The Robin Hood Virus is a
computer virus that is
undetectable and will
never be discovered. This
virus utilizes a back-door
that has never been thought
of in the black-hat hacker
world. We also developed a
virus that we employ on
cell phones. This virus is
called "Ranger". We have
taken 11 billion dollars
from various countries,
individuals and donated
it to charity.
DOLLARS EXTRACTED TO DATE $1,564,350,000
DONATION TOTAL TO DATE $1,548,000,000
DOLLARS EXTRACTED TO DATE $6,242,350,000
DONATION TOTAL TO DATE $6,226,000,000
Table of Contents Attempts to Steal The Virus Working with INSCOM Holding Russia Hostage DC-10 Aerial Firefighting Systems Hacking Russian Oligarchs Exposing Kremlin Hackers 45's Relationship with the Kremlin Homes for Homeless Veterans Hacking the NRA North Korean Payback Hacking APT1 in China Mobile Disaster Hospitals Contact Us
BOOK 3 BOOK 4 BOOK 5
The Robin Hood Virus - ValidationThe Robin Hood Virus - RetributionThe Robin Hood Virus - Vindication
THE ROBIN HOOD VIRUS
A major motion picture or a T.V. series of 50 or more episodes.
This story centers around a computer virus called
"The Robin Hood Virus". This computer virus is undetectable
and will never be discovered. This virus utilizes a back-door
that has never been thought of in the black-hat hacker world.
We also developed a virus that we employ on cell phones.
This virus is called "Ranger". We use this virus to hack into
corrupt countries, corporations, and individuals to extract
billions of dollars and divert these resources to non-profit
entities such as food banks, homeless shelters, orphanages,
families going thru catastrophic health issues, small rural
hospitals struggling to survive, and creating much needed
llc's such as a national rural hospital corporation, DC-10
fire tanker company, homes for homeless veterans, mobile
disaster hospitals, building a national water pipeline,
preventing water run-off after a forest fire, and more.
We soon find ourselves targeted by powerful enemies who
will stop at nothing to steal the virus and destroy them.
We developed an intrusion system to locate and enter cell
phone's and monitor all suspicious calls by screening
keywords that we have delevoped. When we encouter a chosen
keyword we utilize our location software to determine the
location of the caller's computer and enter the caller's
computer and the recipient's computer to examine their plans
and motives. If we determine that they are engaged in
illegal activities, violating the rule of competitive
fairness, or plotting against the United States, we will
take aggressive action to stop them in their tracks and
empty their bank accounts. We have taken over 11 billion
dollars and deposited it in several off-shore bank accounts.
We will divert these resources to non-profit entities such
as food banks, homeless shelters, orphanages, families going
thru catastrophic health issues, small rural hospitals
struggling to survive, and creating much needed llc's such
as a national rural hospital corporation, DC-10 fire tanker
company, homes for homeless veterans, mobile disaster
hospitals, building a national water pipeline, Preventing
water run-off after a forest fire, and more. We will find
other needy groups or individuals to help with the fruits
of our labor. We also enter the databases of the U.S.
Government to find information on subjects that interest
us and to tell the real story. We will tell the real story
of Roswell (Majestic 12), The Philadelphia Experiment,
and violators in the witness protection databases. If the
world ever finds our that we are invading their computer
systems and cell phones, without detection, and what we
are doing with the information we are gathering, the
manner in which everyone uses their computer systems
would change drastically.
We have assembled a very knowledgeable and loyal team
consisting mostly of former military veterans who know the
value of protecting each others backs. They have served in
Iraq, Vietnam, Afghanistan, the USA, and the pentagon. Both
their military duties and their civilian duties involved
computer programming, or network set-up and analysis, or
database creation and maintenance. We all have a current
mission to help eradicate hacking and the damage that is
done by hackers. We have occupied the computer networks of
various government agencies including the IRS, the FBI, and
several District Attorney's offices. We are monitoring these
systems to find companies under surveillance for fraud, or
other illegal activities. We are currently in the process of
reviewing various companies, individuals, and countries to
establish a schedule of computer entry. When we find
violators we will enter their computer systems and cell
phones to determine the improper activity and assess a
Arjay, a former hospital controller with an intricate
knowledge of computer hacking techniques and methods who has
been programming computers for 50 years, mainly in
healthcare. He has written systems for hospitals, nursing
homes, medical clinics, various medical specialty offices,
and dental offices. He also programmed one of the first
electronic medical billing systems in the country. He has
re-constructed computer systems after severe virus attacks
and has been instrumental in designing and developing
anti-virus software. He has written "The Robin Hood Virus"
software and developed the necessary hardware and software
to enter computers all over the world without detection.
