking up increased chatter from the terrorist headquarters location. Something's happening ahead of schedule.
ARJAY
(refocusing)
Put it on screen.
ON SCREEN: Satellite imagery shows unusual movement at the terrorist training facility they were monitoring earlier.
ARJAY (CONT'D)
The attack—it's happening now. A day early.
ROB
(checking data)
Confirmed. Airstrike patterns forming above the facility.
PABLO
Why the change in timeline?
ARJAY
They must have detected something. A security breach or intelligence leak.
TRENT
(worried)
Our earlier intrusion?
ARJAY
Possibly. Or the mercenaries' own operations.
PAULA
What do we do? We're not prepared to support this tonight.
ARJAY
(decisive)
We adapt. Paco, Pablo—redirect to the facility networks. We still have time to cause chaos before the attack hits.
PACO
Switching targets now.
PABLO
Re-establishing connection to their command network.
ARJAY
Rob, coordinate with Paula. I want all intelligence on this facility consolidated and ready to exploit.
ROB
On it.
ARJAY
Trent, monitor INSCOM channels. If they're providing air support, they might need our assistance.
TRENT
Scanning military frequencies now.
The team quickly shifts focus to the new operation, working with practiced efficiency.
ARJAY (V.O.)
Adaptability is what separates success from failure in our world. Plans change, threats emerge, opportunities appear without warning. The key is to never become fixated on a single approach.
ON SCREEN: The satellite imagery shows the first explosions hitting the terrorist training facility as airstrikes begin.
PACO
I'm in their network! Security systems compromised!
PABLO
Disabling their alert mechanisms. They won't be able to sound evacuation alarms.
PAULA
Intelligence shows they have underground bunkers. That's where leadership will head.
ARJAY
Can we seal the bunker doors remotely?
ROB
(checking)
They have electronic security systems. If we can access them...
TRENT
I've found their building management system. It's rudimentary but connected to their network.
ARJAY
Lock down everything. No exits, no safe havens.
The team executes the commands as the attack intensifies on the screens.
PAULA
(monitoring comms)
Ground forces are engaging! This is a massive operation!
PABLO
More than just mercenaries—this looks like a coalition force.
ROB
The terrorist communications are in complete disarray. They can't coordinate a defense.
ARJAY
That's what we wanted. Keep it that way.
The attack continues to unfold as they monitor and disrupt from afar.
ARJAY (V.O.)
From our hidden base in the Arizona desert, we were changing the course of a battle thousands of miles away. Not with bombs or bullets, but with code and cunning.
TRENT
(excited)
They're collapsing! Command structure breaking down completely!
PAULA
(checking feeds)
Multiple high-value targets confirmed eliminated.
PABLO
Their oil distribution network data is exposed. We should capture it while we can.
ARJAY
Download everything. That intelligence is priceless.
As the team works, a new alert appears.
ROB
(urgently)
Arjay, we've got incoming communication—direct, encrypted, on our private channel.
This is unusual enough that everyone pauses.
ARJAY
(concerned)
Source?
ROB
Unknown, but the encryption signature... it's INSCOM.
ARJAY
Put it through.
A text message appears on screen: "WELL DONE. BOTH OPERATIONS SUCCESSFUL. CONTINUE FINANCIAL DISRUPTION. MAINTAIN DENIABILITY."
PACO
(shocked)
They know. About everything.
PAULA
The money transfers, the Kurdish funding...
ARJAY
(thoughtful)
They've always known. They just needed us to do what they couldn't.
TRENT
So what now?
ARJAY
(resolute)
Now? We keep going. There's still $5 million per week we can divert from their accounts, still intelligence to gather, still terrorists to disrupt.
PABLO
And INSCOM?
ARJAY
We continue our arrangement. They get intelligence, we handle the rest.
ROB
(checking data)
Speaking of which, I've identified their oil buyer's network. We can access it, divert funds as outlined in our intel.
ARJAY
Set it up. Target the next $15 million.
The team returns to work with renewed purpose.
ARJAY (V.O.)
In the official record books, these victories will be credited to military forces, to intelligence agencies, to governments. Our names will never appear. Our actions will never be acknowledged. And that's exactly how we want it.
The screens show the terrorist training facility in flames as coalition forces secure the area.
ARJAY
Update our running totals.
