HOME
THE ROBIN HOOD VIRUS
Screenplays
CLICK EPISODE NAME
TO READ SCREENPLAY
Episode 1
"Pilot"
Episode 2
"World Rural Hospital Corporation"
Episode 3
"World-Wide Military Tactics"
Episode 4
"Putin Ejected from Ukraine"
Episode 5
"Hacking Russian Oligarchs"
Episode 5 COMING SOON
Episode 6 COMING SOON
Episode 7 COMING SOON
Episode 8 COMING SOON
Episode 9 COMING SOON
Episode 10 COMING SOON
Contact Me
|
THE ROBIN HOOD VIRUS Screenplay
Episode 1
"PILOT"
by
Robert Nerbovig
Series created by Robert Nerbovig
a Turquoise Software expression
therobinhoodvirus.com & dd214foundation.org
Payson, Arizona 85541
solartoys@yahoo.com
Learn more about the world of The Robin Hood Virus at www.therobinhoodvirus.com or www.wireart3d.com
Distribution, sale, duplication, or any other unauthorized use of this material in whole or in part is strictly prohibited.
Copyright 2025. All rights reserved.
1 INT. AIRCRAFT MAINTENANCE FLOOR - MORNING
1
FADE IN:
Break time at an aircraft maintenance and repair company. We are out on the floor next to a 747. We're on ARJAY, middle-aged, I.T. programmer analyst. He is talking with Paco, the company's computer network administrator, who served a tour at a firebase in Iraq, setting up and securing their computer network, and Pablo, the company's telephone fiber optics technician.
ARJAY
I know both of you are quite familiar with computer
viruses. I have developed a good one.
PACO
What is it?
ARJAY
Have you both noticed a symbol displaying in the center
of your computer screen at home and lasting for 10 seconds?
That was me. I have developed the necessary hardware
and software that will do things that have never been done
before in the computer arena.
PABLO
What does it do?
ARJAY
I can break into any computer or computer
network anywhere in the
world without the owner
ever discovering that I am
in their system. I broke
into your systems, installed my logo, displayed it
on your screen for 10 minutes, and put it to sleep.
It is still in your system, but you will never find it.
PACO
Really...how does it work?
ARJAY
I will explain how I do it sometime in the future. I have been
entering computers all over the world and extracting money.
PABLO
You can't do that, it is against the law.
ARJAY
Yes, it is, but the computers I enter are law-breakers,
foreign governments, black-hat hackers, and generally bad
actors. I am confiding in you two because you are former active
duty veterans, very close friends, and I know you can keep a secret.
I will pay you two hundred thousand dollars, each. We will put
together a small team of close friends and veterans who will
keep secret what we are doing. You and your family can live
in northern Arizona, in your own log home on my property if
you choose. We will be sending different team members and
their wives on “vacation”, for 6-9 months, to anywhere in the
world that they choose to conduct computer surveillance in
their particular assigned area of interest. You will be taking
a small version of the hardware and software to work with
that will enable you to be in constant secret contact with the
Network Operations Center in northern Arizona.
How does that sound? Are you guys in or out?
PACO
Count me in.
PABLO
I'm in.
ARJAY(V.O.)
We have since added four members to the Robin Hood Virus Team,
including Paula, who has 25 years of experience designing and
developing software applications, Rob, who is proficient
in 5 languages, Duck, who has been a rural hospital administrator
for 38 years, and Trent who is an expert in database applications.
We also offer them a 3-bedroom log home to live in on my 5000
acre ranch, and a salary of $200,000 per year.
2 INT. NETWORK OPERATIONS CENTER - ARIZONA – DAY 2
ARJAY(V.O.)
This is the Robin Hood Virus
Command Center showing a video wall with a 24-ft. 55" LCD
video wall with 17 screens capable of displaying 12 companies
each, including interactive touch. The large center
screen is used to display various data, such as a running total
of DOLLARS EXTRACTED TO DATE and DONATION TOTAL TO DATE.
We will update totals as we get them.
(initial totals are: $1,564,000,000 and $1,528,000,000).
DUCK
I have found the location of the Chairman of Missions
Hospital Corporation's home. I am entering the following
command: “execute locator latitude 39.163795 longitude
-119.767401”. Data now splashes across the screen,
"Locator program: running."
VARIOUS SHOTS -- The Robin Hood Virus Command Center.
The Command Center also contains a large conference table
with 14 chairs for group meetings and to give presentations
on the startup companies and the charities we donate to.
ARJAY(V.O.)
We have written the controller software to monitor all
of our current network incursions that we determine to be
critical and take the appropriate action when needed. We
display a different background color on each of the 204
display screens depending on the severity of the violation.
A light red background is most severe and requires immediate
attention. Backgrounds such as light green, light blue,
white, and magenta denote the severity of the violation.
It makes the viewing of the surveillance data much
easier to monitor.
We have established the monetary
limits to assess violators based on the severity of the
violation. The more severe the violation the more money we
assess to the violating country, company, or individual.
3 INT. NETWORK OPERATIONS CENTER - ARIZONA – DAY
3
ARJAY MEETING WITH THE TEAM, PACO, PABLO, PAULA, DUCK, ROB, TRENT, AROUND THE CONFERENCE TABLE WHERE THEY MEET TO DISCUSS THE STATUS AND PROGRESS OF ENTITIES THAT THEY ANONYMOUSLY FORMED.
ARJAY
The following team members have the following responsibilities.
They will monitor communications in their area of
responsibility and report back to me if they
find irregularities.
ARJAY will monitor the network
operations center for alerts and insures appropriate
action is taken. All punitive action is taken automatically.
PAULA is our Software Engineer and will be in charge
of the political division.
PACO, our network security engineer,
will monitor Cyber warfare Combat & Tactics.
DUCK is in charge of the Medical Services Division.
TRENT is our database/web developer and is in charge
of the Commercial Division.
PABLO, our telephone network designer,
develops and installs cell-phone monitoring software.
ROB is our language/linguistics
Expert and will monitor worldwide terrorist activities.
ARJAY
We have set up a U.S. Government communication channel
that does not know our identity. We have sent numerous
pieces of information that they have verified to be true and
have welcomed our continued forwarding of information
concerning people, places, activities, IP addresses of major
hackers, military plans and activity, individuals we have
identified as terrorists, and their location and activities.
INSCOM’s mission is to collect
intelligence information in all intelligence disciplines to
provide unit commanders with intelligence for the battlefield
and the focus of combat power. We have also established,
with the help of The Salvation Army, an office that
will gift money to financially desperate families
going through various health crises. We anonymously
donate to this office, furnish them with names and
addresses, and have them donate in their name. We locate
names and addresses all over the country.
We do all this anonymously.
4 INT. HOSPITAL BOARDROOM - SAME TIME
4
CHAIRMAN RICHARD MATTHEWS (60s, immaculately dressed, radiating authority) reads a letter, his face growing increasingly pale.
ARJAY (V.O.)
The weak have always been at the mercy of the powerful.
The sick are at the mercy of those who profit from
healing. Until now.
The Chairman crumples the letter in his fist.
