Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

The Robin Hood Virus: The Robin Hood Virus, #1
The Robin Hood Virus: The Robin Hood Virus, #1
The Robin Hood Virus: The Robin Hood Virus, #1
Ebook195 pages1 hour

The Robin Hood Virus: The Robin Hood Virus, #1

Rating: 0 out of 5 stars

()

Read preview

About this ebook

The Robin Hood Virus is a computer and cell
phone virus that is totally undetectable. We
use the Robin Hood Virus to infect the
computers of hackers and large corporations
who are breaking the law. We donate the 
proceeds to well-deserving charities such as
homeless shelters, food banks, and families 
facing financial ruin because of medical
emergencies. In the first book we have stolen
1.5 billion dollars and donated it to charity.
I am writing 5 books in the series.

 

About Robert Nerbovig:
I have been married for 58 years to my wife Pat.
I am a former active duty Marine as are my 2 
sons. We live in the mountins of Arizona. I
have been programming computers for business
since 1970 and designing and developing web
pages since 1996. I am very familiar with computer 
viruses and the havoc they wreak. I am the 23rd 
great great grandson of King Olaf of Norway.
(Saint Olaf)
 

LanguageEnglish
Release dateSep 26, 2020
ISBN9781393600213
The Robin Hood Virus: The Robin Hood Virus, #1
Author

robert nerbovig

About Robert Nerbovig: I have been married for 59 years to my wife Pat. I am a former active duty Marine as are my 2 sons. We live in the mountains of Arizona. I have been programming computers for business since 1970 and designing and developing web pages since 1996. I am familiar with computer viruses and the havoc they wreak. I am the 26th great great grandson of King Olaf of Norway.(Saint Olaf)

Read more from Robert Nerbovig

Related to The Robin Hood Virus

Titles in the series (3)

View More

Related ebooks

Crime Thriller For You

View More

Related articles

Related categories

Reviews for The Robin Hood Virus

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    The Robin Hood Virus - robert nerbovig

    Table of Contents 

    Ch. Title  Page 

    1  Virus, Hospital infection  1 

    2  Team, Device, Location  20

    3  Wall Street Incursions  42

    4  Hospital Foundation Startup  60

    5  World Wide Military Tactics  89

    6  Discovering Terrorist Activities  121

    7  Hacking the Hackers  130

    8  Virus Infection Definitions  149

    9  Cyber Warfare Combat & Tactics  161

    10  Major Oil Cartel Infection  185

    11  Funding Political Donations  197

    12  Attempts to Steal The Virus  208

    PREVIEW OF BOOK TWO

    THE ROBIN HOOD VIRUS – DISCOVERY  217

    Virus, Hospital Infection

    This story centers around a computer  virus that we will call The Robin Hood virus.  This computer virus is undetectable and will never be discovered.  This virus utilizes a back-door that has never been thought of or used in the black-hat hacker world.  We also developed the same type of intrusion system to locate and enter cell phone's and monitor all suspicious calls by screening keywords that we have chosen.  This virus we have labeled ranger.  When we encounter a keyword we then utilize our locator software to determine the location of the caller's computer and enter the caller’s computer and the recipient's computer to examine their plans and motives.  If we determine that they are engaged in illegal activities, violating the rule of competitive fairness, or plotting against

    1

    THE UNITED STATES WE will take aggressive

    action to stop them in their tracks and empty their bank accounts.  We will divert resources (goods and money) to non-profit entities such as food banks, homeless shelters, orphanages, families going thru catastrophic health issues, small rural hospitals struggling to survive, a new world rural hospital start-up, etc.  We will find other needy groups or individuals to help with the fruits of our labor.  If the world ever finds out the fact that we are invading their computer systems and cell phones, without detection, and what we are doing with the information we are gathering, the manner in which everyone uses their computer systems would change drastically.

    We have identified many major hospital corporations that are suspected of price

    fixing with their competition and with the

    insurance companies to garner larger claim

    payments.  This is one of the major causes of rising healthcare costs. No one seems to be able to correct the situation.  The hospitals and the insurance companies are profit-motivated while the private citizen is concerned about paying exorbitant prices.  We will remedy the situation by forcing the hospital corporations to comply with national averages and if they refuse to comply, report the illegal activities to proper authorities, anonymously.