PAULA
(typing)
Diversion total to date: $497 million. Donation total: $480 million.
ARJAY
Almost a billion dollars taken from terrorists and redirected to fighting them. Not bad for a small team in the desert.
TRENT
(smiling)
Robin Hood would be proud.
ARJAY
Let's make him prouder. Back to work, everyone.
The team returns to their stations with renewed purpose.
ARJAY (V.O.)
They call us the Robin Hood Virus because we take from the evil and give to those fighting for good. But unlike the legend, we don't use bows and arrows. Our weapons are keyboards and code. Our battlefield is digital. And our war is far from over.
FADE OUT.
END OF ACT THREE
FADE IN:
INT. NOC - NORTHERN ARIZONA - DAWN
Sunlight begins to filter through the few windows in the facility. The team is still at work, tired but satisfied.
ARJAY (V.O.)
Dawn always brings perspective. In the harsh light of day, you see both what you've accomplished and how much remains to be done.
Arjay stands before a wall-mounted screen showing news coverage of fighting in Syria and Iraq, the volume muted.
PAULA
(approaching with coffee)
You should get some rest. It's been 36 hours.
ARJAY
So should you.
PAULA
I've learned to sleep standing up. Comes with the territory.
They watch the silent news footage together.
ARJAY
They'll never know it was us.
PAULA
Does that bother you?
ARJAY
(shaking his head)
Recognition isn't why we do this.
ROB
(joining them)
INSCOM sent confirmation. The Marine is safe, being transported to Germany for medical evaluation.
ARJAY
And the facility?
ROB
Completely destroyed. Early estimates suggest they lost over 70% of their regional command structure.
PAULA
That won't stop them entirely.
ARJAY
No. But it buys time. And disruption.
Paco and Pablo approach, also looking exhausted but satisfied.
PACO
Financial transfers are complete. Another $15 million diverted from their oil buyer's accounts.
PABLO
And I've established the weekly automatic transfer system. $5 million per week, just like in our intelligence.
TRENT
(joining the group)
I've set up monitoring alerts. If anyone starts investigating the missing funds, we'll know immediately.
ARJAY
Good work. All of you.
He turns back to the screens, looking at the global map with its hotspots of terrorist activity.
ARJAY (CONT'D)
Get some rest. Tomorrow we start on the next target.
PAULA
There's always another target.
ARJAY
(nodding)
That's why we exist.
ARJAY (V.O.)
People ask if what we do makes a difference. If taking money from terrorists, feeding intelligence to our military, supporting those fighting on the front lines actually changes anything in the grand scheme. I don't have a philosophical answer for that.
The team disperses, heading to their rest areas within the facility.
ARJAY (V.O.) (CONT'D)
What I do know is this: Today, one Marine is going home to his family because of us. Today, a terrorist organization has half a billion dollars less to spend on weapons and recruitment. Today, Kurdish fighters have the artillery they need to defend their homes.
Arjay remains alone, looking at the screens.
ARJAY (V.O.) (CONT'D)
Tomorrow, we'll do it all again. Because someone has to. Because we can. Because in this digital age, sometimes the most effective weapon isn't a gun or a bomb—it's a virus. A Robin Hood Virus.
FADE TO BLACK
*****************************************************************
FADE IN:
INT. NOC - NORTHERN ARIZONA - THREE DAYS LATER - MORNING
The operations center is humming with renewed activity. New intelligence feeds populate the screens as the team has moved on to tracking the aftermath of their operations.
ARJAY (V.O.)
Success can be dangerous in our line of work. It breeds confidence, and confidence can lead to carelessness. We've learned to celebrate our victories quickly, then move on before complacency sets in.
Arjay stands at the central console reviewing data as the team works at their stations. A large digital counter on the wall shows: "TOTAL FUNDS DIVERTED: $512,000,000."
PABLO
(analyzing data)
The terrorist network is scrambling to secure their remaining financial assets. They've moved accounts three times in the last 72 hours.
ARJAY
And we've followed them each time.
PAULA
(bringing up new intelligence)
INSCOM's latest data packet suggests they're becoming paranoid. Internal purges, accusations of embezzlement.
TRENT
(grinning)
They're tearing themselves apart looking for the leak.
ARJAY
That's a bonus, but don't get too comfortable. They'll adapt eventually.
