THE ROBIN HOOD VIRUS
A Book of Fiction by
Robert Nerbovig
© 2015
In accordance with the U.S. Copyright Act of 1976, the scanning, uploading, and electronic sharing of any part of this book without the permission of the publisher constitute unlawful piracy and theft of the author’s intellectual property. If you would like to use material from the book (other than for review purposes), prior written permission must be obtained by
contacting the publisher at:
[email protected]
Table of Contents
Ch. Title
1 Virus, Hospital infection
2 Team, Device, Location
3 Wall Street Incursions
4 Hospital Foundation Startup
5 World Wide Military Tactics
6 Discovering Terrorist Activities
7 Hacking the Hackers
8 Virus Infection Definitions
9 Cyber Warfare Combat & Tactics
10 Major Oil Cartel Infection
11 Funding Political Donations
12 Attempts to Steal The Virus
PREVIEW OF BOOK TWO
THE ROBIN HOOD VIRUS – DISCOVERY
Virus, Hospital Infection
This story centers around a computer virus that we will call "The Robin Hood virus". This computer virus is undetectable and will never be discovered. This virus utilizes a back-door that has never been thought of or used in the black-hat hacker world. We also developed the same type of intrusion system to locate and enter cell phone's and monitor all suspicious calls by screening keywords that we have chosen. This virus we have labeled "ranger". When we encounter a keyword we then utilize our locator software to determine the location of the caller's computer and enter the caller’s computer and the recipient's computer to examine their plans and motives. If we determine that they are engaged in illegal activities, violating the rule of competitive fairness, or plotting against
the United States we will take aggressive
action to stop them in their tracks and empty their bank accounts. We will divert resources (goods and money) to non-profit entities such as food banks, homeless shelters, orphanages, families going thru catastrophic health issues, small rural hospitals struggling to survive, a new world rural hospital start-up, etc. We will find other needy groups or individuals to help with the fruits of our labor. If the world ever finds out the fact that we are invading their computer systems and cell phones, without detection, and what we are doing with the information we are gathering, the manner in which everyone uses their computer systems would change drastically.
We have identified many major hospital corporations that are suspected of price
fixing with their competition and with the
insurance companies to garner larger claim
payments. This is one of the major causes of rising healthcare costs. No one seems to be able to correct the situation. The hospitals and the insurance companies are profit-motivated while the private citizen is concerned about paying exorbitant prices. We will remedy the situation by forcing the hospital corporations to comply with national averages and if they refuse to comply, report the illegal activities to proper authorities, anonymously.
Our team communicates with the network
operations center in Arizona using encoded emails. One of the encoded emails came in from Duck. He alerted us to a Medical Hospital Network that was overcharging and not paying claims. He identified "Missions Hospital Corporation" (MHC), as one of the
many large medical corporations engaged in price-fixing. We have constructed a plan
of attack to enter their computer systems,
including all nodes on the network, to gather specific evidence supporting the fact they are rate-fixing and the manner in which the scheme is occurring. They have set their rates at a very high level by buying specialty or rural hospitals where there are no nearby competitors. They have not set their rates based on cost but rather on the profit dictates of their stockholders. We believe this ruthless pricing system and its unfair competitive advantage is an inappropriate price mechanism for the vulnerable health and aged care sectors. Uninsured patients are not given the 25-50% discounts given to insured patients. We will change this unfair practice.
The Chairman was sitting in the boardroom reading a letter that we sent based on information we gathered based on
our invasion into the MHC systems. The
letter stated that there is evidence that his corporation, "Missions Hospital Corporation" (MHC) has been active in the illegal practice of price-fixing. The letter states that we will name employees, other corporations, officers of the corporation, and affiliated doctors. We have copies of emails, old and new price master files, erroneous cost reports required by the Center for Medicare & Medicaid Services. We have copies of patient bills as submitted to the insurance companies and the explanation of benefits received for those claims. We also have a copy of an illegal agreement between MHC
and the PHO, "physician hospital
organization", with virtually all of the city's physicians that fixed the prices they would charge, and proposed a requirement that the doctors perform at least 30 percent of their outpatient
services, radiology and minor surgery, at the hospital. Doctors who refused were threatened with being barred from practicing at the Hospital, the only acute-care hospital in the area. The effect was that virtually all the doctors in the city were taken by the hospital, and managed-care companies could not enter the healthcare market because they could not find doctors to employ in their plans.
