Book Read Free

The Robin Hood Virus

Page 9

by robert nerbovig


  found emails between the CFO and one of the board members. They exchanged ideas about raising the price of gasoline. The board member relayed a discussion he had with a marketer from another oil company. The marketer is his son-in-law. They talked about how low the price of gasoline was. They also talked about raising the price to a higher level. The 2 oil companies raised

  the price of gasoline the next week. We believe this borders on collusion. We entered the personal computer of the son-in-law. We then entered his bank account and sent an off-shore wire transfer in the amount of $100,000. We also entered the computer and the bank account of the board member and transferred $250,000 to our off-shore account with his authorization. We then entered the personal computer and bank account of the CFO and created a wire transfer to our off-shore account in the

  amount of $150,000 and entered the bank account of the oil company and transferred $2,000,000 to our off-shore account with the CFO’s authorized signature. We also sent him an email warning him that if this collusion continues the penalty will be more severe. We also placed our logo:

  on all of their written communications including mail. With their resources they will try to discover who we are but we can not be discovered.

  Diversion total to date $1,564,350,000

  Donation total to date $1,548,000,000

  Funding Large Political Donations

  Our political Division has invaded the network and personal computers of one of the largest super-pacs in the United States political arena. We are trying to determine illegal activities. We have discovered that some of the donating entities are trusts rather than not-for-profit corporations, an unusual step that reduces their public reporting

  requirements. Each nonprofit has in turn created limited liability companies or LLCs, through which money can be funneled. Some also have a separate LLC that has the power to replace the nonprofit’s leader. This is a form of disguise — to disguise control, to disguise the flow of funds from one entity to another. These nonprofits all shared the same attributes: They used LLCs, installed allies at the helm and

  hired the same set of lawyers. These LLCs had offshoots known as “disregarded entities” — LLCs that are “owned” by their parent nonprofits and are considered part of them for tax purposes.

  This super-pac has a total of 19 disregarded entities, tax records show; One of them was a trade association that distributed almost $250 million to other nonprofits during the year. Disregarded entities cannot be searched by name because their tax returns are filed as part of their parent nonprofit, which of course is exactly what you don’t know. This

  super-pac has used disregarded entities to hide the money trail. We are able to uncover all the moves of this super-pac. We have made an off-shore deposit of 25 million dollars from this super-pac and warned them of this unsavory conduct. They

  will continue to be penalized by us if they

  continue this conduct.

  But disregarded entities offer other advantages. Donors to social welfare groups and trade associations have only become public in a handful of cases, but some corporate and individual donors still worry about scrutiny from stockholders or the IRS. While nonprofits are required to disclose their top administrators and boards in tax filings, disregarded entities can have separate managers who are not identified anywhere. Such a manager would be able to control how the money received by the LLC was spent.

  Social welfare nonprofits are typically formed as not-for-profit corporations, with boards that set their policies.

  Nine of the 12 nonprofits in this network were formed as trusts — an approach several tax experts said they had rarely,

  if ever, encountered. Trusts are subject to little outside oversight. They don’t have to file incorporation papers or annual reports to the state. Any documents filed with the IRS take effort and time to get. Trust agreements rarely have to be filed publicly, but since most of the connected trusts have been recognized by the IRS as social welfare nonprofits, their trust agreements are available from the agency. The trust agreements are all “irrevocable,” meaning the trustee cannot change them, except for changing the trust’s name or anything necessary to maintain the group’s tax-exempt status. Despite those credentials, the trustees can be axed at any time. Each trust agreement gives

  an LLC — not a disregarded entity, but a different one with a similarly nonsensical

  string of four letters for a name – power

  to remove the trustee for any reason. Tax

  experts say that this means that someone behind that LLC can actually control the nonprofit.

