The Robin Hood Virus: The Robin Hood Virus, #1
()
About this ebook
The Robin Hood Virus is a computer and cell
phone virus that is totally undetectable. We
use the Robin Hood Virus to infect the
computers of hackers and large corporations
who are breaking the law. We donate the
proceeds to well-deserving charities such as
homeless shelters, food banks, and families
facing financial ruin because of medical
emergencies. In the first book we have stolen
1.5 billion dollars and donated it to charity.
I am writing 5 books in the series.
About Robert Nerbovig:
I have been married for 58 years to my wife Pat.
I am a former active duty Marine as are my 2
sons. We live in the mountins of Arizona. I
have been programming computers for business
since 1970 and designing and developing web
pages since 1996. I am very familiar with computer
viruses and the havoc they wreak. I am the 23rd
great great grandson of King Olaf of Norway.
(Saint Olaf)
robert nerbovig
About Robert Nerbovig: I have been married for 59 years to my wife Pat. I am a former active duty Marine as are my 2 sons. We live in the mountains of Arizona. I have been programming computers for business since 1970 and designing and developing web pages since 1996. I am familiar with computer viruses and the havoc they wreak. I am the 26th great great grandson of King Olaf of Norway.(Saint Olaf)
Read more from Robert Nerbovig
Vintage Trivia from the 1930s Including Military Trivia Book 3 Rating: 0 out of 5 stars0 ratingsA Riverboat Odyssey Rating: 0 out of 5 stars0 ratingsVintage Trivia From the 1930s Including Current Military Trivia Rating: 0 out of 5 stars0 ratings
Related to The Robin Hood Virus
Titles in the series (3)
The Robin Hood Virus: The Robin Hood Virus, #1 Rating: 0 out of 5 stars0 ratingsThe Robin Hood Virus - Discovery: The Robin Hood Virus, #2 Rating: 0 out of 5 stars0 ratingsThe Robin Hood Virus - Validation: The Robin Hood Virus Rating: 0 out of 5 stars0 ratings
Related ebooks
The Robin Hood Virus - Discovery: The Robin Hood Virus, #2 Rating: 0 out of 5 stars0 ratingsThe Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks Rating: 0 out of 5 stars0 ratingsThe Privacy Prescription: Why Health Data Privacy Is in Critical Condition and How to Fix It Rating: 0 out of 5 stars0 ratingsAvoiding IT Disasters Rating: 0 out of 5 stars0 ratingsCybersecurity for Healthcare Professionals Rating: 0 out of 5 stars0 ratingsFailing Government Taketh Away Rating: 0 out of 5 stars0 ratingsThe Online Risk Management Handbook Rating: 0 out of 5 stars0 ratingsHidden Hospital Hazards: Saving Lives and Improving Margins Rating: 0 out of 5 stars0 ratingsCyberpocalypse: Inside the Digital Assault on Healthcare Rating: 0 out of 5 stars0 ratingsDesigner Crime, Special Interest's Profit Machine: Political Fictions Revealed, #1 Rating: 0 out of 5 stars0 ratingsCyber Insurance and Claims Investigation Rating: 0 out of 5 stars0 ratingsThe Truth About The Healthcare Industry Rating: 0 out of 5 stars0 ratingsCyber Security Bible Rating: 0 out of 5 stars0 ratingsCybercrime and Business: Strategies for Global Corporate Security Rating: 0 out of 5 stars0 ratingsInformation Security In Health Systems Rating: 0 out of 5 stars0 ratingsPrivileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations Rating: 0 out of 5 stars0 ratingsPolicing Welfare: Punitive Adversarialism in Public Assistance Rating: 0 out of 5 stars0 ratingsHow To Kill Your Doctor For Fun And Profit Rating: 0 out of 5 stars0 ratingsForensic Accounting and Fraud Investigation for Non-Experts Rating: 0 out of 5 stars0 ratingsSpam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door Rating: 4 out of 5 stars4/5Cybersecurity for Small Businesses and Nonprofits Rating: 0 out of 5 stars0 ratingsLife by Algorithms: How Roboprocesses Are Remaking Our World Rating: 0 out of 5 stars0 ratingsUnHealthcare: A Manifesto for Health Assurance Rating: 5 out of 5 stars5/5Snowy Elixir: Formula for Death Rating: 0 out of 5 stars0 ratingsLegal Guide to Social Media: Rights and Risks for Businesses and Entrepreneurs Rating: 0 out of 5 stars0 ratingsAutomating Primary Healthcare Rating: 0 out of 5 stars0 ratingsFRAUD PROTECTION FOR SENIORS Rating: 0 out of 5 stars0 ratingsMedical Billing Horror Stories Rating: 4 out of 5 stars4/5Rob The Victim Rating: 0 out of 5 stars0 ratingsThe Medical Malpractice Myth Rating: 2 out of 5 stars2/5