Waiting for the rest of the board members to arrive, the Chairman was furious. He was wondering how the secret details concerning the hospital's agreements concerning rate fixing were
discovered. He suspected a leak in his organization. Why would anyone on his team betray him? He made sure those who knew the details of the insider transactions were paid very well. Most were close friends who he knew would not divulge
secret corporate information. He purposely kept key details in the hands of separate key officers. He was the Chairman and he was the only person who knew all the parts of the scheme. The board members arrived and the meeting came to order. The Chairman made the following announcement, "We have received a very disturbing notice from an anonymous source that accuses us of price-fixing. I will be conducting individual meetings with all directors when this meeting adjourns to find out specifics on this matter. We will find out where
this is coming from and what information
they are referring to. "We do not practice price-fixing". The regular business of the corporation continued for the duration of the meeting.
After the meeting the Vice President of the corporation was called into the Chairman's office. The discussion centered
on the information alluded to in the letter. The Chairman inquired as to any contact with the media and if discussions that took place, what was discussed and who was the reporter. He was trying to discover the origin of the leaked
price-fixing specifics. The Vice-President assured the Chairman he did not discuss price-fixing with the reporter.
Later that day the Chairman met with the Chief Financial Officer in his office to discuss the price-fixing leak. The CFO
assured the Chairman he did not discuss
what he knew about the plan with anyone.
The Chairman then met with the President of the corporation to find out what he knew about the problem. The President indicated he met with the publisher of the paper at lunch one day last week and they talked about the contracts with the physicians but no specifics were discussed. The Chairman
met with the IT Director. The discussion centered on t
he possibility of a computer virus. Many of the emails contained on the hospital computer network contained specifics about physician contracts, all of the old and new price files, contact with other hospitals concerning prices, and the discussions with board members concerning the need to raise the profit margin. The Chairman was sure it was a virus that exposed the emails.
What the Chairman didn't know is that
we entered the personal computers of all
the officers, board members, and doctors who had a financial agreement with the hospital network. It was on those private computers were we gained most of our evidence.
The Chairman and the I.T. Director discussed various methods to determine if the network has been hacked. The I.T.
Director indicated that the culprit could be a "worm", that is a program very similar to a virus; it has the ability to self-replicate and can lead to negative effects on your system.
Worms generally spread through emails and networks. The invader could also be a "Trojan" a breed of malicious code, which unlike viruses, do not reproduce by infecting other files, nor do they self-replicate like worms. In fact it is a program that disguises itself as a useful
program or application. These viruses copy files in your computer (when their carrier program is executed) that can damage your data, and even delete it. The attacker can also program the Trojans in such a manner that the information in your computer is accessible to them. It was determined that the most likely infection is a Trojan. It has copied the files and emails from the
entire network. A Plan was discussed to discover and eliminate the Trojan. The next morning the Chairman received a phone call from one of the board members informing him that his wife had been seen having lunch with the Publisher of the paper. The chairman's wife is a Physician working for MHC as a Pediatric surgeon. She is well aware of all the special arrangements between the doctors and MHC.
The major concern of the Chairman is
the leaking of the specifics of the Physician arrangements. The Chairman is curious about the meeting between his wife and the publisher. Was information concerning the Physician contracts divulged? The Chairman had a discussion with his wife that evening. She was
adamant that she never discussed the physician's contracts. The purpose of the
meeting concerned the upcoming Medical Fair
that will be held at the hospital.
The next morning the Chairman decided to meet with the IT Director to initiate a plan to upgrade all computer hardware to the latest version and copy software and files one-by-one to try and eliminate the virus. They would replace 24 rack-mounted servers and 650 desktop computers. This massive undertaking would take several weeks and cost 2.5 million dollars. The servers and desktops would be phased in by
each department starting with administration. The servers are used to accumulate all data from all 23 hospitals in the network. This centralized data center enables the reporting of patient and financial data from all hospitals in the network in a timely manner. We have completed a $12,000,000.00 wire transfer with the authorization of the Chairman and
the President of MHC. Of course they would
find out about the transfer....after the fact. We transferred the 12 million to one specific offshore account. From this offshore account we will transfer set amounts to various other offshore accounts in countries throughout the world. From these accounts we will donate to our non-profit, needy, and start up recipients. The transfers will be accomplished
immediately to get the funds into the hands
of groups that most need it and put it to good use.
We have assured the Chairman that if all of the price master files used by MHC were not changed to reflect cost + 15% for their goods and services, the off-shore wire transfer would be repeated. We installed our logo:
into their system and setup their system to print the logo on the lower right hand corner of all financial documents. They will know we are watching. We gave the Chairman 30 days to make this request happen. We repeated our notification that we are in his system and will stay there to monitor the corporation and insure fairness in all of its' activities.