  Our political division has also found several billionaires who are contributing millions of dollars to political campaigns under the blanket of anonimity. We have extracted 15 million dollars each from 4 of the most notorious billionaires making these donations. We have planted emails on their computer networks informing them of our efforts to keep the political playing field level and warned them that continued massive anonymous donations would be costly to them. We also placed our logo:

  on all of their written communications including email. With unlimited resources

  they assembled the smartest white hat hackers that they could find. The assembled team has made all attempts to locate us, our hardware, and our software. Their efforts have proven fruitless. They have spent a large amount of time and money in this exercise. They have tried to isolate our I.P. address, tried to find our geographic location, and do extensive

  testing on the 4 computer networks. They have tried to find viruses, Trojans, rootkits, and various other software anomalies that could cause the network to be compromised and funds to be transferred. These white hat hackers are trying every trick in the book to discover what is causing these networks to behave in this way. We are counteracting every move they make. We fed them I.P. Addresses from known black hat hackers in the U.S. and in China. They are off on a foreign hack

  attempt on the Chinese hackers. They will find interesting information but they will not be satisfied that they found the source of the intrusion into their networks. They are also trying to find the source of our logo:

  They will find the source of this logo as native American art. This design has been around for hundreds of years.

  One of the diversionary tactics we employ to send investigators in the wrong direction is planting hacker-tracks in the systems we infect. The tracks we plant will simulate that the system was hacked. We will leave subtle indicators such as familiar hacker code that will perform it’s actions when a specific action is

  initiated, a keylogger, and a well-known virus. All these actions will cause the

  team to suspect the hacker has been found. However, upon further investigation, they will determine that this was not the source of the diversion of funds.

  They have also tried to identify the owner of our off-shore account. Little do they know the money is immediately transferred to several off-shore accounts all over the world. Another dead-end for them. They are investigating all of the staff members of the four billionaires. They have identified 3 employees with sufficient expertise to hack into these networks and pull off this theft. The first employee they investigated has a degree in I.T. systems and has been working in the computer industry for 15 years. He has all of the necessary tools and tricks to pull this off. He has denied any

  involvement in this hack and is very convincing. The second suspect has 8 years experience as a data processing manager and 6 years developing high-level database systems. He has the knowledge to be able to accomplish this hack but denies any involvement. The third employee has 20 years developing web pages and web applications. He has been consulted by a large corporation to find a hacker intrusion, and for that reason is suspected of this theft. He also denies any knowledge of this and they believe him.

  The assembled team also is investigating the billionaires as a suspect. They are trying to find evidence in their computer systems that they might have hired someone to pull this off
. Not because they needed the money, but because they wanted to put one over on their buddies. The team has not been able to

  link any of the billionaires to anyone with enough talent and expertise to have hacked the computer networks and send authorized wire transfers to off-shore accounts.

  One of the puzzles they are trying to solve is how this is able to occur without tracks. There is no evidence of hackers, no intrusions, and no infected software.

  The white-hat hacker team that the billionaires have assembled have not considered there might be a back door as yet undiscovered. They have not considered that the intrusion involves data that they cannot recognize. They will continue to step over the data they are looking for because they cannot attribute it to a hack. It does not resemble computer code that they have ever seen before. We may reveal the code and it’s construction parameters in the future.

  Diversion total to date $1,564,350,000

  Donation total to date $1,548,000,000

  Attempts to steal The Robin Hood Virus

  Because of our continuing efforts to stop illegal activities by large corporations, foreign countries, and black hat hackers, we have become the target of several unscrupulous entities, foreign and domestic. They are trying to discover our identity and location. We have discovered their inquiries by intercepting emails on the MHC Hospital network. They are a group of hackers located in China. If it were possible for them to get their hands on our hardware and software they could create a major catastrophe the likes of which the world has never been seen before. We have entered their network and have determined their identities and their plans. We have setup an electronic transfer of $12,000,000 of their bank balance to our offshore account. We then immediately dispersed the

  amount into several of our other offshore accounts. We expect they will continue their efforts to determine who we are and Where we are located in an effort to steal the device and our software. They are unaware that we cannot be discovered by traditional means. We assume they think we are on the deep web. We will let them continue to believe this. They will spend much time and effort in their quest for The Robin Hood Virus.

