world. US Army military intelligence can be used in peace time to prepare for potential attacks and coordinate defensive efforts or during wartime to give soldiers an advantage on a battlefield. Information gathered through US Army military intelligence efforts can be used for political negotiations and treaties between the U.S. and other nations, as well as for advising political leaders on better understanding world military actions. The information can also be used on a battlefield to allow soldiers to better understand where potential attacks may come from, or to be better aware of their
surroundings during an attack. This type of US Army military intelligence is often gathered by intelligence personnel specially trained in intelligence gathering techniques.
Diversion total to date $207,500,000
Donation total to date $195,000,000
Discovering Terrorist Activities
Because we have the ability to enter cell phones and computer networks without detection, we are scanning various cell phone and computer networks in the Middle East for keywords that will indicate terrorist activities. We are concentrating our efforts on Syria, Iraq, Iran, and Afghanistan. We have discovered conversations that pinpoint the activity of a very dangerous group. They have conducted brutal beheadings and continue to hold U.S. prisoners.
We initially discovered cell-phone history between boots-on-the ground terrorists in Northern Iraq, Northern Syria, and their command headquarters in Northern Iraq. They have planned and executed various attacks on civilians, military, and commercial targets. Their
primary goal is to amass as much capital as possible in order to purchase weapons and pay their army. They are building a military base in northern Iraq to train 20,000 volunteers. They have amassed very large bank accounts in Afghanistan, Pakistan, Kuwait, and Qatar to fund training and operations. We have entered several of their computer networks and continually monitor daily activities. We are giving all of the data we are obtaining to our U.S. communication channel, INSCOM.
We have determined which banks are holding the terrorist accounts and what names they are under. We have entered those banks and transferred $250,000,000 from one account in a Pakistani bank to our offshore account. We have also entered an account in Qatar and transferred $100,000,000 to our offshore account. We
will continue to monitor all of the bank
accounts that we determined to be those of the terrorist network and transfer most of the balances of those accounts.
We are able to move $5,000,000 every week to our offshore account from one of their banks with their authorization. We have made it look like it is used to fund operations. We have been making this same bank transfer to our offshore account for the last 10 weeks and will continue to do so for the forseeable future.
They are stealing and selling $1,000,000 worth of oil every day and we have discovered where they are selling it. We have entered the network of the oil buyer and have diverted $15,000,000 to our offshore account with his approval and without his knowledge. He will find out after the fact that we have access to all signatures necessary for all financial
transactions.
Based on their cell phone conversations we have intercepted a plan to invade Aleppo and Happa, Syria. They will be staging these attacks from Afreen and Kobani, Syria. We have passed this information on to INSCOM. We hope that the U.S. Military will join with the coalition to strike key terrorist targets in
Afreen and Kobani to seriously degrade terrorist capabilities.
With our computer network occupation software we found out who is leading the terrorist network in the Kobani region. We have given his name, location and other information to INSCOM for their use. We expect air strikes and ground action to eliminate this individual and his cohorts. We located the leader of the Syrian Kurdish militiamen thru cell phone intercepts and computer network snooping. We have anonymously donated 10 million dollars to
the Kurdish defense chief in order for him to acquire key weapons and ammunition. The need for more reinforcements is great and we will continue to monitor the situation and donate whatever we deem critical in the defense of Kobani. It seems as though Turkey wants Kobani to fall. They are amassed on the border and refuse to help the Kurds in their time of need. They are also preventing Kurdish rebels from crossing the border to help in the fight. Turkey finally allowed over 100 Iraqi fighters -- known as Peshmerga or "those who confront death" -- to cross into Kobani with their heavy artillery. This is a major change in policy for Turkey. The Kurdish rebels have only had mortars up to this point. The heavy artillery will allow the rebels to inflict damage to ISIS from a distance once the observers and the outposts are setup.
We have also intercepted a conversation between elements of the largest terrorist network in the region concerning one of our marine captives. He is being held outside Raqqa, Syria. We have passed this info to INSCOM in hopes they will formulate a plan to extract our guy.
While scanning cell phone networks we
intercepted a call between members of a mercenary force planning an attack on one of the largest terrorist bases. The outlined attack is very large and is planned to eradicate the base and all of its assets. The attack will take place in 4 days when the base has its largest concentration of terrorists. The planned attack will also be coordinated with U.S. Air Power. We have invaded that particular terrorist computer network and are in the process of creating havoc with their
communications systems in both their computer network and in their cell phone network. This will severely hamper their ability to communicate.