5 INT. NETWORK OPERATIONS CENTER - ARIZONA – DAY
5
>Close on a computer screen filled with scrolling code. A shadowy figure types rapidly.
ARJAY (V.O.)
They call me Arjay. And I've created something that
will change everything.
On screen, we see a small logo appearing on the bottom of a document.
6 INT. NETWORK OPERATIONS CENTER - ARIZONA – DAY
6
Close on a bank transfer screen showing $12,000,000 being transferred from "Missions Hospital Corporation."
ARJAY (V.O.)
Some call it theft. I call it redistribution.
Some call it a virus. I call it justice.
7 INT. NETWORK OPERATIONS CENTER - ARIZONA – DAY
7
We finally see ARJAY at his workstation. Multiple monitors surround him, each displaying different information: hospital financial records, email exchanges, patient billing statements.
ARJAY (V.O.)
It began with a simple question: Why does healthcare
in America cost so much? The answer, as it turns out,
is even simpler. Greed.
Arjay types rapidly, accessing protected files. On screen: "MISSIONS HOSPITAL CORPORATION - FINANCIAL REPORT (CONFIDENTIAL)."
ARJAY (V.O.)
Missions Hospital Corporation. Twenty-three facilities
across five states. Annual revenue: three billion dollars. CEO
compensation: twenty-two million. Average worker salary:
forty-five thousand. Average patient bill: twice
the national standard.
He opens another window, revealing an email exchange between hospital executives discussing pricing strategies.
ARJAY (V.O.)
We created what we call "The Robin Hood Virus." Undetectable.
Unstoppable. It utilizes a backdoor that has never been thought
of or used in the hacker world.
He clicks on another program labeled "RANGER."
ARJAY (V.O.)
And its companion, "Ranger,", which was developed by
Pablo, lets us monitor suspicious communications by
screening for keywords. When we find something interesting...
Arjay smiles as his screen fills with private emails from MHC executives.
ARJAY
...we follow the money.
8 INT. MHC HOSPITAL CORRIDOR – DAY
8
Busy hospital corridor. Doctors, nurses, and patients are moving through the sterile environment.
ARJAY (V.O.)
The hospital doesn't look like a crime scene. The doctors don't
look like conspirators. But appearances can be deceiving.
DR. ELAINE MATTHEWS (50s, confident, the Chairman's wife and a pediatric surgeon) consults with a young resident.
9 INT. CHAIRMAN'S OFFICE – DAY
9
Chairman Matthews stares out his office window at the hospital campus below. His office is palatial, with expensive artwork and furnishings.
The door opens and VICE PRESIDENT LAWRENCE PEARSON (50s, tailored suit, golf tan) enters.
MATTHEWS
Have you seen this?
Matthews hands Pearson the letter.
PEARSON
(reading)
Jesus Christ. Who sent this?
MATTHEWS
That's what I need you to find out. And what
exactly do they know.
PEARSON
Do you think it's related to the PHO agreements?
MATTHEWS
It mentions them specifically. "An illegal agreement
between MHC and the physician hospital organization with
virtually all of the city's physicians who fixed the
prices they would charge."
MATTHEWS (CONT.)
Whoever it is, they're threatening to expose everything.
The pricing structure. The physician contracts. The agreements
with insurance companies.
PEARSON
That would destroy us.
MATTHEWS
Find the leak, Lawrence. Find it and stop it.
10 INT. NETWORK OPERATIONS CENTER NORTHERN ARIZONA - NIGHT
10
ARJAY (60s, intense, brilliant) sits before a complex setup of monitors. The light from the screens illuminates his focused face.
ARJAY (V.O.)
We operate from multiple locations. Duck is in London,
and he's the one who first flagged MHC for investigation.
Duck types rapidly, then pulls up a secure messaging system. He encrypts a message and sends it.
11 INT. DARK NETWORK OPERATIONS CENTER - ARIZONA – NIGHT
11
Arjay receives Duck's message. It reads (in decoded form): "MHC board meeting scheduled for tomorrow. All key players will be present."
ARJAY (V.O.)
When you're hunting predators, you need to understand
their habits. Know where they gather. And most importantly...
He pulls up a program that shows active connections to the MHC network.
ARJAY (V.O.)
...know how they communicate.
12 INT. MHC BOARDROOM - NEXT DAY
12
The board meeting is in progress. Chairman Matthews addresses the room full of executives and board members.
MATTHEWS
Before we begin our regular agenda, I need to address
a concerning development. We've received communication from
an anonymous source making accusations about our pricing practices.
Murmurs around the table.
MATTHEWS
I want to be absolutely clear: we do not engage in
price-fixing. Our rates are competitive and in line
with market conditions.
Chief Financial Officer VICTOR AMES (60s, sharp eyes, expensive watch) shifts uncomfortably.
MATTHEWS
I'll be meeting with each of you individually after this meeting
to discuss this matter further. Now, let's move on
to quarterly earnings.
13 INT. DARK NETWORK OPERATIONS CENTER - ARIZONA - SAME TIME
13
Arjay watches the board meeting through the webcam of a laptop in the boardroom. He can hear everything being said.
ARJAY (V.O.)
The first rule of lying: deny everything. The second rule:
find someone to blame.
He pulls up financial records showing wildly inflated prices for basic procedures and medications.
ARJAY (V.O.)
A CT scan that costs $1,200 at one hospital and $8,800
at another just ten miles away. An aspirin tablet is billed
at $30. An IV bag of saline solution: $700.
He switches to emails between Matthews and Pearson discussing how to keep prices high.
ARJAY (V.O.)
They weren't just overcharging. They were
systematically eliminating competition, forcing doctors into
exclusive contracts, and making backroom deals with
insurance companies.
Arjay's fingers fly across the keyboard.
ARJAY (V.O.)
It was time to make them pay. Literally.
14 INT. CHAIRMAN'S OFFICE - LATER THAT DAY
14
Matthews interviews Pearson behind closed doors.
MATTHEWS
Did you talk to anyone outside the company about
our physician agreements?
PEARSON
Absolutely not.
MATTHEWS
The media?
PEARSON
No. I know better than that.
MATTHEWS
Who else knew the specifics?
PEARSON
Just the executive team and legal.
A KNOCK at the door. Matthews' ASSISTANT pokes her head in.
ASSISTANT
I'm sorry to interrupt, sir, but Mr. Ames says it's urgent.
MATTHEWS
Send him in.
CFO Victor Ames enters, looking pale.
AMES
We have a serious problem.
15 INT. MHC FINANCIAL DEPARTMENT – CONTINUOUS
15
Matthews, Pearson, and Ames stand before a computer terminal. On screen: a bank transfer showing $12,000,000 moved from MHC's accounts to an offshore account.
MATTHEWS
How is this possible?
AMES
The system shows the transfer was authorized using
both your credentials and mine.
MATTHEWS
That's impossible. I didn't authorize this.
AMES
Neither did I. But the system thinks we did.
PEARSON
Can we reverse it?
AMES
We're trying, but the money's already been moved again.
It's bouncing between accounts all over the world.