The wire transfer dollars are automatically distributed to various recipients based on a pre-determined schedule. We have anonymously distributed:
$10,000 to 100 Homeless shelters
$10,000 to 100 food banks
$10,000 to 100 domestic abuse shelters
and we will continue to donate to organizations like this each month. We will continue to donate the above amounts to various charities at a rate that matches
the amounts in the offshore accounts. As the amounts increase the number of charities and amounts donated will increase. We expect to donate 50 million dollars per month based on our invasion into corrupt companies, countries, and hackers. We will make anonymous
contributions to organizations such as:
AIR FORCE AID SOCIETY
ALZHEIMER'S DISEASE RESEARCH
AMERICAN ASSOCIATION OF STATE TROOPERS
AMERICAN BREAST CANCER FOUNDATION
AMERICAN CANCER SOCIETY
AMERICAN RED CROSS
AMERICANS FEEDING AMERICANS
FEED THE CHILDREN
AMVETS NATIONAL SERVICE FOUNDATION
ARMY EMERGENCY RELIEF
AVON WALK FOR BREAST CANCER
BREAST CANCER RESEARCH FOUNDATION
A CHILD'S WISH FOUNDATION
DISABLED AMERICAN VETERANS
INTREPID FALLEN HEROES FUND
KIDS WISH NETWORK
MACULAR DEGENERATION RESEARCH
MILITARY ORDER OF THE PURPLE HEART
SERVICE FOUNDATION
NAVY-MARINE CORPS RELIEF SOCIETY
PARALYZED VETERANS OF AMERICA
SALVATION ARMY
SOLDIERS' ANGELS
We have also donated $50,000,000 to the non-profit world-wide hospital corporation that we will describe later. These donations will be in the form of PayPal transactions using a valid email address with a fictitious name. There will be no way to track the donor.
We continue to gather names of organizations and individuals who have demonstrated the need for support and none
is available. We donate to families fighting serious illnesses with little or no financial aid. We have found many, many situations in which lives can be saved if the financial obstruction is removed. In
most cases the sick and dying cannot wait for help, they need it now. When we find those situations we immediately donate via PayPal using a fictitious name.
While investigating emails and other documents in the MHC network (including private computers belonging to the officers and employees) we discovered private emails between the President of MHC and a private investigator. The President is trying to determine if the CFO is embezzling money
from the corporation. It seems the CFO is diverting money from MHC to his medical
equipment company. The PI has determined that MHC has suspected embezzlement on behalf of the CFO for the last 60 days and
is trying to gather enough evidence to prosecute. The President of MHC suspects the CFO of hacking the network for his benefit or that of a third party. The CFO is also the primary suspect in the hacking
of the system that diverted $12,000,000 from the company. The 12 million diversion was leaked to the news media and has spread all over the world. Terrorism is suspected and the blame is being placed on China, North Korea, or Russia. The story has
prompted a major federal investigation involving the FBI, Homeland Security, and the Medicare and Medicaid Fraud Control Units. All MHC records have been seized and the CFO has been taken into custody. The CFO is maintaining his innocence and is asserting that the MHC computer network has been hacked and the 12 million dollars was stolen by the hackers. It will be difficult for the CFO to defend himself as
he is actively involved with 2 friends in a software company that is being watched by the FBI. They are suspected of hacking a comp
eting medical equipment company to
obtain proprietary trade secrets about a new piece of equipment to monitor cardiac enzymes.
The CFO'S partners are very accomplished hackers who have been under surveillance for months.
DOLLARS EXTRACTED TO DATE $102,000,000
DONATION TOTAL TO DATE $94,000,000
The Team, Device, and Location
We have assembled a very knowledgeable and loyal team consisting mostly of former military veterans who know the value of protecting each others backs. They have served in Iraq, Vietnam, Afghanistan, the USA, and the pentagon. Both their military duties and their civilian duties involved computer programming, or network set-up and analysis, or database creation and maintenance. We all have a current mission to help eradicate hacking and the damage that is done by hackers.
We have occupied the computer networks of various government agencies including the IRS, the FBI, and several District Attorney's offices. We are monitoring these systems to find companies under surveillance for fraud, or other illegal activities. We are currently in
the process of reviewing various companies, individuals, and countries to establish a schedule of computer entry. When we find violators we will enter their computer systems and cell phones to determine the improper activity and assess a proper penalty.
Our team consists of:
TEAM LEADER
Arjay, a former hospital controller with an intricate knowledge of computer hacking techniques and methods who has been programming computers for over 40 years mainly in healthcare. He has written systems for hospitals, nursing homes, medical clinics, and medical and dental offices. He also programmed one of the first electronic medical billing systems in the country. He has re-constructed computer systems after severe virus attacks
and has been instrumental in designing and developing anti-virus software programs. He is a consultant to many firms requiring virus protection and virus eradication programs.
The Robin Hood Virus Page 1