The Robin Hood Virus
Page 2
SOFTWARE ENGINEER
Paula, our software engineer, has 35 years experience designing and developing business applications. She has extensive knowledge in designing database systems for efficient, secure operations. She also has experience writing and testing anti-virus software for large entities.
NETWORK SECURITY SPECIALIST
Paco, our network security specialist, has been actively involved in protecting vital government military installations both in Iraq and here in the United States. He has implemented anti-virus network
protection and the tools to determine intruders and their location. He has supported security operations for an academic enterprise, the U.S. Army at a forward operating base in Iraq, he constructed and monitored very large wide area networks to prevent intrusion. His background and experience more than qualifies him for Manager of Cyber warfare.
MEDICAL SERVICES MANAGER
Duck is a retired hospital administrator with 38 years experience in small rural hospitals who will head our Medical Services Division. He has defined proper business conduct for the medical service industry and the he will oversee the entry, the verification of business practices, and planned corrective action if business violations occur(rates too high, etc.). The medical services division will
also oversee the "World Rural Hospital Corporation" (WRHC).
DATABASE/WEB DEVELOPER
Trent, our database/web developer, has 25 years experience designing and developing very sophisticated index methods for storing and tracking various business operations. He has written complex web pages for various clients in various vertical markets.
TELEPHONE NETWORK ENGINEER
Pablo is our telephone network expert who has been designing and developing telephone networks and software for the last 15 years. He has installed numerous, very complicated, telephone networks all over the world.
LANGUAGE, LINGUISTICS EXPERT
Rob, our language expert, is proficient in several languages including Arabic, Farsi, and most languages in the middle east. He has designed language conversion programs that we will use to monitor conversations of suspected violators.
Our team leader has had a desire to develop a secret, back-door device that could be used to break into any computer, anywhere in the world without detection and down thru the years the team leader has constructed various models and tested them successfully. This has brought him to this point in time where the current devices have been working, without detection, for the past 4 years.
We use our team members, working in their desired vertical market, to discover private, corporate, and governmental
hacking, foreign and domestic, by entering various large computer networks to extract or divert resources for humanitarian purposes.
We have invented a group of computer devices and cell phone devices that does just that! We have entered the computer systems of suspected individuals, companies, and governments engaged in illegal activities with spectacular results.
We have established offices throughout the world in the most desirable vacation locations chosen by our team members. They will spend 6-9 months at each location before moving to another location of their choice. We established a non-profit foundation for each team member in order to receive our anonymous donations for operating expenses. The team leader will operate the network operations center from
the basement in his log home in Arizona. All of the daily operating specifics will be handled using encoded emails. We set up data encryption for transferring data communications. We have developed a very complex encryption algorithm. There is no
known cryptanalysis of our algorithm. Because of the need to ensure that only those eyes intended to view our sensitive information can ever see this information, and to insure that the information arrives un-altered, our security systems ENCODE THE DATA PRIOR TO ENCRYPTION.
We have also developed codes for critical information...dollar amounts, people, team members, locations, weekly progress and new ideas.
Our team has the necessary hardware and software to perform all of the necessary intrusions. They are able to be very productive in any and all locations.
Our security team is continuing to enter into the computer systems of large corporations to determine overpricing, product monopoly, business coercion, hacking, and dishonest activities on behalf of corporations, politicians, and foreign governments. When we find illegal or improper activities that are conducted by these entities we will extract money and resources and divert it to the non-profit endeavors that we have previously
identified and make those donations in a pre-determined timeframe. We will also warn the offending entity if the illegal or improper activities continue, we will extract more severe penalties.
We are continuing to enter various networks and we perform our tasks without detection. The results of these intrusions will be divulged in further chapters. We continue to enjoy the occupation of the
computers that we have entered. There is no way to determine who we are, how we entered their system, or what we are accessing in their systems.
We have developed an extensive package of computer programs that will enable us to modify hacker software. The modifications include:
1. Publishing their I.P. Address of all hacked computers.
2. Logging all computers that they attack.
3. Nullifying all negative impact of the hacking attempt.
This will allow us to have a log of all of their intrusions so a severe penalty can be assessed. We hope that once the existence of this anti-hacker software is made public that eventually hackers will be dissuaded from hacking. We will make the penalties
extremely severe. We will obtain I.P. addresses of suspected hackers from the computer systems of Homeland Security, the IRS, the FBI, existing hacked companies, the defense department, and the state department. That will give us a very good starting point on which base our initial intrusions. We will describe the results of our hacker intrusions in a later chapter.