Matthews notices something on the screen - a small logo at the bottom of the transfer document:
MATTHEWS
What is that?
AMES
I don't know. It wasn't there before.
Matthews' phone BEEPS with a new email. He opens it to find a message with no sender information.
ON SCREEN:
"The price of dishonesty: $12 million. Change your pricing
structure to cost plus 15% within 30 days, or the next
transfer will be double. We are watching."
16 INT. DARK NETWORK OPERATIONS CENTER - ARIZONA – NIGHT
16
Arjay watches their reactions through the office security camera. He smiles.
ARJAY (V.O.)
While our digital operation was targeting
corporate greed, others were fighting a different kind of
battle. Us doing it by making healthcare actually affordable.
He pulls up a distribution plan showing how the $12 million will be allocated.
ARJAY (V.O.)
One million to each of ten homeless shelters. One million
to food banks. One million to domestic abuse shelters. And the
rest? That was going somewhere special.
17 INT. MHC EXECUTIVE BOARDROOM – DAY
17
A crisis meeting is underway. Matthews addresses a room of executives and IT specialists.
MATTHEWS
I want to know how our system was compromised, who did it,
and how we get our money back. Now.
IT DIRECTOR CRAIG NELSON (40s, stressed, hasn't slept) stands.
NELSON
We've done a preliminary analysis. The intrusion is like
nothing I've ever seen. No malware signatures. No trace of
entry points. It's as if someone just... walked through
our firewalls.
MATTHEWS
That's not possible.
NELSON
I agree. But it happened.
PEARSON
Could it be an inside job?
All eyes turn to Ames, the CFO.
AMES
Why are you looking at me? My credentials were used,
but I didn't authorize anything.
MATTHEWS
Someone sent us a message demanding we change our pricing
structure. This isn't just theft. It's extortion.
NELSON
There's more. What was the symbol that appeared on the transfer
document? It's now appearing on every financial document
our system generates.
Look, he displays a patient's bill on the screen. In the corner the Robin Hood Virus Logo
NELSON
We can't remove it. Every time we try, it comes back.
It's like it's... watching us.
PEARSON
We need to call the FBI.
MATTHEWS
(sharply)
No. No authorities. Not yet.
AMES
Richard, we're talking about twelve million dollars!
MATTHEWS
And what happens when they start investigating? When they
start looking at our systems, emails, and
pricing agreements?
Uncomfortable silence around the table.
MATTHEWS
Fix the security breach. Find the money. Then we'll decide
about authorities.
18 INT. NETWORK OPERATIONS CENTER - ARIZONA – NIGHT
18
Arjay is on a secure video call with his team. We see DUCK in London, plus new faces: Paula, Paco, Rob, Pablo, and Trent.
PAULA
They're trying to scrub the system. Replacing hardware
and doing file-by-file transfers.
ARJAY
Won't help them. We're not in their hardware. We're in their architecture.
PACO
They still haven't called the FBI.
ROB
Of course not. They're afraid of what might be found.
DUCK
What's our next move?
ARJAY
We watch. We wait. See if they comply with our demand.
PAULA
And if they don't?
Arjay smiles grimly.
ARJAY
Then we go to phase two.
19 INT. CHAIRMAN'S HOME – NIGHT
19
Matthews sits in his study, drinking scotch. His wife, Dr. Elaine Matthews, enters.
ELAINE
You missed dinner again.
MATTHEWS
I'm dealing with a situation.
ELAINE
The missing money? It's all over the hospital.
MATTHEWS
(irritated)
That should be confidential.
ELAINE
Nothing stays secret in a hospital.
MATTHEWS
Speaking of secrets... I heard you had lunch with James Wilson last week.
ELAINE
The publisher? Yes, about the Medical Fair.
MATTHEWS
Just the Medical Fair?
ELAINE
(realizing)
You think I'm your leak? That I told him about
your pricing schemes?
MATTHEWS
Did you?
ELAINE
I'm a doctor, Richard. I took an oath to do no harm.
What do you think I think about what you're doing?
MATTHEWS
That doesn't answer my question.
ELAINE
No, I didn't tell him. But maybe I should have.
She turns to leave.
MATTHEWS
Where are you going?
ELAINE
To the hospital. Some of us still remember what it's for.
20 INT. HOSPITAL EMERGENCY ROOM – NIGHT
20
Dr. Elaine Matthews works in the busy ER. She treats a YOUNG MOTHER with a sick CHILD.
YOUNG MOTHER
The other hospital wanted eight hundred dollars just to
see him. We don't have insurance.
DR. MATTHEWS
(examining the child)
He has a severe ear infection. He needs antibiotics.
YOUNG MOTHER
How much will this cost?
Dr. Matthews hesitates, knowing the answer.
DR. MATTHEWS
Let me worry about that. Let's just get him better.
21 INT. HOSPITAL BILLING DEPARTMENT – LATER
21
Dr. Matthews approaches a billing clerk.
DR. MATTHEWS
Lisa, I need you to do something for me. That Martinez
family I just treated? I want their bill sent to me personally.
LISA
Dr. Matthews, you know we can't—
DR. MATTHEWS
Please, Lisa. Just this once.
Lisa looks around, then nods.
22 INT. MHC IT DEPARTMENT – DAY
22
Nelson and his team work frantically to secure their systems. New servers are being installed.
NELSON
We're replacing every server, every desktop, and
transferring files individually after scanning them.
TECHNICIAN
It's going to take weeks, and we still might miss something.
Nelson's phone RINGS. It's Matthews.
NELSON
Yes, sir?... What?... When?... I'll check immediately.
He hangs up, looking alarmed.
NELSON
The virus just sent another message.
23 INT. CHAIRMAN'S OFFICE - MOMENTS LATER ;
23
Nelson shows Matthews a computer screen. A new message:
"Your security measures are amusing but futile.
We see everything. Change your pricing structure or prepare
for another withdrawal in 30 days”.
MATTHEWS
Can't you block these messages?
NELSON
We're trying everything. This isn't normal malware.
It's like... It's thinking. Adapting to our
countermeasures.
MATTHEWS
I want you to check something. See if there's any
connection between this virus and Victor Ames.
NELSON
The CFO? You think he's involved?
MATTHEWS
Just check. Quietly.
24 INT. NETWORK OPERATIONS CENTER - ARIZONA – NIGHT
24
Arjay monitors communications within the MHC network.
ARJAY (V.O.)
The beauty of The Robin Hood Virus is its ability to monitor
without being detected. We could see everything—emails, messages,
even private investigator reports.
He pulls up an email from Matthews to a private investigator, asking for information on Ames.
ARJAY (V.O.)
Matthews was looking for a scapegoat. And he'd found one
in his CFO. What he didn't know was that we'd already discovered
something interesting about Victor Ames.
He switches to documents showing connections between Ames and a medical equipment company.
ARJAY (V.O.)
Ames was skimming from the company, diverting funds to his own
medical equipment business. The hospital executive is
stealing from the hospital thieves. There's a certain
poetry in it.
Arjay pulls up another screen showing a world map with rural areas highlighted.