    Our team communicates with the network

    operations center in Arizona using encoded emails.  One of the encoded emails came in from Duck.  He alerted us to a Medical Hospital Network that was overcharging and not paying claims.  He identified Missions Hospital Corporation (MHC), as one of the

    3

    MANY LARGE MEDICAL corporations engaged in price-fixing.  We have constructed a plan

    of attack to enter their computer systems,

    including all nodes on the network, to gather specific evidence supporting the fact they are rate-fixing and the manner in which the scheme is occurring.  They have set their rates at a very high level by buying specialty or rural hospitals where there are no nearby competitors.  They have not set their rates based on cost but rather on the profit dictates of their stockholders.  We believe this ruthless pricing system and its unfair competitive advantage is an inappropriate price mechanism for the vulnerable health and aged care sectors.  Uninsured patients are not given the 25-50% discounts given to insured patients.  We will change this unfair practice.

    4

    THE CHAIRMAN WAS SITTING in the boardroom reading a letter that we sent based on information we gathered based on

    our invasion into the MHC systems.  The

    letter stated that there is evidence that his corporation, Missions Hospital Corporation (MHC) has been active in the illegal practice of price-fixing.  The letter states that we will name employees, other corporations, officers of the corporation, and affiliated doctors.  We have copies of emails, old and new price master files, erroneous cost reports required by the Center for Medicare & Medicaid Services.  We have copies of patient bills as submitted to the insurance companies and the explanation of benefits received for those claims. We also have a copy of an illegal agreement between MHC

    and the PHO, "physician hospital

    5

    ORGANIZATION", WITH virtually all of the city's physicians that fixed the prices they would charge, and proposed a requirement that the doctors perform at least 30 percent of their outpatient

    services, radiology and minor surgery, at the hospital.  Doctors who refused were threatened with being barred from practicing at the Hospital, the only acute-care hospital in the area.  The effect was that virtually all the doctors in the city were taken by the hospital, and managed-care companies could not enter the healthcare market because they could not find doctors to employ in their plans.

    Waiting for the rest of the board members to arrive, the Chairman was furious.  He was wondering how the secret details concerning the hospital's agreements concerning rate fixing were

    6

    DISCOVERED.  HE SUSPECTED a leak in his organization.  Why would anyone on his team betray him?  He made sure those who knew the details of the insider transactions were paid very well.  Most were close friends who he knew would not divulge

    secret corporate information.  He purposely kept key details in the hands of separate key officers.  He was the Chairman and he was the only person who knew all the parts of the scheme.  The board members arrived and the meeting came to order.  The Chairman made the following announcement, "We have received a very disturbing notice from an anonymous source that accuses us of price-fixing.  I will be conducting individual meetings with all directors when this meeting adjourns to find out specifics on this matter.  We will find out where

    this is coming from and what information

    7

    THEY ARE REFERRING to.  We do not practice price-fixing.  The regular business of the corporation continued for the duration of the meeting.

    After the meeting the Vice President of the corporation was called into the Chairman's office.  The discussion centered

    on the information alluded to in the letter.  The Chairman inquired as to any contact with the media and if discussions that took place, what was discussed and who was the reporter.  He was trying to discover the origin of the leaked

    price-fixing specifics.  The Vice-President assured the Chairman he did not discuss price-fixing with the reporter.

    Later that day the Chairman met with the Chief Financial Officer in his office to discuss the price-fixing leak.  The CFO

    assured the Chairman he did not discuss

    8

    WHAT HE KNEW ABOUT the plan with anyone. 

    The Chairman then met with the President of the corporation to find out what he knew about the problem.  The President indicated he met with the publisher of the paper at lunch one day last week and they talked about the contracts with the physicians but no specifics were discussed.  The Chairman

    met with the IT Director.  The discussion centered on the possibility of a computer virus.  Many of the emails contained on the hospital computer network contained specifics about physician contracts, all of the old and new price files, contact with other hospitals concerning prices, and the discussions with board members concerning the need to raise the profit margin.  The Chairman was sure it was a virus that exposed the emails.

    What the Chairman didn't know is that

    9

    we entered the personal computers of all

    the officers, board members, and doctors who had a financial agreement with the hospital network.  It was on those private computers were we gained most of our evidence.

    The Chairman and the I.T. Director discussed various methods to determine if the network has been hacked.  The I.T.

    Director indicated that the culprit could be a worm, that is a program very similar to a virus; it

    Enjoying the preview?
    Page 1 of 1