We are scanning cell phone conversations in and around Azaz and Aleppo, Syria. We are looking for keywords to identify ISIS. We found a conversation that talks about a gathering of key ISIS commanders in the area. We have entered their computer network and found a huge amount of documents concerning the ISIS network. We have identified key members
of their organization, their name, locations, and their duties. We have also entered their bank accounts and transferred 75 million American dollars to our off-shore accounts.
We have been monitoring cell phone activity on the U.S./Mexico border for suspicious conversations trying to locate
attempted terrorist crossings. We have identified several conversations in the area of Juarez, Mexico using the term “bliss”. We discovered that this word was used several times by high-ranking ISIS leaders in the Azaz and Alepo regions of Syria. We have determined that the conversations in Juarez are plans to cross the border and set explosive devices at Fort Bliss and other military installations. The plot involves about 20 ISIS members. They plan to hire a coyote to help them cross the border. The group is planning to cross the border in the next 30 days. We have sent specifics of this border operation to INSCOM for their immediate action. We expect INSCOM will monitor the necessary groups, including the 2 drug cartels in the area, and step-up the monitoring of the border to stop this threat.
We have also been monitoring cell phone traffic in the area of Dundee, Quebec Canada. There is a border crossing there with absolutely no security. We are trying to determine if an illegal crossing is planned on behalf of ISIS. People who enter the United States thru this crossing are expected to notify the U.S. authorities as soon as they cross. This is a perfect entry point for anyone planning attacks on the United States. We intercepted cell phone chatter concerning the crossing and conversation was in very broken English. It is between Islamic voices. We have sent this conversation to INSCOM for further review and action.
Diversion total to date $707,500,000
Donation total to date $695,000,000
Hacking the Hackers
One of our goals is to cause black-hat hackers to pay a severe price for their illegal, covert actions. They use the internet to spy, steal secrets, goods and services, credit card information, identities, bank accounts, and cash from countries, companies, and individuals. Because we have the ability to enter their systems and create havoc we will cause them great pain. We obtained a list of
/>
suspected hackers from the many government computers that we occupy including the FBI, CIA, Homeland Security, and many other security databases containing the location and I.P. Addresses of a large number of suspected hackers around the world. We will describe the many intrusions that we have made into hacker computers. We will also outline the measures we have taken to
prevent these hackers from repeating their terrible deeds.
CHINA
We are actively monitoring several serious hackers that are trying to do great harm. Many of these hackers are located in China. We discovered their locations using information from homeland security. Rob, our Language, Linguistics Expert entered their cell phones and their computer networks. They have dozens of hackers working as a team to enter computers in the United States. They have gained access to U.S. Defense systems, stealing top-secret designs for combat aircraft and ships, missile defenses, and other top-secret information.
Another major China hack involved a very large U.S. hospital network. They
stole patient names, addresses, birth
dates, telephone numbers and social security numbers belonging to millions of patients.
We discovered one of the most elaborate hacking efforts involved a large team that hacked several major U.S. Corporations. They stole intellectual property including blueprints, proprietary manufacturing processes, business plans, pricing guidelines, emails, and customer lists. These corporations included aluminum manufacturing, steel companies, electricity and nuclear energy firms, and power companies.
Because these China hacking operations are doing immeasurable harm to the United States we decided to destroy their hacking operation. We will do this covertly. We have modified their code to allow their I.P. address and location to display on the hacked system. We also modified their
source code to not allow any transmission of information. They cannot find us in their systems and cannot correct the code. We will stay in their systems to monitor activity and prevent further productive hacking. We also determined their bank account numbers by invading their private computers. We have extracted a total of 26 million dollars from this large team of hackers. We have issued them a warning to cease this activity or further extensive punitive punishment will occur. We are also placing our logo:
on all of their written communications including email. We notify INSCOM of all of our discoveries and the specifics of their I.P. addresses and locations.
RUSSIA
We discovered a Russian hacker team involved in hacking U.S. businesses and stealing approximately 1.2 billion username and password combinations. We located their cell-phone network, entered it, and found their computer network. We entered their network computers to monitor their activity. We have also modified their code to allow their I.P. address and location to display on the hacked systems. We also modified their source code to not allow any transmission of information. We obtained their bank accounts and extracted a total of one million from 14 different bank accounts. We also placed our logo:
on all of their written communications
including email.
IRAN
A group of Iranian hackers is waging a large campaign of cyber-espionage, targeting hundreds of high-ranking U.S. defense, diplomatic and other officials who are lured to fake web sites through an elaborate social media network that features a bogus online news site. The hackers have targeted current and former senior military officials, current and
former foreign policy officials who work on
nonproliferation issues, as well as personnel from more than 10 U.S. and Israeli defense contractors. The operation uses sites such as Twitter, Facebook, and LinkedIn to draw in the hackers’ targets. It uses a fake news site called NewsINAir.org, which features foreign policy and defense stories.