ARJAY (V.O.)
But our focus wasn't on corporate intrigue. We had a bigger
mission. Something that would truly change healthcare forever.
The screen shows schematics for rural hospitals in developing countries.
25 INT. FBI FIELD OFFICE – DAY
25
Special Agent DIANA REYES (40s, no-nonsense, brilliant) reviews files on MHC's missing $12 million. Her partner, Agent MARCUS CHEN (30s, tech-savvy), enters.
CHEN
You were right. MHC didn't report the theft. We only know about
it because it triggered banking security protocols.
REYES
Twelve million dollars disappears, and they don't call us?
What are they hiding?
CHEN
Based on what our financial crimes unit found, a lot.
This hospital network has been flagged multiple times for
pricing irregularities.
REYES
And now someone's stealing from them. Poetic justice?
CHEN
There's something else. The money trail. It's like
nothing I've ever seen.
He shows her a complex diagram of fund transfers.
CHEN
The money bounced through twenty-three countries in less
than an hour, then seemingly vanished.
REYES
Money doesn't vanish.
CHEN
This did. And here's the weird part. We're picking up
donations to charities all over the country. Homeless shelters,
food banks, and domestic violence centers. All anonymous.
All through untraceable channels.
REYES
You think it's the same money?
CHEN
The timing matches. And there's this.
He pulls up images of the small logo found on MHC documents.
CHEN
This symbol started appearing in MHC's system right
after the theft. We're calling it the "Robin Hood Virus."
REYES
As in "steal from the rich, give to the poor"?
CHEN
Exactly. And it's not just MHC. We've identified similar
patterns at three other major hospital networks.
REYES
Get a warrant. I want to see exactly what MHC is hiding.
26 INT. MHC EXECUTIVE BOARDROOM – DAY
26
Matthews meets with the board, all looking concerned.
BOARD MEMBER
The FBI is asking questions about the missing funds.
They've requested access to our financial records.
MATTHEWS
Absolutely not. Our legal team will handle this.
BOARD MEMBER
Richard, we can't just ignore a federal investigation.
MATTHEWS
I'm not suggesting we ignore it. I'm suggesting we
control it. If they start digging through our systems...
He doesn't finish the sentence.
He doesn't need to.
PEARSON
What about the virus's demands? The thirty-day deadline
is approaching.
MATTHEWS
We are not capitulating to extortion.
BOARD MEMBER
Even if it means losing another twelve million? Or more?
MATTHEWS
I have a plan. Victor Ames. The evidence suggests he
may be involved.
PEARSON
You think Ames is behind the virus?
MATTHEWS
I think he's a convenient explanation for both the missing
money and any... irregularities the FBI might find
in our financial practices.
Uncomfortable silence around the table.
MATTHEWS
We'll give the FBI Ames. Let them focus on his embezzlement.
Meanwhile, we'll quietly adjust some of our more...
aggressive pricing strategies. Just enough to
satisfy our anonymous friend.
27 INT. CFO AMES' HOME OFFICE – NIGHT
27
Ames works late, reviewing documents. His phone RINGS.
AMES
Hello?... Yes, I understand... No, I haven't
transferred any funds... What?... That's impossible!
He pulls up his bank account on his computer. His expression changes to horror.
AMES
My accounts have been emptied? How?
28 INT. NETWORK OPERATIONS CENTER - ARIZONA - SAME TIME
28
Arjay watches Ames through his computer's webcam.
ARJAY (V.O.)
Victor Ames was about to become the fall guy for everything.
Matthews was setting him up.
But two could play that game.
On Arjay's screen: a transfer showing funds moving from Ames' personal accounts to offshore locations.
ARJAY (V.O.)
Sometimes justice requires a sacrifice. Ames was stealing from
the hospital. The hospital was stealing from patients.
In our book, they were both guilty.
29 EXT. RURAL CLINIC - SOMEWHERE IN AFRICA – DAY
29
A small, struggling medical clinic in a remote village. Doctors work with limited resources to treat a long line of patients.
ARJAY (V.O.)
While the wealthy hospital executives fought over millions,
people were dying from lack of basic medical care
all over the world.
The clinic's DIRECTOR opens an email on an old laptop. Her eyes widen in disbelief. The email shows a donation of $5 million from an anonymous source.
ARJAY (V.O.)
That's where the real mission of the Robin Hood Virus
came in. Not just taking from the corrupt, but giving
to those truly in need.
30 INT. FBI FIELD OFFICE – DAY
30
Reyes and Chen review financial records from MHC.
CHEN
Their pricing structure is even worse than we thought. They're
charging up to 400% more than neighboring hospitals for
the same procedures.
REYES
And they've established monopolies in several markets by
buying up competing facilities.
CHEN
So why haven't they been prosecuted?
REYES
Because technically, it's not illegal. They're exploiting
loopholes in the system.
CHEN
Until someone decided to create their own justice.
REYES rushes in.
REYES
Agents, we've got something. Victor Ames, the CFO
of MHC, just tried to leave the country. Customs stopped
him at LAX. He had over two million in bearer bonds
in his luggage.
REYES
Bring him in.
31 INT. INTERROGATION ROOM – LATER
31
Ames sits across from Reyes and Chen, looking desperate.
AMES
I'm being framed! Someone hacked my accounts, transferred
all my money offshore. I was trying to protect what little
I had left!
REYES
So you're denying involvement in the
twelve-million-dollar theft from MHC?
AMES
Yes! I mean, my credentials were used,
but it wasn't me!
CHEN
What about your connections to MedEquip Solutions?
AMES
(hesitating)
That's... a legitimate business investment.
REYES
Is it? Because we have records
showing MHC paid MedEquip three times the market rate for
basic equipment. Equipment you signed off on.
AMES
(deflating)
Look, everyone does it. The whole system is corrupt.
Matthews, Pearson, all of them. I just took my cut.
CHEN
And the Robin Hood Virus?
AMES
I don't know anything about that! I'm being set up!
REYES
By whom?
AMES
By Matthews! He needs a scapegoat, and I'm it!
Reyes and Chen exchange looks.
REYES
Tell us everything you know about MHC's pricing practices,
and maybe—just maybe—we can help you.
32 INT. NETWORK OPERATIONS CENTER - ARIZONA – NIGHT
32
Arjay watches the interrogation through FBI security cameras. Duck appears on a video call.
DUCK
Ames is talking. Giving them everything on MHC's
pricing schemes.
ARJAY
Good. Phase two is complete. Matthews tried to
sacrifice Ames, but ended up exposing himself in the process.
DUCK
The FBI will go after both of them now.
ARJAY
And the entire corrupt system they represent.
DUCK
What about phase three?
ARJAY
It's already in motion.
33 INT. MHC CHAIRMAN'S OFFICE – DAY
33
Matthews watches a news report on TV. The headline: "FBI RAIDS MISSIONS HOSPITAL CORPORATION."
TV REPORTER
...following allegations of price-fixing and financial fraud.
Sources say both the Chairman and CFO of the hospital
network are under investigation...
His phone RINGS. It's his wife.
