A computer programmer wants to prevent black-hat hackers from creating any more havoc. He develops an undetectable computer virus that he uses to steal 10 billion dollars and donates it to charity.
Type:
Feature
Status:
For sale
Page Count:
128pp
Genre:
Adventure, Mystery, Thriller
Budget:
Independent
Age Rating:
13+
Based On:
The Robin Hood Virus
Synopsis/Details
This story centers around a computer virus called "The Robin Hood Virus". This computer virus is undetectable and will never be discovered. This virus utilizes a back-door that has never been thought of in the black-hat hacker world. We also developed a virus that we employ on cell phones. This virus is called "Ranger". We use this virus to hack into corrupt countries, corporations, and individuals to extract billions of dollars and divert these resources to non-profit entities such as food banks, homeless shelters, orphanages, families going thru catastrophic health issues, small rural hospitals struggling to survive, and creating much needed llc's such as a national rural hospital corporation, DC-10 fire tanker company, homes for homeless veterans, mobile disaster hospitals, building a national water pipeline, preventing water run-off after a forest fire, and more. We soon find ourselves targeted by powerful enemies who will stop at nothing to steal the virus and destroy them. We developed an intrusion system to locate and enter cell phone's and monitor all suspicious calls by screening keywords that we have delevoped. When we encouter a chosen keyword we utilize our location software to determine the location of the caller's computer and enter the caller's computer and the recipient's computer to examine their plans and motives. If we determine that they are engaged in illegal activities, violating the rule of competitive fairness, or plotting against the United States, we will take aggressive action to stop them in their tracks and empty their bank accounts. We have taken over 20 billion dollars and deposited it in several off-shore bank accounts. We will divert these resources to non-profit entities such as food banks, homeless shelters, orphanages, families going thru catastrophic health issues, small rural hospitals struggling to survive, and creating much needed llc's such as a national rural hospital corporation, DC-10 fire tanker company, homes for homeless veterans, mobile disaster hospitals, building a national water pipeline, Preventing water run-off after a forest fire, and more. We will find other needy groups or individuals to help with the fruits of our labor. We also enter the databases of the U.S. Government to find information on subjects that interest us and to tell the real story. If the world ever finds our that we are invading their computer systems and cell phones, without detection, and what we are doing with the information we are gathering, the manner in which everyone uses their computer systems would change drastically. We have assembled a very knowledgeable and loyal team consisting mostly of former military veterans who know the value of protecting each others backs. They have served in Iraq, Vietnam, Afghanistan, the USA, and the pentagon. Both their military duties and their civilian duties involved computer programming, or network set-up and analysis, or database creation and maintenance. We all have a current mission to help eradicate hacking and the damage that is done by hackers. We have occupied the computer networks of various government agencies including the IRS, the FBI, and several District Attorney's offices. We are monitoring these systems to find companies under surveillance for fraud, or other illegal activities. We are currently in the process of reviewing various companies, individuals, and countries to establish a schedule of computer entry. When we find violators we will enter their computer systems and cell phones to determine the improper activity and assess a proper penalty. TEAM LEADER: Arjay, a former hospital controller with an intricate knowledge of computer hacking techniques and methods who has been programming computers for 50 years, mainly in healthcare. He has written systems for hospitals, nursing homes, medical clinics, various medical specialty offices, and dental offices. He also programmed one of the first electronic medical billing systems in the country. He has re-constructed computer systems after severe virus attacks and has been instrumental in designing and developing anti-virus software. He has written "The Robin Hood Virus" software and developed the necessary hardware and software to enter computers all over the world without detection. Arjay is a former active duty Marine as are other team members. Semper Fi. SOFTWARE ENGINEER: Paula is our software engineer. She has 15 years experience designing and developing business applications. She has extensive knowledge in designing database systems for efficient, secure operations. She also has experience in designing and writing and testing anti-virus software for large entities. NETWORK SECURITY SPECIALIST: Paco, our network security specialist, has been actively involved in protecting vital government military installations both in Iraq and here in the United States. He has implemented anti-virus network protection and the tools to determine intruders and their location. He has supported security operations for an academic enterprise, the U.S. Army at a forward operating base in Iraq, where he constructed and monitored very large wide area networks to prevent intrusion. His background and experience more than qualifies him for Manager of Cyber warfare. HOSPITAL ADMINISTRATOR: Duck is a retired hospital administrator with 38 years experience in small rural hospitals who will head our Medical Services Division. He has defined proper business conduct for the medical service industry and the he will oversee the entry, the verification of business practices, and planned corrective action if business violations occur(rates too high, etc.). The medical services division will also oversee the "World Rural Hospital Corporation" (WRHC). DATABASE/WEB DEVELOPER: Trent, our database/web developer, has 25 years experience designing and developing very sophisticated index methods for storing and tracking various business operations. He has written complex web pages for various clients in various vertical markets. TELEPHONE NETWORK ENGINEER: Pablo is our telephone network expert who has been designing and developing telephone networks and software for the last 15 years. He has installed numerous, very complicated, telephone networks all over the world. LANGUAGE, LINGUISTICS EXPERT: Rob, our language expert, is proficient in several languages including Arabic, Farsi, and most languages in the middle east. He has designed language conversion programs that we will use to monitor conversations of suspected violators. We use our team members, working in their desired vertical market, to discover private, corporate, and governmental hacking, foreign and domestic, by entering various large computer networks to extract or divert resources for humanitarian purposes.

All content on ScriptRevolution.com is the intellectual property of the respective authors. Do not use or reproduce scripts without permission, even for educational purposes.
Want to read this script? You must join the revolution first. Don't worry, it's free, easy, and everyone's welcome.

The Writer: robert nerbovig

I have been married for 61 years to my wife Pablita. I am a former active duty Marine as are my 2 sons. We live in the mountains of Arizona. I have been programming computers for business since 1970 and designing and writing web pages since 1996. I am very familiar with computer viruses and the havoc they wreak. I am the 23rd great great great grandson of King Olaf of Norway. (Saint Olaf) Go to bio
robert nerbovig's picture