Iranian hackers have successfully penetrated unclassified U.S. Navy computers for cyber espionage purposes. They are trying to obtain plans and blueprints for a new cyber weapon. The attacks were carried out by hackers working for Iran’s government.
We determined the location of the hackers computer network thru information gained from homeland security, the FBI, and invading their cell-phone networks. We proceeded to execute our back-door invasion of this network. We monitored their activity for a few days to determine the exact computers involved. We then modified their source code to duplicate what we have done with the Chinese hacker network. We modified their source code to allow their I.P. address and location to display on the hacked systems. We also modified their source code to not allow any transmission
of information. We obtained their bank accounts and extracted 35 million dollars from various state bank accounts. We also placed our logo:
on all of their written communications including email.
ISIS
Because of the justified outrage over ISIS be-headings and cowardly activities we made finding them, their leadership, and their computer networks, a priority. We have very good information on their location. We invaded their cell-phone networks in Damascus, Syria. This is the location identified by secret military intelligence. We have discovered
communications between high-level leaders if ISIS and their communications center. We have hacked their computer network to monitor activity and try to find hacking activity. Our efforts were successful. We found a long list of hacked sites on the computer network. We displayed the results of our intrusion in our network operations center. Their active hacker screen looks like this:
Again, we modified their source code to allow their I.P. addresses and locations to display on all hacked systems. We also modified their source code to not allow any
transmission of information. We were able to determine Banks, bank accounts, and signatures. We have sent 34 million dollars, in the form of a bank transfer with their signatures, to our off-shore accounts and notified ISIS that if this hacking activity occurred in the future the penalty would be more extreme. We also placed our logo:
on all of their written communications including email. If no current hacker activity is occurring we change the screen background on our screens to:
We are able to respond to all hacker activity by scanning all 182 screen looking for a red background.
North Korea
We believe that North Korea's
Reconnaissance General Bureau (RGB) is in charge of both traditional and cyber
operations, and is known for sending agents
abroad for training in Cyber warfare. The RGB reportedly oversees six bureaus that specialize in operations, reconnaissance, technology, and cyber matters -- and two of which have been identified as the No. 91 Office and Unit 121. The two bureaus in
question comprise all intelligence operations and are based in China. The RGB also reportedly oversees state-run espionage businesses located in 30 to 40
countries, often hosted in unsuspecting places such as cafes. Members of this espionage network reportedly "send more than $100 million in cash per year to the regime and provide cover for spies," the report says.
We have undertaken the task of infiltrating the RGB and will begin our search in China. We have information with regard to one of their locations. We have hacked into their cell-phone network and determined their exact location. We then entered their computer network. We proceeded to execute our back-door invasion of this network. We monitored their activity for a few days to determine the exact computers involved. We then modified
their source code to duplicate what we have done with the Chinese hacker network. We modified their source code to allow their I.P. address and location to display on the hacked systems. We also modified their source code to not allow any transmission of information. We obtained their bank accounts and extracted 35 million dollars from various state bank accounts. We
also placed our logo:
on all of their written communications including email. We found a series of bank
accounts in China that belonged to RGB and had 35 million transferred to o
ur off-shore accounts.
North Korean hackers are targeting nuclear power plants, transportation
networks, electrical utilities and all major government organizations abroad, he said. North Korea’s closest allies are Iran and Syria, fellow rouge states united in their opposition to the United States. A special group called Unit 121 is North Korea’s Cyber warfare organization. It
is believed to have about 3,000 dedicated Cyber warfare specialists engaged in targeting and attacking foreign computer networks. Unit 121 is part of the Reconnaissance General Bureau, an intelligence and covert operations component of the Korean People’s Army, as the North Korean military is known. It is our goal to stop these hackers in their tracks and empty all bank accounts we find in the process.
SOUTH KOREA
We discovered digital evidence that
links cyber attacks on South Korea to a single hacking group called the “Dark Seoul Gang”. We were able to locate the cell phones and computer network of the “Gang” and executed our back-door entry of their computer network. We have identified the gang members. We monitored their activity for a few days to determine the exact computers involved. We then modified their source code to duplicate what we have done with the Chinese hacker network. We also modified their source code to allow their I.P. address and location to display on the hacked systems. We also modified their source code to not allow any transmission of information. We obtained their bank accounts and extracted 35 million dollars from various state bank accounts. We also placed our logo:
on all of their written communications including email. We found a series of bank accounts in China that belonged to RGB and had 35 million transferred to our off-shore accounts.
The Robin Hood Virus Page 6