MATTHEWS
Elaine, I can't talk right now—
ELAINE (O.S.)
It's over, Richard. I've given my statement to the FBI.
About everything.
MATTHEWS
You what? You're my wife!
ELAINE (O.S.)
I'm a doctor first. I took an oath.
She hangs up. Matthews stares at the phone, then at his computer screen. The Robin Hood logo stares back at him.
34 INT. SMALL RURAL HOSPITAL - AFRICA – DAY
34
The clinic from earlier has expanded. New equipment is being installed. More doctors and nurses treat patients.
ARJAY (V.O.)
The twelve million from MHC was just the beginning.
Our virus found similar corruption at dozens of medical
corporations, insurance companies, and pharmaceutical giants.
35 INT. HOMELESS SHELTER – DAY
35
Volunteers serve food to those in need. The facility looks newly renovated.
ARJAY (V.O.)
The money flowed where it was needed most. Homeless shelters,
Food banks, and Research for neglected diseases.
36 INT. SMALL TOWN HOSPITAL - AMERICA – DAY
36
A rural hospital that was on the verge of closing is now thriving with new equipment and staff.
ARJAY (V.O.)
And rural hospitals across America were squeezed out of
existence by the corporate giants.
37 INT. FBI FIELD OFFICE – DAY
37
Reyes and Chen review their case board. Photos of Matthews, Ames, and other executives. Financial records. And in the center: the Robin Hood logo.
REYES
We've got them dead to rights on price-fixing, fraud,
and conspiracy. But we're no closer to finding our Robin Hood.
CHEN
Whoever created this virus is brilliant. No digital footprint.
No trace of the stolen funds. Just results.
REYES
Results? You mean theft?
CHEN
I mean, hospitals that were going to close are staying
open. People getting care who couldn't afford it before.
Is it theft if it saves lives?
REYES
Don't go soft on me, Chen. Our job is to uphold the law.
CHEN
Even when the law protects the corrupt?
Reyes doesn't answer.
38 INT. NETWORK OPERATIONS CENTER - ARIZONA – NIGHT
38
Arjay finalizes his work. On screen: "MISSION COMPLETE - PHASE THREE ACTIVATED."
He initiates a final program. On screen: "WORLDWIDE DEPLOYMENT ACTIVE."
ARJAY (V.O.)
Because the Robin Hood Virus wasn't just about punishing
the corrupt or redistributing wealth. It was
about changing the system itself.
39 INT. HOSPITAL BILLING DEPARTMENT - VARIOUS LOCATIONS – DAY
39
Across the country, hospital billing systems are simultaneously updated. Price schedules are automatically adjusted to cost plus 15%.
40 INT. INSURANCE COMPANY HEADQUARTERS – DAY
40
Insurance executives watch in horror as their systems automatically adjust reimbursement rates to fair market values.
41 INT. RURAL CLINIC - WORLDWIDE – DAY
41
Small clinics and hospitals around the world receive anonymous donations, equipment, and supplies.
ARJAY (V.O.)
The virus spread beyond what anyone imagined possible.
Not destroying, but rebuilding. Not corrupting, but cleansing.
42 MONTAGE - THE AFTERMATH
42
News reports about "mysterious whistleblower" exposing
Global Atlantic
Regulatory agencies announcing investigations
Rural hospitals receiving new dialysis equipment
Global Atlantic stock price plummeting
Law enforcement raiding Global Atlantic offices
ARJAY (V.O.)
The aftermath is always my favorite part. Watching justice
unfold in slow motion. The raids, the investigations, the
executives suddenly "cooperating with authorities."
All while knowing that lives are being saved with the
redirected funds.
43 INT. LOG CABIN - LIVING ROOM – DAY
43
Arjay sits by the fireplace, watching news reports on a tablet.
ARJAY (V.O.)
We've diverted hundreds of millions of dollars to date. But
more importantly, we've sent a message: no one is untouchable.
Not corrupt pharmaceutical executives, not money launderers,
not anyone who profits from exploitation and suffering.
He sets down the tablet and looks out at the lake through the window.
ARJAY (V.O.)
But we're not naive. The more successful we are, the more
attention we'll attract. Not just from our targets, but from
those tasked with stopping people like us.
44 EXT. FBI HEADQUARTERS - WASHINGTON DC – DAY
44
Establishing shot of the FBI building.
45 INT. FBI CYBER DIVISION – DAY
45
A specialized unit with advanced technology. Agents review data about recent cyber intrusions.
SPECIAL AGENT REYES stands before a board covered with information about the recent hacks.
AGENT REYES
The pattern is clear. These aren't random attacks. They're
coordinated, surgical strikes against specific targets.
And they're leaving evidence behind deliberately.
CHEN
Robin Hood hackers? Is that even a thing?
AGENT REYES
It is now. And my job is to catch them, regardless of
their intentions.
46 INT. NETWORK OPERATIONS CENTER – ARIZONA
46
Arjay reviews alerts on his system, noticing increased chatter on federal networks about their activities.
ARJAY (V.O.)
The FBI has created a special task force to find us.
Agent CHEN is leading it—former military intelligence,
cybersecurity expert. She's good. Very good.
He pulls up Agent CHEN's file, studying his new adversary.
ARJAY (V.O.)
The question isn't whether she'll find us, it's what she'll do
when she realizes what we're doing. Will she see us as
criminals to be caught? Or allies in a fight against a system
that's failed too many for too long? Her search for us
will ultimately be in vain.
47 EXT. ARIZONA MOUNTAINS – SUNSET
47
The log cabin sits peacefully against the backdrop of the mountains and lake.
ARJAY (V.O.)
They call us The Robin Hood Virus. A digital infection
in a corrupted system. Maybe we are. But sometimes, the
only way to fix a virus-riddled system is to introduce a
new program, one designed to restore balance to a network
that's forgotten its purpose.
48 INT. NETWORK OPERATIONS CENTER – ARIZONA
48
Arjay initiates a new scan, searching for their next target.
ARJAY (V.O.)
The hunt continues. The next target. The next extraction.
The next donation. Until the system either heals itself or
we force it to.
The screens light up with information about a new potential target, a major pharmaceutical company with a proposed new drug with a bogus test history.
ARJAY
Team, we have our next mission.
FADE TO BLACK.
FADE IN:
49 EXT. ARIZONA MOUNTAINS – DAWN
49
A magnificent log home sits perched on a lakefront property, surrounded by pine trees. The rising sun casts an orange glow across the still water.
50 INT. NETWORK OPERATIONS CENTER – ARIZONA
50
A state-of-the-art underground bunker. The walls are foot-thick concrete. A massive 14-foot LCD video wall displays color-coded screens monitoring various networks. Each screen shows different data flows, company logos, and intrusion metrics.
ARJAY sits before the control station, typing rapidly.
ARJAY (V.O.)
They call us criminals. Hackers. Digital terrorists.
But what do you call corporations that price-gouge
cancer patients?
Or politicians who accept millions from foreign governments?
Or tech giants that steal your data and sell it to the highest bidder?