One of the devices that we have developed is used to determine the exact location of the target computer system. We have a checklist of computer systems that we will enter. We will enter each system on our schedule. Once in the computer system we will create, modify, delete, and email documents as necessary to accomplish our mission.
We keep a log of all systems we enter including the entry specifics, task,
operational specifics, results obtained, and reactions of the system owner, if any.
The network computer invasion system(NCIS) consists of several software programs and several pieces of hardware that are used for various coupled processes that determine a target, locate its' exact coordinates, execute the mapping program, determine the extent of the network, log node addresses for entry, connect to the nodes simultaneously, perform basic functions to determine proper business conduct and take appropriate action. The data will be logged to facilitate the re-entry into all of these networks.
We have established a very extensive set of conditions to guide us thru computer entry, evaluating business operations, and setting the standards for proper business conduct based on the type of business and
the violations that are occurring. We
utilize our scanning alert system to identify prospective violations. We have also established a set of dollar penalties
based on the type and severity of the of the misconduct. We have developed a formula for off-shore dollar transfers and which charities or organizations to donate to on a daily, weekly, and monthly basis.
We conduct our activities from our operations center located in an underground bunker(NOC) in the basement of a large log home(owned by the team leader) located in the mountains of Arizona on 10 acres with 500 feet of lakefront property. We designed the secure bunker with these features:
We built it in the right location, quiet, picturesque, and ultra secure.
We have redundant utilities, electricity, water, voice and data.
When we bui
lt the log cabin we
designed the basement to have foot-thick walls and foundation.
We designed our network operations center to have the utmost flexibility for data storage, transmission and flexibility. We have designed our data storage with 2 RAID DRIVES (15TB each), a standalone server that we can access remotely from our desktop, multiple mirrored drives that are hot swappable from the front of the cabinet with 8gb of DDR2 dual channel memory and hi speed 64bit quad processors, a 64gb desktop that we use to control the server, and a 14 foot 55" LCD video wall with 16 screens capable of displaying 12 companies each and including interactive touch. We designed this video wall in order to instantly control up to 182 network intrusions at the same time. We have added screens down thru
the years to end up with what we have now.
The wall is very easy to use. It makes us
very productive. We have written the controller software to display a different background color on each of the display screens depending on the severity of the violation. A light red background is most severe and requires immediate attention. Backgrounds such as light green, light blue, white, and magenta denote the severity of the violation. It makes the viewing of the surveillance data much easier to monitor.
We wrote our video software to monitor all of our current network incursions that we determine to be critical and take the appropriate action when needed. We have established the monetary limits to assess
violators based on the severity of the
violation. The more severe the violation
the more money we assess to the violating country, company, or individual.
We have conducted our incursions from this network operations center for about 2 years. We recently decided to take working vacations in various parts of the world. The team members perform their functions from their chosen locations all over the world. Some of the offshore locations include:
Waimanalo Hawaii, Belize, Cancun, Paris, Rome, Barcelona, London, Maui, Hana Hawaii, Puerto Rico, Sidney, U.S. Virgin Islands, Vancouver, Rio de Janeiro, Zurich, Edinborough, Montreal, Prague, Crete, Bora Bora, Budapest, Maldives, Cape Town, Aukra Norway, and the Bahamas.
The team members will use a copy of all our developed software and log into our
network operations center in Arizona from
their location to conduct business, as usual, to access, evaluate, and penalize the target individuals, companies, or countries they have chosen based on their area of responsibility. We have set up non-profit foundations for each member to draw salary from and we donate anonymously to those foundations. We fund their individual operating accounts with offshore transfers from various offshore accounts. The team leader will operate the network operations center from his log home in northern Arizona. All of the daily operating specifics will be handled using encoded emails.
We utilize data encryption for transferring data between team members in
whatever location they happen to be working. We have developed a very complex encryption algorithm. There is no known
cryptanalysis of our algorhythm. Because of the need to ensure that only those eyes intended to view our sensitive information can ever see this information, and to insure that the information arrives un-altered, our security systems ENCODE THE DATA PRIOR TO ENCRYPTION. We have also developed codes for critical information, dollar amounts, people, team members, locations, weekly progress and new ideas.
We will extract information, obtain passwords, emails, ledgers, accounting reports, and insert documents including emails, currency transfer requests with authorizations, purchase requests, and general ledger entries without detection. Using their encryption keys, data about the target's VPN configurations, and Adobe signing keys, we have the ability to sign .PDF documents as if we were the owner of the key.
The network computer invasion system (NCIS) will allow us to do anything in the system that we deem necessary.
There will be systems and procedures created to process all info gained from each incursion:
* How to decipher it
* How to categorize it
* How to proceed if the data meets the criteria as to importance.