Arjay is a former active duty Marine as are other team
members. Semper Fi.
Paula is our software engineer. She has 15 years
experience designing and developing business applications.
She has extensive knowledge in designing database systems
for efficient, secure operations. She also has experience in
designing and writing and testing anti-virus software for large
NETWORK SECURITY SPECIALIST:
Paco, our network security specialist, has been actively
involved in protecting vital government military
installations both in Iraq and here in the United States. He
has implemented anti-virus network protection and the tools
to determine intruders and their location. He has supported
security operations for an academic enterprise, the U.S.
Army at a forward operating base in Iraq, where he
constructed and monitored very large wide area networks to
prevent intrusion. His background and experience more than
qualifies him for Manager of Cyber warfare.
Duck is a retired hospital administrator with 38 years
experience in small rural hospitals who will head our
Medical Services Division. He has defined proper business
conduct for the medical service industry and the he will
oversee the entry, the verification of business practices,
and planned corrective action if business violations
occur(rates too high, etc.). The medical services division
will also oversee the "World Rural Hospital Corporation"
Trent, our database/web developer, has 25 years experience
designing and developing very sophisticated index methods
for storing and tracking various business operations. He has
written complex web pages for various clients in various
TELEPHONE NETWORK ENGINEER:
Pablo is our telephone network expert who has been designing
and developing telephone networks and software for the last
15 years. He has installed numerous, very complicated,
telephone networks all over the world.
LANGUAGE, LINGUISTICS EXPERT:
Rob, our language expert, is proficient in several languages
including Arabic, Farsi, and most languages in the middle
east. He has designed language conversion programs that we
will use to monitor conversations of suspected violators.
We use our team members, working in their desired vertical
market, to discover private, corporate, and governmental
hacking, foreign and domestic, by entering various large
computer networks to extract or divert resources for
We have developed a group of computer devices and cell phone
devices that does just that! We have entered the computer
systems of suspected individuals, companies, and governments
engaged in illegal activities with spectacular results. We
have established offices throughout the world in the most
desirable vacation locations chosen by our team members.
They will spend 6-9 months at each location before moving
to another location of their choice. We have setup a method
to destroy the hardware and software that is out in the field
with our teams if proper authentication is unsuccessful or if
the team member is threatened in any way. We established a
non-profit foundation for each team member in order to
send our anonymous donations for operating expenses.
The team leader will operate the network operations center
from the basement command center in his log home in Arizona.
All of the daily operating specifics will be handled using
encoded emails. We set up data encryption for transferring
data communications. We have developed a very complex encryption
algorithm. There is no known cryptanalysis of our algorithm.
Because of the need to ensure that only those eyes intended to
view our sensitive information can ever see this information,
and to insure that the information arrives un-altered, our
security systems ENCODE THE DATA PRIOR TO ENCRYPTION.
We conduct our activities from our operations center
located in an underground bunker(Command Center) in the
basement of a large log home (owned by the team leader)
located in the mountains of Arizona on 2500 acres with a
100 acre lake. We designed the secure bunker with these
1. We built it in the right location, quiet, picturesque,
and ultra secure.
2. We have redundant utilities, electricity, water, voice
3. When we built the log cabin we designed the basement
to have foot-thick walls and foundation.
We designed our network operations center to have the
utmost flexibility for data storage, transmission and
flexibility. A 24 foot 55" LCD video wall with 17 screens
capable of displaying 12 companies each and including
interactive touch. We designed this video wall in order to
instantly control up to 192 network intrusions at the same
time. We have written the controller software to display a
different background color on each of the display screens
depending on the severity of the violation. A light red
background is most severe and requires immediate attention.
Backgrounds such as light green, light blue, white, and
magenta denote the severity of the violation. It makes the
viewing of the surveillance data much easier to monitor.
We wrote our video software to monitor all of our current
network incursions that we determine to be critical and take
the appropriate action when needed. We have established the
monetary limits to assess violators based on the severity of
the violation. The more severe the violation the more money
we assess to the violating country, company, or individual.
We have conducted our incursions from this network
operations center for about 6 years. We recently decided to
take working vacations in various parts of the world. The
team members perform their functions from their chosen
locations all over the world. Some of the offshore locations
include: Waimanalo Hawaii, Belize, Cancun, Paris, Rome, Barcelona,
London, Maui, Hana Hawaii, Puerto Rico, Sidney, U.S. Virgin
Islands, Vancouver, Rio de Janeiro, Zurich, Edinborough,
Montreal, Prague, Crete, Bora Bora, Budapest, Maldives, Cape
Town, Aukra Norway, and the Bahamas.