Arjay's fingers fly across the keyboard. He enters the coordinates of PHARMADYNE GLOBAL into the locator software. On screen, banking transaction records appear and numbers begin to change.
ARJAY (V.O.)
We call them targets.
51 INT. NETWORK OPERATIONS CENTER (NOC) – MORNING
51
The underground bunker is illuminated primarily by the glow of the massive video wall. Arjay sits at a workstation with three monitors. He sips coffee from a mug that reads "Hack The Planet."
ARJAY (V.O.)
Four years ago, I assembled a team of specialists -
former military, programmers, and network engineers.
People who'd seen the damage that greed does to a system,
whether that system is a government, a hospital, or a
computer network.
On one monitor, we see PHOTOS of the team members described in the documents.
ARJAY (V.O.)
We have sent the team members to the location of their
choice. We sent the hardware and software necessary to
monitor their specific areas of responsibility and the
ability to communicate with the network operations center
with coded emails. They also have the ability to destroy
their hardware and software if they suspect they are
being compromised.
We developed something revolutionary.
A backdoor that can penetrate, and reside in, any system
in the world without detection. We call it the Network
Computer Invasion System. NCIS for short.
Arjay taps a command, and one of the screens on the video wall turns light red.
ARJAY (V.O.)
And this morning, we have a new target that's lit up our board.
CLOSE ON: The screen shows "PHARMADYNE GLOBAL" with financial data scrolling beneath it.
PAULA
(via secure connection)
I've been monitoring them for weeks. Their new "breakthrough"
drug just got FDA approval yesterday. They're planning to
charge $12,000 per treatment.
ARJAY
What's their production cost?
PAULA
Eighty-seven dollars.
Arjay shakes his head in disgust.
ARJAY
And let me guess - developed with government grants?
PAULA
Bingo. Sixty million in NIH funding.
ARJAY
Time to execute Protocol Three. Can you handle the primary?
PAULA
Already mapping their network architecture. I'll send
you entry points in twenty minutes.
ARJAY
I'll alert the rest of the team.
52 INT. NETWORK OPERATIONS CENTER - ARIZONA - MINUTES LATER
52
Arjay sends encrypted messages to the team. We see a digital map of the world with team member locations highlighted:
PACO in Belize,
DUCK in London,
TRENT in Maui,
PABLO in Montreal,
and ROB in Cape Town.
His secure communication screen lights up as team members respond.
ARJAY (V.O.)
Our team is spread across the world's most beautiful locations.
Not because we're on vacation - though the settings don't
hurt - but because it makes us harder to track. Different
jurisdictions, different ISPs, different time zones.
Arjay studies PharmaDyne's financial records now displayed on his screen.
ARJAY (V.O.)
We operate with three principles: First, identify the
violators - those
abusing power, exploiting the
vulnerable, or hacking for malicious gain. Second, gather
irrefutable evidence. And third... extract a penalty.
CLOSE ON: Arjay's eyes, determined.
ARJAY
Let's see what else these pharmaceutical pirates are hiding.
53 EXT. PHARMADYNE GLOBAL HEADQUARTERS - CHICAGO – DAY
53
A gleaming glass tower with the PharmaDyne logo displayed prominently. Executives in expensive suits enter and exit.
54 INT. PHARMADYNE CEO OFFICE - SAME TIME
54
GREGORY VANCE (60s, polished, ruthless) sits at a massive desk reviewing projections for their new drug launch. His assistant enters.
ASSISTANT
Mr. Vance, the board is ready for you.
Vance smiles, standing and straightening his tie.
VANCE
Tell them I have very good news about our profit forecasts.
55 INT. NETWORK OPERATIONS CENTER - ARIZONA - SAME TIME
55
Arjay's screen shows he has successfully penetrated PharmaDyne's network. A sidebar displays various departments: R&D, FINANCE, EXECUTIVE, LEGAL.
ARJAY
Let's see what Legal is hiding. Arjay navigates to the Legal
department files. He scrolls through folders until
finding "CLINICAL TRIALS - RESTRICTED."
ARJAY (V.O.)
The bigger the company, the bigger the secrets. And their
lawyers always know where the bodies are buried.
Arjay opens documents showing clinical trial results. His expression darkens as he reads.
ARJAY
(quietly)
They knew. They've known for months.
He pulls up his secure communication to the team.
ARJAY
Team, PharmaDyne suppressed trial data showing liver
toxicity in 14% of patients. They're about to release
this drug to hundreds of thousands of people.
56 INTERCUT WITH TEAM MEMBERS AT THEIR LOCATIONS
56
PACO (40s, military bearing) in a beachside villa in Belize.
PACO
Rules of engagement?
DUCK (60s, distinguished, compassionate) in a London apartment.
DUCK
This falls under the maximum response protocol. People
will die if that drug hits the market.
TRENT (50s, laid-back but brilliant) on a lanai in Maui.
TRENT
I'm accessing their database architecture now. We'll
need to extract all the trial data and find a
distribution method.
ROB (40s, scholarly) in Cape Town.
ROB
I'm monitoring their internal communications. The CEO
is meeting with the board right now. They're planning
international distribution starting next week.
PABLO (40s, technical genius) in a modern Montreal apartment.
PABLO
I will access their executives' phones. We'll have every
conversation they've had about hiding this data.
BACK TO:
57 INT. NETWORK OPERATIONS CENTER – ARIZONA
57
Arjay nods, making his decision.
ARJAY
Execute Thunderbird Protocol. Full extraction,
maximum penalty.
ARJAY (V.O.)
Some targets deserve a warning. Others, like PharmaDyne,
have crossed a line that demands immediate action. When lives
are at stake, we don't just take their money -
we take their secrets too.
ARJAY
Paula, prepare the whistleblower package.
Duck, contact your medical connections. we need independent
verification of this toxicity data. Trent, I want money
transfers ready. Standard distribution matrix. Pablo, get me
everything from their executives' phones.
He takes a deep breath.
58 INT. PHARMADYNE BOARDROOM - SAME TIME
58
Vance presents glowing profit projections to the board. Suddenly, the presentation screen glitches.
VANCE
Just a technical-
The screen goes black, then displays the Robin Hood Virus logo:
TEXT ON SCREEN: "THE TRUTH CANNOT BE HIDDEN."
The board members look confused as the screen changes to display internal PharmaDyne documents - the suppressed clinical trial data.
BOARD MEMBER #1
What the hell is this?
VANCE
(panicking)
Shut it down! IT, shut it down!
His cell phone rings. He answers.
DISTORTED VOICE (ARJAY)
We know what you're hiding, Mr. Vance. And now,
so does everyone else.
59 INT. NETWORK OPERATIONS CENTER – ARIZONA
59
ARJAY WATCHES MULTIPLE SCREENS SHOWING CHAOS UNFOLDING AT PHARMADYNE. ONE SCREEN SHOWS THEIR STOCK PRICE BEGINNING TO PLUMMET.
ARJAY (V.O.)
When we release the Robin Hood Virus, it doesn't just steal -
it reveals. The truth is our most powerful weapon.
Another screen shows bank transfers initiating - millions moving from PharmaDyne accounts to a series of offshore accounts.