* Develop and execute a plan to gather information on specific companies.
Use the information gathered to discredit these companies if they fail our proper business conduct tests.
Modify banking records and cause disruption in those companies.
Transfer funds to the master off- distribution to our pre-designated
non-profits and needy causes.
* Divulge confidential information when necessary and put these companies on the run.
We have established divisions within our company to match the expertise of our partners. The partners and their divisions are:
TEAM LEADER - Monitors the network
operations center for alerts and
insures appropriate action is taken.
All punitive action is taken
automatically.
SOFTWARE ENGINEER - Political Division
NETWORK SECURITY ENGINEER - Cyber warfare
Combat & Tactics
HOSPITAL ADMINISTRATOR - Medical Services
Division
DATABASE/WEB DEVELOPER - Commercial
Division
TELEPHONE NETWORK DESIGNER - Develops
and installs cell phone monitoring
software
LANGUAGE, LINGUISTICS EXPERT - Worldwide
terrorist activities
Our hardware and software networks are setup so the various partners will select the various companies, entities, or individuals to monitor in their respective divisions. That information is transmitted to the network operations center in Arizona. One of the several displays will constantly monitor the company, entity, or individual. When the parameter limits are exceeded the pre-determined actions are instituted. The entity is warned, resources are extracted and forwarded to our off-shore accounts, and the entity is monitored in the background. This system has worked extremely well. We are currently monitoring 182 entities in the background for repeat offenses. When there
are repeat offenses the pre-determined actions are again instituted, the background color is upgraded, and this time the penalty is more severe.
There is no way to determine who we are, how we entered their systems, or what we are accessing in their systems. We have
successfully entered several computer networks and we continue to occupy most of the computers that we have entered. Key elements of each of the particular systems are monitored on our screens to identify repeat violations and assess additional penalties.
Diversion total to date $102,000,000
Donation total to date $94,000,000
Wall Street Incursions
Trent, our database/web developer, identified a Wall Street investment company, ERA Fund Advisors, who we put up on our illegal scanning alert screen. Our indications, based on emails and contracts, clearly showed a pattern of insider trading. We determined this based on entry into all cell phones and computer networks in the companies that ERA Fund had contact with. We also entered the cell phones of the key people in those companies. The emails that we un-covered made reference to insider information on countless companies that ERA invested in. Based on this massive scheme, we have transferred 22.5
million to our offshore account. With this account we will transfer money to many accounts worldwide. From these worldwide
accounts we will donate to our non-profit, needy, and start up recipients.
ERA Fund Advisors, one of Wall Street's largest and most profitable hedge funds, has been indicted on criminal charges for its role in insider trading over a decade by many of its employees. Though ERA Fund Advisors billionaire founder and head Robert Towers was not charged individually, the indictment charged his New Jersey-based hedge fund and two affiliates with wire fraud and four counts of securities fraud – allegations that could cripple the nationally known fund.
John
Hayes, an ERA portfolio manager responsible for directing a $1.55 billion "special situations fund," pleaded guilty to insider trading charges in the years-long ERA Fund Advisors investigation, the East Rutherford U.S. Attorney's office
said as prosecutors unsealed his plea. The charges represent the hardest yet in a series of major legal blows for Hayes, who runs the fund and uses it as an investment and trading vehicle for his personal fortune. The 42-page indictment charged that the insider trading scheme "was substantial, pervasive and on a scale without known precedent in the hedge
fund industry."
The alleged scheme was run through numerous portfolio managers and research analysts "who engaged in a pattern of obtaining inside information from dozens of publicly traded companies across multiple industry sectors," the indictment charged. The company allegedly:
Sought to hire portfolio managers and
analysts "with proven access to public company contacts likely to possess inside information”.
Gave portfolio manager's financial incentives to give Hayes recommendations about "high potential" trading ideas in which they had an "edge" over other investors. The managers weren't "questioned when making trading recommendations that appeared to be based on inside information," the indictment charged. Pursued an info 'edge' "The relentless pursuit of an information 'edge' fostered a business culture within ERA in which there was no meaningful commitment to ensure that such 'edge' came from legitimate research and not inside information," the indictment charged. "The predictable and foreseeable result ... was systematic insider trading ... resulting in hundreds of millions of dollars of
illegal profits and avoided losses at the expense of members of the investing public."
The U.S. Attorney Chris Lopez scheduled a news conference to discuss the case. An ERA Capital spokesman did not immediately respond to messages seeking comment on the charges. But the company has said the company and Hayes had done nothing wrong. The indictment could speed a recent outflow of investors from ERA Capital, though the company sent employees a notice that it planned to continue normal operations. Until recent months, the fund