The team members will use a copy of all our developed
software and log into our network operations center in
Arizona from their location to conduct business, as usual,
to access, evaluate, and penalize the target individuals,
companies, or countries they have chosen based on their area
We have established divisions within our company to
match the expertise of our partners. The partners and their
Team Leader - Monitors the network operations center for
alerts and insures appropriate action is taken. All punitive
action is taken automatically.
Network Security Engineer - Cyber warfare Combat & Tactics
Hospital Administrator - Medical Services Division
Database/Web Developer - Commercial Division
Telephone Network Designer - Develops and installs
cell-phone monitoring software
Language, Linguistics Expert - Worldwide terrorist
Our hardware and software networks are setup so the
various partners will select the various companies,
entities, or individuals to monitor in their respective
divisions. That information is transmitted to the network
operations center in Arizona. One of the several displays
will constantly monitor the company, entity, or individual.
When the parameter limits are exceeded the pre-determined
actions are instituted. The entity is warned, resources are
extracted and forwarded to our off-shore accounts, and the
entity is monitored in the background. This system has
worked extremely well. We are currently monitoring 192
entities in the background for repeat offenses. When there
are repeat offenses the pre-determined actions are again
instituted, the background color is upgraded, and this time
the penalty is more severe. There is no way to determine who
we are, how we entered their systems, or what we are
accessing in their systems. We have successfully entered
several computer networks and we continue to occupy most of
the computers that we have entered. Key elements of each of
the particular systems are monitored on our screens to
identify repeat violations and assess additional penalties.
We place our logo in the lower right-habd corner of all of
their communications to let them know we are in their
EPISODE ONE | THE BREAK DOWN:
INT. THE HOME OF THE MISSIONS HOSPITAL CORPORATION
CHAIRMAN. HE IS PLUGGING IN HIS CELLPHONE TO RE-CHARGE.
AN AERIAL VIEW OF THE ARIZONA LANDSCAPE TO INCLUDE SUNRISE, MOUNTAINS, SKY, FOOTHILLS, FLOWERS, ARJAYS 2500 ACRE PROPERTY ON A LARGE LAKE.
EXT. ARJAYS HOME NORTHERN ARIZONA.
INT. ARJAY'S LARGE LOG HOME - UPSTAIRS MANCAVE - EVENING
ARJAY is sitting at his laptop, (as usual), surrounded with some of his collections of vintage post cards, valuable sports cards, wire art, posters, and 1930s magazine covers and advertisements. He continues to test the program (virus) he has been working on for 6 years. He has developed the hardware and software that enables him to hack into any computer in the world. The back-door entry that he has invented has never been discovered. He is able to remain in the hacked system without detection. He has stolen $1,564,000,000 from bad actors and used it to buy a 2,500 acre compound in Northern Arizona. He has constructed two 3 bedroom log homes with stables and a very large log home with a basement for the Command Center.
I am a former hospital controller with an intricate knowledge of computer hacking techniques and methods and I have been programming computers for over 50 years. I have re-constructed several computer systems after severe virus attacks and I have been instrumental in designing and developing anti-virus software programs. I have developed this virus to stop cyber-criminals from holding people, hospitals, insurance companies, and governments hostage.
I have developed the hardware and software necessary to hack into any computer and cell-phone in the world. I call this virus "The Robin Hood Virus" because I take from the rich and give to the less-fortunate. This computer virus is undetectable and will never be discovered. This virus utilizes a back-door that has never been thought of in the black-hat hacker world.
We also developed a virus that we employ on cell phones. This virus is called "Ranger".
We monitor all suspicious calls by screening keywords that we have chosen. When we encounter a keyword we then utilize our locator software to determine the location of the caller's computer and enter the caller's computer and the recipient's computer to examine their plans and motives. If we determine that they are engaged in illegal activities, violating the rule of competitive fairness, or plotting against the United States we will take aggressive action to stop them in their tracks and assess a heavy penalty.
We use this virus to hack into corrupt countries, corporations, and individuals to extract billions of dollars and divert these resources to non-profit entities such as food banks, homeless shelters, orphanages, families going thru catastrophic health issues, small rural hospitals struggling to survive, and creating much needed LLC's such as a national rural hospital corporation, a DC-10 fire tanker company, homes for homeless veterans, mobile disaster hospitals, building a national water pipeline, a company to prevent damaging water run-off after a forest fire, a secret branch of The Salvation Army to donate money to families struggling due to health problems, and more.