Crime Thriller For You
The Kept Woman: A Will Trent Thriller Rating: 4 out of 5 stars4/5Everyone in My Family Has Killed Someone: A Murdery Mystery Novel Rating: 4 out of 5 stars4/5The 120 Days of Sodom (Rediscovered Books): With linked Table of Contents Rating: 3 out of 5 stars3/5The Girl Who Was Taken: A Gripping Psychological Thriller Rating: 4 out of 5 stars4/5One of Us Is Dead Rating: 4 out of 5 stars4/5The Nurse: A gripping psychological thriller with a shocking twist Rating: 4 out of 5 stars4/5Sydney Rye Mysteries Box Set Books 10-12: Sydney Rye Rating: 0 out of 5 stars0 ratingsSummit Lake Rating: 4 out of 5 stars4/5False Witness: A Novel Rating: 4 out of 5 stars4/5Justine: Good Conduct Well Chastised Rating: 3 out of 5 stars3/5Finn Rating: 4 out of 5 stars4/5City on Fire: A Novel Rating: 4 out of 5 stars4/5The Good Daughter: A Novel Rating: 4 out of 5 stars4/5The Club: A Reese's Book Club Pick Rating: 4 out of 5 stars4/5The Silent Wife: A Novel Rating: 4 out of 5 stars4/5The Butcher Rating: 4 out of 5 stars4/5Notes on an Execution: An Edgar Award Winner Rating: 4 out of 5 stars4/5Hercule Poirot: The Complete Short Stories: A Hercule Poirot Mystery: The Official Authorized Edition Rating: 4 out of 5 stars4/5The Last Widow: A Will Trent Thriller Rating: 4 out of 5 stars4/5Razorblade Tears: A Novel Rating: 4 out of 5 stars4/5Cain's jawbone Rating: 5 out of 5 stars5/5The ABC Murders: A Hercule Poirot Mystery: The Official Authorized Edition Rating: 4 out of 5 stars4/5Girl, Forgotten: A Novel Rating: 4 out of 5 stars4/5Blacktop Wasteland: A Novel Rating: 4 out of 5 stars4/5Still Life: A Chief Inspector Gamache Novel Rating: 4 out of 5 stars4/5Cleaning the Gold: A Jack Reacher and Will Trent Short Story Rating: 4 out of 5 stars4/5The Woman in the Library: A Novel Rating: 4 out of 5 stars4/5Pieces of Her: A Novel Rating: 4 out of 5 stars4/5Lucky Rating: 4 out of 5 stars4/5Trust Me When I Lie: A True Crime-Inspired Thriller Rating: 5 out of 5 stars5/5
Related categories
Reviews for The Robin Hood Virus
0 ratings0 reviews
Book preview
The Robin Hood Virus - robert nerbovig
Table of Contents
Ch. Title Page
1 Virus, Hospital infection 1
2 Team, Device, Location 20
3 Wall Street Incursions 42
4 Hospital Foundation Startup 60
5 World Wide Military Tactics 89
6 Discovering Terrorist Activities 121
7 Hacking the Hackers 130
8 Virus Infection Definitions 149
9 Cyber Warfare Combat & Tactics 161
10 Major Oil Cartel Infection 185
11 Funding Political Donations 197
12 Attempts to Steal The Virus 208
PREVIEW OF BOOK TWO
THE ROBIN HOOD VIRUS – DISCOVERY 217
Virus, Hospital Infection
This story centers around a computer virus that we will call The Robin Hood virus
. This computer virus is undetectable and will never be discovered. This virus utilizes a back-door that has never been thought of or used in the black-hat hacker world. We also developed the same type of intrusion system to locate and enter cell phone's and monitor all suspicious calls by screening keywords that we have chosen. This virus we have labeled ranger
. When we encounter a keyword we then utilize our locator software to determine the location of the caller's computer and enter the caller’s computer and the recipient's computer to examine their plans and motives. If we determine that they are engaged in illegal activities, violating the rule of competitive fairness, or plotting against
1
THE UNITED STATES WE will take aggressive
action to stop them in their tracks and empty their bank accounts. We will divert resources (goods and money) to non-profit entities such as food banks, homeless shelters, orphanages, families going thru catastrophic health issues, small rural hospitals struggling to survive, a new world rural hospital start-up, etc. We will find other needy groups or individuals to help with the fruits of our labor. If the world ever finds out the fact that we are invading their computer systems and cell phones, without detection, and what we are doing with the information we are gathering, the manner in which everyone uses their computer systems would change drastically.