ROB
(at his station)
New intelligence coming in from Kobani. The Kurdish forces have successfully used our funded artillery to push back three coordinated attacks.
Arjay moves to Rob's station to review the incoming data.
ARJAY
Casualties?
ROB
Minimal on the Kurdish side. The heavy weapons made the difference.
PACO
(interrupting)
Arjay, I've got something urgent. Major spike in encrypted communications from a new cell we haven't seen before.
ARJAY
Location?
PACO
That's the thing—it's bouncing between servers in Qatar, Yemen, and Pakistan. Very sophisticated routing.
ARJAY
(concerned)
They're adapting faster than expected. Get me a communications pattern analysis.
As Paco works, Paula notices something on her own screen.
PAULA
I'm seeing similar patterns in financial transactions. Small amounts, multiple banks, complex routing.
ARJAY
They're testing new methods. Establishing new infrastructure.
TRENT
(worried)
Are we about to lose access?
ARJAY
Not if we move quickly. Pablo, set up surveillance on these new communication channels. Rob, track those financial patterns.
PABLO
Already on it.
ROB
This feels different, Arjay. More professional.
ARJAY
(nodding)
Someone new is advising them. Someone who knows how to counter cyber operations.
The team exchanges concerned looks as they realize the implications.
PAULA
A state actor?
ARJAY
Possibly. Or former intelligence who've gone mercenary.
PACO
(working at his station)
I've isolated one of the communication nodes. The encryption is... wait, this is familiar.
ARJAY
(moving to Paco's station)
Show me.
ON SCREEN: Complex encryption patterns that seem somehow recognizable.
PACO
I've seen this pattern before in...
(realizing)
This is modified NSA protocol.
A heavy silence falls over the room.
ARJAY
American encryption methods?
PACO
Modified, but yes. The architecture is unmistakable.
TRENT
(confused)
Why would terrorists be using American encryption?
ARJAY
They wouldn't. Unless...
PAULA
(understanding)
Unless they have American help.
ROB
(grim)
Or they've captured American intelligence assets.
ARJAY
(decisive)
This changes everything. Paula, prepare a secure communication to INSCOM. Priority Alpha.
PAULA
What do we tell them?
ARJAY
The truth. That their encryption methods have been compromised.
As Paula begins composing the message, a new alert sounds on Pablo's station.
PABLO
(urgently)
We've got incoming—someone's probing our network perimeter!
ARJAY
Source?
PABLO
(working frantically)
Unknown, but the attack signature matches what we just identified—the modified NSA protocols.
ARJAY
They're hunting us. Lock everything down. Defensive protocols, now!
The team scrambles to secure their systems as attack warnings flash on multiple screens.
TRENT
(panicked)
How did they find us?
ARJAY
Focus, Trent! Execute Protocol Blackout.
ROB
(working fast)
Deploying honeypot diversions. Redirecting their probes to our dummy servers.
PACO
They're persistent—and good. They've already bypassed two security layers.
ARJAY
Implement full system isolation. Cut all external connections except the secure INSCOM line.
Pablo hits a series of commands, and many of the screens go dark as systems disconnect from external networks.
PABLO
System isolation complete. We're dark.
ARJAY
(to Paula)
Status on the INSCOM communication?
PAULA
Sent and acknowledged. They're requesting we maintain connection for further instructions.
The attack warnings continue, but with reduced intensity now that most systems are isolated.
PACO
Attack intensity decreasing. They can't find what they can't see.
ARJAY
(thoughtful)
This wasn't random. They were specifically targeting us.
ROB
How is that possible? Our operation is completely off the books.
ARJAY
Someone knows. Question is: who?
A new message appears on Paula's secure terminal.
PAULA
INSCOM is responding. Text only.
The team gathers around her screen to read: "MAINTAIN ISOLATION. COUNTER-INTELLIGENCE OPERATION IN PROGRESS. POSSIBLE INTERNAL COMPROMISE. STANDBY FOR SECURE CONTACT."
TRENT
(alarmed)
Internal compromise? They think there's a mole?
ARJAY
Or they've been breached. Either way, we're vulnerable.
PABLO
Should we relocate? If our location is compromised—
ARJAY
(interrupting)
No. If we move now and we're being watched, we'll confirm our identities. We stay put, maintain isolation, and wait for secure contact.