We soon find ourselves targeted by powerful enemies who will stop at nothing to steal the virus and use it for their own illegal purposes.
INT. THE ROBIN HOOD VIRUS COMMAND CENTER
The Robin Hood Virus network operations center (NOC) showing a video wall with a 24 foot 55" LCD video wall with 17 screens capable of displaying 12 companies each and including interactive touch. The center screen is used to display various data such as a running total of DOLLARS EXTRACTED TO DATE And DONATION TOTAL TO DATE. We will update totals as we get them. (initial totals are: $1,564,000,000 and $1,528,000,000).
On one of the desktop computer screens we see DUCK entering the following command: “execute locator latitude 39.163795 longitude -119.767401” for the home of the Chairman of Missions Hospital Corporation. Data now splashes across the screen, "Locator program: running."
On another desktop computer screen we find Paco and Pablo working with a very large set of video screens,
arranged in a half circle of a desk-high counter with 8 CRT
workstations. We have continuing communications with various
entities to monitor conditions and to oversee various
established companies. We are looking for repeat offenders,
or to inquire into the on-going operation of our companies.
Those entities include:
We have setup a U.S. Government communication channel
that does not know our identity. We have sent numerous
pieces of information that they have verified to be true and
have welcomed our continued forwarding of information
concerning people, places, activities, I.P. Addresses of
major hackers, military plans and activity, individuals we
have identified as terrorists and their location and
activities. Our communications channel is with INSCOM.
INSCOM oversees a number of major subordinate commands, and
coordinates efforts between the various command groups in
order to gather and best use the information received. This
can include providing linguistic support to various
commanders throughout the Army, ensuring the security and
maintenance of US Army computer systems and servers, working
with other intelligence agencies such as the National
Security Agency, and providing location specific support and
analysis in numerous military theaters across the world.
Wildfires have become an increasingly common occurrence,
especially during the summer months. The risk of wildfires poses a significant threat to communities, wildlife, and natural resources. To combat this risk, firefighters have employed various techniques and technologies to suppress fires effectively. One such technique is using DC-10 tankers and night vision. Aerial attack is often the quickest and most effective response to a large wildfire front - fixed-wing
aircraft or helicopters can dump water or fire retardant
chemicals directly onto the advancing fire front in large
volumes that dwarf the comparatively puny streams put out by
a fire truck. Where the smaller planes and helicopters have
carried around 1000 gallons, the DC-10 fire bomber carries
We have acquired an existing DC-10 fire bomber
company that we will call DC-10 Aerial Firefighting Systems,
LLC. The company has 35 DC-10's, hangars and support
equipment. They also have all of the parts and equipment and
hangars to modify existing DC-10's to our specifications.
All of our DC-10 fire bombers have night-flight
characteristics. This includes night vision goggles with
modifications made to the panel lights, sensor data and
processors that will fuse together information and display
it to pilots so they can get a real-time view of the terrain
and fire environment, infrared systems, a GPS controlled
illuminated laser pointer to inform the DC-10 fire bomber
where to drop the loads, twin adjustable Night Suns, and
lead plane searchlights. We have also developed safe and
effective drop heights across a variety of illumination
levels in different terrain. For example, dealing with
moonlit and starlit-nights and low-light scenarios, working
toward setting requisite minimums for illumination levels
for terrain and drop height. We have established DC-10 fire
bomber bases with complete refueling support in:
San Diego, California
Los Angeles, California
Roswell, New Mexico
These fire bases will house multiple DC-10 fire bombers, lead aircraft, all equipment and crews. When a fire breaks out we hope to get multiple DC-10 fire bombers in the air whether day or night. We believe that if we can put 4, 5, or 6 DC-10 fire bombers in the air at the same time, on an aerial fire line to attack the flames, that the spread of the fire would be drastically minimized.
We utilize video newsreels to highlight illegal
activities in Russia, China, and North Korea.
We also continually monitor and enter into the
computers of 25 Russian Oligarchs, North Korea, The Kremlin,
Black-Hat Hackers, OPEC, and many more countries,
corporations, databases, and individuals for evidence of
illegal operation. Key elements of each of the particular
entered systems are monitored on our screens to identify
repeat violations and assess additional penalties.