ARJAY (V.O.)
But justice requires more than exposure.
It requires restitution.
A third screen shows emails being sent automatically to regulatory agencies, law enforcement, and media outlets worldwide - all containing the suppressed trial data.
ARJAY
Transfer complete. Fifty-eight million dollars extracted.
Implementing distribution protocol.
He watches as the money flows through a complex series of transfers, eventually splitting into donations to medical research facilities, patient advocacy groups, and legal funds for victims of pharmaceutical negligence.
ARJAY (V.O.)
In the digital age, Robin Hood doesn't need a bow and arrow.
Just a keyboard and the right team.
60 EXT. FBI CYBER DIVISION HEADQUARTERS - WASHINGTON D.C. – DAY
60
Establishing shot of the imposing building.
61 INT. FBI CYBER DIVISION – CONTINUOUS
61
A high-tech operations center where agents monitor cyber threats. Screens display global hacking activities.
SPECIAL AGENT REBECCA CHEN (40s, brilliant, driven) strides into the room.
ANALYST
Agent Chen, you're going to want to see this.
Chen approaches the main screen, which shows breaking news about PharmaDyne.
NEWS ANCHOR (ON SCREEN)
...in a stunning development, pharmaceutical giant
PharmaDyne Global is in freefall this morning after
confidential documents were leaked showing the company
deliberately hid dangerous side effects of their new blockbuster
drug. Even more mysteriously, nearly 60 million
dollars disappeared from company accounts in what experts
are calling the most sophisticated cyber heist in history...
REYES
When did this happen?
ANALYST
Three hours ago. But here's the weird part - dozens of
medical research foundations and patient advocacy
groups just reported receiving anonymous donations. Total
matches what was taken from PharmaDyne almost to the penny.
REYES
(realizing)
It's them again. The Robin Hood hackers.
She walks to her office, unlocking a secure drawer and pulling out a thick file labeled "ROBIN HOOD VIRUS - CLASSIFIED."
REYES (V.O.)
Fourth case in three months. Same MO. They hit companies
engaged in unethical practices, expose their wrongdoing,
take millions, and donate it to related causes.
Chen pins photos and information to a board: previous targets, technical details, and suspected team members - though all they have are code names.
(to herself)
But who are you? And how are you getting in and out without
leaving a single trace?
62 INT. NETWORK OPERATIONS CENTER - ARIZONA - SAME TIME
62
Arjay monitors FBI chatter about the incident.
ARJAY (V.O.)
We know they're looking for us.
The FBI, NSA, Interpol. But our system leaves no
fingerprints, no backdoors they can follow. We're ghosts in
their machines.
He pulls up a video call with the team.
ARJAY
PharmaDyne operation was successful. All data distributed,
funds transferred. FBI is responding, but they have nothing new.
PAULA
(on screen)
Next target?
ARJAY
I'm sending profiles now. We have a defense contractor
overcharging the Pentagon by billions, a tech company selling
user data to authoritarian governments, and a banking
conglomerate funding illegal logging operations in
protected rainforests.
PACO
(on screen)
My vote's for the defense contractor. They're using my old
unit's name to push dangerous equipment on soldiers.
ARJAY
Let's put it to a vote. But first - Duck, what's your
assessment of the PharmaDyne fallout?
DUCK
(on screen)
FDA has already suspended approval. European regulators are
opening investigations. I've alerted medical contacts to
watch for any patients already in trials. We likely saved
thousands of lives today.
Arjay nods, satisfied.
ARJAY
Then it was worth the risk. Remember everyone - security
protocols. Change locations according to the schedule.
Next check-in in 24 hours.
After the call ends, Arjay leans back in his chair. He looks tired but resolved.
ARJAY (V.O.)
People ask why we do this. Why risk everything? The answer is
simple: because someone has to. In a world where the
powerful write the laws, true justice requires operating
outside them.
He stands and walks to a small table with framed photos - younger versions of himself with hospital staff, clients, family.
ARJAY (V.O.)
I spent decades watching healthcare become a profit center
instead of a human right. Watched as good people died because
they couldn't afford treatment. Watched data become a
weapon. Watched as the digital age created new forms of
theft and exploitation.
He touches one photo - himself with a young woman who resembles him.
ARJAY (V.O.)
And then I watched my daughter die because a
pharmaceutical company decided the cure for her disease
wasn't profitable enough to produce. That's when I knew the
system wasn't just broken - it was rigged.
He returns to his station with renewed purpose.
ARJAY (V.O.)
So we built a new system. A more just one.
63 EXT. FBI HEADQUARTERS – NIGHT
63
Chen works late, examining technical data from the PharmaDyne hack.
REYES
(to herself)
No malware signatures. No network logs. It's like they
were never there.
Her phone rings.
REYES
Reyes.
DIRECTOR (V.O.)
We've got a situation. The White House is involved now. The
PharmaDyne hack exposed some government officials who were
pushing the drug approval through. They want answers.
REYES
Sir, I need more resources. This group is unlike
anything we've seen.
DIRECTOR (V.O.)
You'll have them. National security priority now. I'm
authorizing a joint task force. NSA, CIA, our best eople.
REYES
There's something else, sir. The money trail... It's not
just random. There's a pattern. I think they're building
toward something bigger.
DIRECTOR (V.O.)
Find them, Reyes. Whatever it takes.
64 INT. NETWORK OPERATIONS CENTER - ARIZONA - SAME TIME
64
Arjay receives an alert. One of the screens shows increased FBI activity.
ARJAY
(typing commands)
Let's see what you're up to, Agent Chen.
He accesses FBI systems, reviewing the task force authorization.
ARJAY (V.O.)
The game is changing. They're dedicating more resources,
bringing in intelligence agencies. Which means we need to
be more careful – and more bold.
He sends a message to the team: "ESCALATION FROM AUTHORITIES. IMPLEMENT COUNTERMEASURES OMEGA."
The hunt continues. The next target. The next extraction. The next donation. Until the system either heals itself or we force it to.
The screens light up with information about a new potential target—a major defense contractor with fraudulent billing practices: Meridian Defense Systems.
ARJAY (V.O.)
The higher the stakes, the more important our work becomes.
Because when justice fails in the real world, sometimes the
only place to find it is in the virtual one.
He begins typing rapidly, preparing for their next mission.
ARJAY
(to himself)
Time to show them what the Robin Hood Virus can really do.
FADE OUT.
65 INT. MERIDIAN DEFENSE SYSTEMS - CEO OFFICE – MORNING
65
RICHARD BLACKWOOD (50s, military bearing, ruthless) reviews contracts worth billions. His assistant enters.
ASSISTANT
Sir, the Pentagon called. They want to discuss the
discrepancies in the latest invoice.
BLACKWOOD
Tell them our costs increased due to supply chain issues.
Same story as always.
ASSISTANT
Yes, sir. Also, IT needs to speak with you about a
security upgrade.
BLACKWOOD
(annoyed)
Fine. Send them in.
The assistant exits. A moment
later, a technician enters with a laptop.