ROB
(checking systems)
Attack probes have stopped. They've withdrawn.
PACO
For now. They'll be back with a different approach.
ARJAY
Which gives us time to prepare. Pablo, begin system-wide security audit. Paco, review all our recent network activity for anomalies.
PAULA
What about our ongoing operations? The weekly transfers?
ARJAY
(after a moment's thought)
Suspend all financial operations. Intelligence gathering only, and only through isolated systems.
The team moves to their tasks with renewed urgency.
ARJAY (V.O.)
In our business, paranoia isn't just healthy—it's essential for survival. The moment you think you're safe is the moment you become vulnerable.
INT. NOC - NORTHERN ARIZONA - NIGHT
The team has been working for hours in isolated mode. The atmosphere is tense, with only essential systems running.
PABLO
Security audit complete. No signs of internal compromise that I can detect.
PACO
Network activity analysis shows the probing began approximately 18 hours after our operation against the terrorist base.
ARJAY
Too quick for a coincidence. They were waiting for us to show ourselves.
ROB
(at his terminal)
Incoming transmission on the INSCOM secure channel. Video conference request.
This is unusual enough that the team exchanges concerned glances.
ARJAY
(cautious)
Accept, but route through our identity protection filters.
Rob executes the commands. A screen activates showing a silhouetted figure, voice altered.
INSCOM FIGURE
(disguised voice)
Authentication code Tango-Echo-5-9-4-Delta.
Paula checks the code against her database and nods to Arjay.
ARJAY
Code authenticated. Secure channel established.
INSCOM FIGURE
Your operation has been compromised. We believe a third party has identified your team's digital signature.
ARJAY
Who?
INSCOM FIGURE
Unknown, but they're using classified methods. We have reason to believe they infiltrated the terrorist networks you've been targeting specifically to find you.
TRENT
(shocked)
They used terrorists as bait for us?
INSCOM FIGURE
Correct. Your team's activities have drawn attention from multiple intelligence agencies. Not all friendly.
ARJAY
What's your recommendation?
INSCOM FIGURE
Immediate cessation of all operations. Complete digital shutdown for a minimum of 72 hours.
The team looks to Arjay, waiting for his decision.
ARJAY
And the intelligence we've been providing?
INSCOM FIGURE
Alternative channels have been established. Your safety has been compromised. You need to disappear.
PAULA
(suspicious)
Convenient timing. Just when we've discovered American encryption protocols being used by terrorists.
INSCOM FIGURE
(brief pause)
That information is precisely why you need to go dark. You've stumbled onto something bigger than your operation.
ARJAY
(challenging)
Or we've exposed something you didn't want found.
Another pause from the figure.
INSCOM FIGURE
We'll establish contact through alternative means when it's safe. Go dark. Now.
The transmission cuts off abruptly.
ROB
What do we do?
ARJAY
(thoughtful)
They're right about one thing—we need to disappear. But not in the way they think.
PABLO
What are you suggesting?
ARJAY
We have evacuation protocols for a reason. It's time to use them.
PAULA
(understanding)
Ghost site activation?
ARJAY
(nodding)
Pack essential equipment only. We move to Site B in one hour.
TRENT
(confused)
But we're going dark, right?
ARJAY
(with a slight smile)
We're going to make them think we've gone dark. Meanwhile, we continue our investigation from Site B—off all known networks.
PACO
You don't trust INSCOM anymore?
ARJAY
I trust that someone is very interested in shutting us down right when we've discovered something significant. That makes me curious.
ROB
(concerned)
This is bigger than our usual operations, Arjay.
ARJAY
That's precisely why we can't stop now. Someone is using American encryption methods to protect terrorists. I want to know who—and why.
The team begins shutdown and evacuation procedures, moving with practiced efficiency.
ARJAY (V.O.)
Sometimes the most dangerous discoveries aren't the ones you go looking for—they're the ones that find you when you're looking for something else entirely.
EXT. NOC - NORTHERN ARIZONA - NIGHT
The team loads essential equipment into nondescript vehicles. The facility behind them appears to be powering down, lights going out systematically.
ARJAY (V.O.)
For years, we'd operated on a simple premise: find the bad guys, take their money, help the good guys. But now we were facing the possibility that the line between good and bad wasn't as clear as we thought.