  We have found other email inquiries trying to find us. Another one of the email inquiries into our whereabouts involved black-hat hackers located in Germany. They have been intercepting email at the large oil company where we discovered embezzling. It seems these black hat hackers hacked this oil company to divert oil shipments. They were stopped in this effort but continued to monitor

  their emails. They discovered that we emailed them concerning the theft of money by their CFO. They are trying to find out our I.P. Address. We located their cell phone network and entered their cell phones. We then determined who they were and entered their computer network. Once we were in their system we found all of the hacked computers they entered, the purpose of their intrusion, and the results of their efforts. We immediately set out to destroy their hacking operation. We will do this covertly. We have modified their code to allow their I.P. address and location to display on all hacked systems. We formed a message “We are the Black-Hat hackers that hacked into your system. Here is our I.P. Address and our physical street address. We are located in Bejing China. We have placed this message on all of the systems that have been hacked by this team

  of black-hat hackers. We also modified their source code to not allow any further transmission of information. They cannot find us in their systems and cannot correct the code. We will stay in their systems to monitor activity and prevent further hacking. We also determined their bank account numbers by invading their private computers. We have extracted a total of 18 million dollars from this German hacker team. We have issued them a warning to cease this activity or further extensive punitive punishment will occur. We are also placing our logo:

  on all of their written communications including email.

  We are neutralizing all inquiries by

  entering the systems of the inquirer and emptying their bank accounts. We will employ this countermeasure every time we find an inquiry by a group we suspect of being hackers.

  We also developed the same type of intrusion system we utilize to locate and enter computer systems and use the new technology to enter cell phones. We monitor all suspicious calls and then capture the called number and enter that cell-phone. We then monitor all suspicious calls by screening keywords that we have chosen. When we encounter a keyword we examine their plans and motives. If we

  determine they are engaged in illegal activities or plotting against the United States we immediately send this information to INSCOM. We are assured that INSCOM will immediately disseminate this information

  and the appropriate necessary action will

  be initiated.

  We received an email from INSCOM thru one of our anonymous email addresses. This email informed us of chatter they had intercepted. The subject of the chatter concerned finding the author, the hardware, and the software for The Robin Hood Virus. The location of the chatter was Moscow, Russia. INSCOM passed us the I.P. address of the chatter. We immediately entered the computer associated with this I.P. address. We also entered the cell phones in the area looking for related conversations. We discovered very high-level conversations concerning The Robin Hood Virus. It is obvious that they are assembling a large covert operation involving many black-hat hackers with unlimited resources, software,

  and equipment. We believe they will use all legal and illegal methods to try and discover who we are and where we are. We

  received another email thru one of our

  anonymous email addresses stating that they knew who we are and where we were located. This email was from the hacker team in Russia. They must have hacked INSCOM or one of the sites that we hacked to obtain our anonymous email address. They went on to offer us $250,000,000.00 for our hardware and our software. They indicated that if we did not agree to sell that they would take The Robin Hood Virus, its hardware and its software. They assured us that they had the where-with-all to get whatever they wanted. They gave us one week to accept their offer. They also indicated that they represented one of the deputy prime ministers and their orders to acquire The Robin Hood Virus came from a very high place. They also told us that failure was not one of their options. We sent them an email from one of our other

  anonymous email addresses that we received

  their email message and we would respond to their offer in a timely manner.

  We received an anonymous email through

  one of our email accounts inquiring into the availability of our hardware and software. Based on their I.P. address we determined they are a one of the largest computer companies in America. They are well-aware of what we do and they want to partner-up with us or own the hardware and software by themselves. The problem with letting anyone into our knowledge circle is that our hardware and software has the ability to enter any computer in the world without detection. Once in the computer we can do anything we want to do, legal or illegal. If our system got into the wrong hands the manner in which we use computers would have to change drastically. Computer

  hardware would have to be totally re-

  designed and the internet would become a thing of the past.

  I have setup a method to destroy all hardware and software that is out in the field with our teams. I cannot reveal how this will work in case of emergency but it will destroy all software in addition to all of the hardware.

  Diversion total to date $1,564,350,000

  Donation total to date $1,548,000,000

  PREVIEW OF BOOK TWO

  THE ROBIN HOOD VIRUS - DISCOVERY

  By

  ROBERT NERBOVIG

  The Robin Hood Virus is in danger. There are groups of hackers wanting to get their hands on our hardware and software. We will attempt to stop them in their tracks. We will also enter databases exposing world secrets including:

  The Roswell Project

  The Warren Report (Secret Chapter)

  The Moon Landin
g

  Nerbovig, Robert (2015-06-10). The Robin Hood Virus: The Robin Hood Virus Series

 

 

 


‹ Prev