TECHNICIAN
Mr. Blackwood, we need to update your security credentials
following the PharmaDyne incident. Everyone at your level needs
the new protocols.
BLACKWOOD
Make it quick.
The technician connects to Blackwood's computer. Meanwhile, Arjay has entered the coordinates of Meridian's computer network and cellphones into the locator software and inserted the Robin Hood Virus and the Ranger Virus.
TECHNICIAN
This will just take a minute.
66 INT. NETWORK OPERATIONS CENTER - ARIZONA - SAME TIME
66
ARJAY
I'm in their system.
Arjay navigates through
Meridian's network, accessing classified files showing
massive overbilling on military contracts, defective
equipment being knowingly shipped to combat zones, and bribes to government officials.
ARJAY
My God, Paco. They shipped body armor they knew would fail.
PACO
(grimly)
I lost friends to their "cost-saving measures."
ARJAY
Well, they're about to pay that cost back. With interest.
67 EXT. WAIMANALO BEACH, HAWAII – DAY
67
Trent works from a beach house lanai, monitoring Meridian's financial systems.
TRENT
(on video call)
I'm seeing billions here, Arjay. Offshore accounts, shell
companies. They've hidden money all over the world.
ARJAY (ON SCREEN)
Can you trace it all?
TRENT
Give me two hours. I'll map the entire structure.
68 INT. FBI CYBER DIVISION - TASK FORCE ROOM - SAME TIME
68
Agent Chen stands before a room full of agents and analysts from multiple agencies.
REYES
The group calls themselves "The Robin Hood Virus." They've hit
fourteen major targets in the past two years that we know of.
Total financial impact: over one hundred million dollars.
She displays profiles on a screen.
REYES
We have no names, no faces. Just operating signatures and
patterns. Their leader appears to be this individual - code
name "Arjay." Technical indicators suggest former healthcare
IT, possibly hospital administration background.
NSA ANALYST
How are they breaching these systems? These are some of
the most secure networks in the world.
REYES
That's what we need to figure out. They're using some kind
of proprietary backdoor technology we haven't been able to
identify. No malware signatures, no network logs.
CIA AGENT
Could be nation-state sponsored. This level of sophistication...
REYES
We considered that. But their targets and the donation
patterns don't align with any known state actors' interests.
This is ideological. She pulls up a map showing the global
donation pattern.
REYES
And they're building toward something. These aren't random
acts of hacktivism. There's a larger goal here.
FBI DIRECTOR enters.
DIRECTOR
And as of this morning, we have intelligence suggesting their
next target is Meridian Defense Systems. National security
implications just went through the roof.
The room tenses.
REYES
I want every system at Meridian monitored. If they try
to get in, we'll be waiting.
69 INT. NETWORK OPERATIONS CENTER - ARIZONA – AFTERNOON
69
Arjay coordinates the team as they prepare to execute the Meridian operation.
ARJAY
Duck, what do we have on the veterans affected by Meridian's
defective equipment?
DUCK (ON SCREEN)
I've compiled a list of 342 service members injured or killed.
I've identified the appropriate veterans' organizations
and medical facilities to receive funds.
ARJAY
Pablo, where are we on communications?
PABLO (ON SCREEN)
I've accessed their executive phone network. Every call,
every text about the defective equipment. They knew,
Arjay. They all knew.
ARJAY
Rob, prepare the disclosure packages. I want every
government oversight committee, every major news outlet,
and every military families organization to get the
full story simultaneously.
ROB (ON SCREEN)
Already formatted. Ready for distribution on your command.
ARJAY
Paula, status on their security?
PAULA (ON SCREEN)
They've increased monitoring since PharmaDyne. And
there's unusual activity - I think law enforcement might
be watching.
ARJAY
(concerned)
Can they detect us?
PAULA
No.
ARJAY
Agreed. Trent, financial extraction plan?
TRENT (ON SCREEN)
I've identified 1.2 billion in fraud. Recommend we
extract 250 million as penalty. Distribution matrix ready.
ARJAY
Execute in phases. 50 million first, then assess response.
The team acknowledges. Arjay takes a deep breath.
ARJAY
This is our biggest target yet. If we succeed, thousands of
service members will get justice. If we fail...
He doesn't finish the thought.
ARJAY
Begin Operation Sentinel. May digital justice prevail.
70 INT. MERIDIAN DEFENSE SYSTEMS - SERVER ROOM – NIGHT
70
Security guards patrol as IT specialists monitor systems. Suddenly, screens begin to flicker.
IT SPECIALIST
Sir, we have unusual network activity.
SECURITY CHIEF
Lock it down! Now!
71 INT. FBI CYBER DIVISION - SAME TIME
71
Alarms sound. Chen rushes to the main terminal.
ANALYST
They're in! Robin Hood is hitting Meridian right now!
REYES
Track it! I want source locations, entry points, everything!
72 INT. NETWORK OPERATIONS CENTER - ARIZONA - SAME TIME
72
Arjay works frantically, his screens showing Meridian's security
protocols activating.
ARJAY
They were waiting for us. Paula, countermeasures!
PAULA (ON SCREEN)
Deploying ghost nodes. No countermeasures needed. They will
run around in circles.
ARJAY
Trent, begin extraction now. No time for phases.
TRENT (ON SCREEN)
Transferring 250 million. Thirty seconds to completion.
73 INT. MERIDIAN DEFENSE SYSTEMS – CONTINUOUS
73
Systems begin shutting down across the facility. Blackwood rushes into the server room.
BLACKWOOD
What the hell is happening?
IT SPECIALIST
Someone's in our system, sir. They're extracting files,
accessing restricted areas... and our accounts are
being drained.
On screens around the room, the Robin Hood logo appears with
text: "YOUR CORRUPTION HAS BEEN EXPOSED."
Screens begin displaying internal documents showing the fraud and defective equipment scandal.
BLACKWOOD
(panicking)
Shut it down! Cut the power if you have to!
Security Chief's phone rings. It's the FBI.
SECURITY CHIEF
They're here. They want access to our systems.
As Blackwood looks horrified, news alerts begin appearing on phones throughout the room - the story is breaking worldwide.
74 INT. FBI CYBER DIVISION – CONTINUOUS
74
Chen and her team frantically try to trace the intrusion.
NSA ANALYST
We've got active connections from... everywhere.
Bangkok, Lima, Johannesburg, Tokyo...
REYES
It's misdirection. Focus on the data patterns!
CIA AGENT
We are running in circles. We cannot find the origin of the attacks.
Reyes's eyes widen.
REYES
(realizing)
It's not a failure. It's a
defense mechanism. They triggered it.
REYES
(determined)
Find them. Whatever it takes.
75 DRONE SHOT:
75
Pulling back from the scene, revealing the vastness of the
landscape, making it clear how difficult finding Arjay will be.
ARJAY (V.O.)
In a world where the powerful make the rules, sometimes
true justice requires operating in the shadows. We are
the Robin Hood Virus. And our mission has just begun.
FADE TO BLACK.
END OF EPISODE
This site is designed and maintained by:
Robert Nerbovig
| | | |