The team completes loading and gathers for a final briefing.
ARJAY
Once we leave, this location is burned. No returning under any circumstances.
PAULA
Ghost protocols are active. Anyone monitoring will see a complete systems shutdown.
ROB
Decoy digital trail suggests we've scattered to four different locations.
ARJAY
Perfect. We move as planned—convoy formation, communication blackout until we reach Site B.
PACO
(checking a secure tablet)
The automated transfers we've been tracking—they're still running. $5 million moved to terrorist accounts just an hour ago.
ARJAY
(surprised)
Their operation is continuing despite the attack on their base?
PABLO
(looking at the data)
No... this is different. The money is moving in the opposite direction now.
TRENT
What?
PABLO
Previously, we were tracking $5 million weekly flowing from legitimate sources to terrorist accounts. Now it's terrorists transferring money out.
ARJAY
(realizing)
They're not funding terrorism. They're extorting from terrorists.
PAULA
A third party using the terrorists' own infrastructures against them... just like us.
ARJAY
But who?
The team stands in silent contemplation of this revelation.
ROB
(checking watch)
We need to move. Now.
ARJAY
(nodding)
To Site B. And to answers.
They move to their vehicles and drive away from the facility, which now sits dark and abandoned in the desert night.
ARJAY (V.O.)
The Robin Hood legend ends with justice triumphant and the wicked punished. Real life is rarely so neat. Sometimes you discover you're not the only archer in Sherwood Forest—and not everyone is aiming at the same target.
FADE OUT.
END OF ACT FOUR
FADE IN:
EXT. SITE B - MOUNTAINOUS AREA - NORTHERN ARIZONA - DAWN
A seemingly abandoned mining facility built into the side of a mountain. The team's vehicles approach along a dirt road, kicking up dust in the early morning light.
ARJAY (V.O.)
Contingency planning is what separates professionals from amateurs. Site B was established three years ago—a completely isolated facility with no digital connection to our primary operations. As far as the world was concerned, it didn't exist.
The vehicles pull into a concealed entrance that opens automatically as they approach.
INT. SITE B - OPERATIONS CENTER - DAWN
Unlike the modern, high-tech facility they left behind, Site B is more rudimentary—essential equipment only, older systems, backup generators. The team quickly begins setting up their critical equipment.
ARJAY
Status check.
PAULA
No signs of digital tracking. Ghost protocols at the primary site are functioning.
PACO
(setting up equipment)
Essential systems coming online. We'll have basic operational capacity in twenty minutes.
ROB
Perimeter security active. Motion sensors, thermal imaging, old-school tripwires.
PABLO
Communication systems are independent and secure. No connection to outside networks.
TRENT
(looking around)
This place is... retro.
ARJAY
Sometimes older is safer. No internet connection means no remote intrusion.
PAULA
What's our next move?
ARJAY
(determined)
We focus on what triggered the hunt for us—the modified NSA encryption used by the terrorists.
PACO
Without external connections, we're limited in what we can investigate.
ARJAY
That's why we brought this.
He opens a secure case containing hard drives.
ARJAY (CONT'D)
Complete dumps of everything we captured during our operations. Offline and untraceable.
ROB
(impressed)
You've been planning for this.
ARJAY
Hope for the best, prepare for the worst. Standard operating procedure.
The team begins setting up analysis stations as Pablo connects the secure drives.
PABLO
Where do we start?
ARJAY
The encryption protocols. Find out where they originated, how they were modified, who had access.
PAULA
That could implicate people inside our own government.
ARJAY
(gravely)
I know.
ARJAY (V.O.)
The thought had crossed my mind from the beginning—that perhaps our operation wasn't as rogue as we believed. That perhaps we were always meant to be deniable assets, doing the dirty work others couldn't acknowledge.
The team works in silence, setting up their equipment and beginning their analysis.
TRENT
(suddenly)
I think I found something.
The team gathers around his station.
TRENT (CONT'D)
The communication logs we captured from the terrorist base—there are patterns in the encrypted traffic. Regular transmissions to an unlisted server.
PACO
(analyzing)
That's not just any server. Based on the routing... that's a military contractor.
PAULA
(alarmed)
Domestic?
PACO
(nodding)
U.S.-based. Private military corporation.