Because of our continuing efforts to stop illegal
activities by large corporations and foreign countries, we
have become the target of several unscrupulous entities,
foreign and domestic. They are trying to discover our
identity and location. We have discovered their inquiries by
intercepting emails on the MHC Hospital network. They are a
group of hackers located in China. If it were possible for
them to get their hands on our hardware and software they
could create a major catastrophe the likes of which has
never been seen before. We have entered their network and
have determined their identities and their plans. We have
setup an electronic transfer of $120,000,000 of their bank
balance to our offshore account. We then immediately
dispersed the amount into several of our other offshore
accounts. We expect they will continue to attempt to
determine who we are and where we are located in an effort
to steal the device and our software. We have found other
email inquiries trying to find us. We are neutralizing those
inquiries by entering the systems of the inquirer and
emptying their bank accounts.
INSCOM passed us the I.P. address of a location in
Russia. They have determined that Russia will acquire The Robin
Hood Virus at all costs. We immediately entered the computer
associated with this I.P. address. We also entered the computers
in this network and the cell Phones in the area looking for related
conversations. We discovered very high-level conversations
concerning The Robin Hood Virus. It is obvious that they are
assembling a large covert operation involving many black-hat
hackers with unlimited resources, software, and equipment.
We believe they will use all legal and illegal methods to try and
discover who we are and where we are. We received another email
thru one of our anonymous email addresses stating that they knew who
we are and where we were located. This email was from the hacker
team in Russia. They must have hacked INSCOM or one of the sites
that we hacked to obtain our anonymous email address. They went
on to offer us $10,000,000,000 for our hardware and our software.
They realize that if they get their hands on The Robin Hood Virus
that they will then control the world’s financial markets, money flow,
the political landscape, and all else that matters. They indicated
that if we did not agree to sell that they would take The Robin Hood
Virus, its hardware and its software. They assured us that they had
the where-with-all to get whatever they wanted. They gave us one
week to accept their offer. They also indicated that they represented
one of the deputy prime ministers and their orders to acquire The
Robin Hood Virus came from a very high place. They also told us that
failure was not one of their options. We sent them an email from one
of our other anonymous email addresses that we received their email
message and assured them that if they were to acquire The Robin Hood
Virus that we would cause their country to go dark. Our team members
have the hardware and software that will enable us to shut down the
Moscow power grids. We have installed a self-destruct code in the
command center software that will render the software totally useless.
What they don’t know is that without the very specialized hardware
there is no way to use The Robin Hood Virus because of the way we
enter cell-phones and computers.
There is no way to determine who we are, how we entered their
systems, or what we are accessing in their systems. We have
successfully entered several computer networks and we continue to
occupy most of the computers that we have entered. Key elements of
each of the particular systems are monitored on our screens to
identify repeat violations and assess additional penalties. We
install our logo in their systems and print or display it whenever
possible. They know we are watching!
WE WILL CONTINUE DOING WHAT WE HAVE BEEN DOING AT ALL COST.
THE CENTRAL MESSAGE:
The Robin Hood Virus is creating havoc with countries,
corporations, companies, and individuals who are conducting
illegal activities. We have developed a plan to force Russia
out of the Ukraine. It involves shutting down the 11
different power grids in Moscow. We shut 1 power station
each day until Putin agrees to our demands. The Robin Hood
Virus is a topical virus in that we find new targets every day.
F Pelletier says of The Robin Hood Virus "Pickup a copy of The Robin Hood Virus and learn how some with skills and abilities are changing their world, for the better. Tracking with todays events in the world of cyber security and international intrigue, this is a fast moving tale of how the "white hat" hackers can change the world. In this cyber world the computer virus is used like the Crusader's swords of a bygone age. The sharp blade of retribution cuts and cuts deep. Just what can happen when individuals with social consciousness an agenda and a means to deliver all band together to change the world. Pickup a copy of The Robin Hood Virus and learn..Film Threat"
Gary says of The Robin Hood Virus Wow! Bob, this is so timely, it's unbelievable! The CIA's got its tit in a wringer, the NSA is deflecting any knowledge of Trump's alleged hacking (having worked for both of them, I ain't believing either one) and you're proposal of a t.v. series is . . spooky. I'd watch it!
I just finished reading your book The Robin Hood Virus! Wow, good job. What a great story. The possibilities where you can take the story line is endless. You say it is fiction, but it seems so real and so do-able as you describe every detail. It made me question a few things in the here and now! Your book made me wonder about is the 2020 Presidential election and maybe it is possible to flip the vote without detection! wow. I’m looking forward to reading the second book in the series. I see this continuing on into almost any situation. It would make a good and timely TV series or movie, too. I bought the book on Amazon. I still like having hard copies. The home on the cover is beautiful.