We have identified many major hospital corporations that are suspected of price
2
fixing with their competition and with the
insurance companies to garner larger claim
payments. This is one of the major causes of rising healthcare costs. No one seems to be able to correct the situation. The hospitals and the insurance companies are profit-motivated while the private citizen is concerned about paying exorbitant prices. We will remedy the situation by forcing the hospital corporations to comply with national averages and if they refuse to comply, report the illegal activities to proper authorities, anonymously.
Our team communicates with the network
operations center in Arizona using encoded emails. One of the encoded emails came in from Duck. He alerted us to a Medical Hospital Network that was overcharging and not paying claims. He identified Missions Hospital Corporation
(MHC), as one of the
3
MANY LARGE MEDICAL corporations engaged in price-fixing. We have constructed a plan
of attack to enter their computer systems,
including all nodes on the network, to gather specific evidence supporting the fact they are rate-fixing and the manner in which the scheme is occurring. They have set their rates at a very high level by buying specialty or rural hospitals where there are no nearby competitors. They have not set their rates based on cost but rather on the profit dictates of their stockholders. We believe this ruthless pricing system and its unfair competitive advantage is an inappropriate price mechanism for the vulnerable health and aged care sectors. Uninsured patients are not given the 25-50% discounts given to insured patients. We will change this unfair practice.
4
THE CHAIRMAN WAS SITTING in the boardroom reading a letter that we sent based on information we gathered based on
our invasion into the MHC systems. The
letter stated that there is evidence that his corporation, Missions Hospital Corporation
(MHC) has been active in the illegal practice of price-fixing. The letter states that we will name employees, other corporations, officers of the corporation, and affiliated doctors. We have copies of emails, old and new price master files, erroneous cost reports required by the Center for Medicare & Medicaid Services. We have copies of patient bills as submitted to the insurance companies and the explanation of benefits received for those claims. We also have a copy of an illegal agreement between MHC
and the PHO, "physician hospital
5
ORGANIZATION", WITH virtually all of the city's physicians that fixed the prices they would charge, and proposed a requirement that the doctors perform at least 30 percent of their outpatient
services, radiology and minor surgery, at the hospital. Doctors who refused were threatened with being barred from practicing at the Hospital, the only acute-care hospital in the area. The effect was that virtually all the doctors in the city were taken by the hospital, and managed-care companies could not enter the healthcare market because they could not find doctors to employ in their plans.
Waiting for the rest of the board members to arrive, the Chairman was furious. He was wondering how the secret details concerning the hospital's agreements concerning rate fixing were
6
DISCOVERED. HE SUSPECTED a leak in his organization. Why would anyone on his team betray him? He made sure those who knew the details of the insider transactions were paid very well. Most were close friends who he knew would not divulge
secret corporate information. He purposely kept key details in the hands of separate key officers. He was the Chairman and he was the only person who knew all the parts of the scheme. The board members arrived and the meeting came to order. The Chairman made the following announcement, "We have received a very disturbing notice from an anonymous source that accuses us of price-fixing. I will be conducting individual meetings with all directors when this meeting adjourns to find out specifics on this matter. We will find out where
this is coming from and what information
7
THEY ARE REFERRING to. We do not practice price-fixing
. The regular business of the corporation continued for the duration of the meeting.
After the meeting the Vice President of the corporation was called into the Chairman's office. The discussion centered
on the information alluded to in the letter. The Chairman inquired as to any contact with the media and if discussions that took place, what was discussed and who was the reporter. He was trying to discover the origin of the leaked
price-fixing specifics. The Vice-President assured the Chairman he did not discuss price-fixing with the reporter.
Later that day the Chairman met with the Chief Financial Officer in his office to discuss the price-fixing leak. The CFO
assured the Chairman he did not discuss
8
WHAT HE KNEW ABOUT the plan with anyone.
The Chairman then met with the President of the corporation to find out what he knew about the problem. The President indicated he met with the publisher of the paper at lunch one day last week and they talked about the contracts with the physicians but no specifics were discussed. The Chairman
met with the IT Director. The discussion centered on the possibility of a computer virus. Many of the emails contained on the hospital computer network contained specifics about physician contracts, all of the old and new price files, contact with other hospitals concerning prices, and the discussions with board members concerning the need to raise the profit margin. The Chairman was sure it was a virus that exposed the emails.
What the Chairman didn't know is that
9
we entered the personal computers of all
the officers, board members, and doctors who had a financial agreement with the hospital network. It was on those private computers were we gained most of our evidence.
The Chairman and the I.T. Director discussed various methods to determine if the network has been hacked. The I.T.
Director indicated that the culprit could be a worm
, that is a program very similar to a virus; it