ARJAY
Which one?
PACO
Working on it... the identifier is obscured, but cross-referencing with known contractors...
(surprised)
It's Axiom Defense Solutions.
This name clearly has significance as the team exchanges concerned looks.
ROB
Axiom? They're one of the largest military contractors in the world.
PABLO
And deeply embedded with intelligence operations in the Middle East.
ARJAY
Keep digging. What's the nature of the communications?
Trent and Paco work together, analyzing the encrypted data.
TRENT
It's heavily encrypted, but based on transmission patterns and packet size, these look like... payment confirmations.
ARJAY
(connecting dots)
Axiom is receiving payments from terrorist organizations?
PAULA
Or someone using Axiom's systems is.
ROB
(grim)
Either way, it's treason.
ARJAY
And explains why someone wants us shut down. We've discovered a direct financial link between American contractors and terrorist organizations.
PABLO
What do we do with this information? We can't take it to INSCOM if we don't know who to trust there.
ARJAY
(resolute)
We gather more evidence. Concrete proof that can't be denied or covered up.
PAULA
And then?
ARJAY
Then we make sure it reaches people who can't ignore it—multiple agencies, oversight committees, trusted journalists.
TRENT
(nervous)
We're talking about exposing corruption at the highest levels. People die for less.
ARJAY
People are already dying because of this corruption. Civilians, soldiers, hostages.
The gravity of their discovery settles over the team.
ROB
(checking security monitors)
Movement at the perimeter! Vehicle approaching.
Tension instantly fills the room as Arjay moves to check the security feed.
ON SCREEN: A single SUV approaching the concealed entrance.
ARJAY
(surprised)
It's stopping at the exact entry point.
PAULA
That's impossible. No one knows about this location.
PABLO
(checking)
No signs of a larger force. Single vehicle, appears to be two occupants.
ARJAY
(to Rob)
Weapons check.
ROB
(opening a secured cabinet)
Armed and ready.
PACO
(watching monitors)
They're just sitting there... waiting.
A text message appears on their emergency communication system.
TRENT
(reading)
"Friends. Need to talk. Knowledge of Axiom. Not hostile."
ARJAY
Could be a trap.
PAULA
Or it could be a legitimate contact. Someone else who's discovered what we have.
ARJAY
(making a decision)
Pablo, Trent—continue the analysis. Everyone else, security positions. I'll make contact.
PAULA
(concerned)
Arjay—
ARJAY
I've been doing this long enough to know when to take calculated risks. This is one of those times.
He takes a weapon from Rob and moves toward the entrance.
EXT. SITE B - ENTRANCE - MOMENTS LATER
Arjay emerges cautiously from a concealed door, weapon ready but not raised. The SUV sits fifty yards away, headlights on in the early morning light.
After a tense moment, the driver's door opens, and a man steps out, hands clearly visible. He's in his 60s, distinguished, with the bearing of someone from the intelligence community.
MAN
(calling out)
Beautiful morning for a resurrection, isn't it, Arjay?
Arjay tenses at the use of his name.
ARJAY
(cautious)
Who are you?
MAN
Someone who knows about Axiom. Someone who knows what you've discovered. And someone who can help you use it.
ARJAY
And why should I trust you?
MAN
(smiling slightly)
Because I'm the one who authorized your Robin Hood operation in the first place. Five years ago. Though I must say, you've exceeded expectations.
Arjay's expression shows surprise mixed with wariness.
MAN (CONT'D)
We have mutual friends at INSCOM. And mutual enemies at Axiom.
He reaches slowly into his jacket and removes an ID card, holding it up.
MAN (CONT'D)
Deputy Director, Special Activities Division. And I believe we have a lot to discuss about the future of your operation.
Arjay studies him for a long moment.
ARJAY
You'd better come in. But your driver stays with the vehicle.
MAN
(nodding)
Reasonable precaution.
As Arjay leads him toward the entrance, we pull back to a wide shot of the facility built into the mountain, bathed in the golden light of dawn.
ARJAY (V.O.)
They say knowledge is power. In our world, the right knowledge at the right time is something far more valuable—it's survival. And maybe, just maybe, a chance to make an even bigger difference.
FADE TO BLACK.
This site is designed
and maintained by:
Robert Nerbovig
| | | |