
Synopsis/Details
This story centers around a computer virus called
"The Robin Hood Virus". This computer virus is undetectable
and will never be discovered. This virus utilizes a back-door
that has never been thought of in the black-hat hacker world.
We also developed a virus that we employ on cell phones.
This virus is called "Ranger". We use this virus to hack into
corrupt countries, corporations, and individuals to extract
billions of dollars and divert these resources to non-profit
entities such as food banks, homeless shelters, orphanages,
families going thru catastrophic health issues, small rural
hospitals struggling to survive, and creating much needed
llc's such as a national rural hospital corporation, DC-10
fire tanker company, homes for homeless veterans, mobile
disaster hospitals, building a national water pipeline,
preventing water run-off after a forest fire, and more.
We soon find ourselves targeted by powerful enemies who
will stop at nothing to steal the virus and destroy them.
We developed an intrusion system to locate and enter cell
phone's and monitor all suspicious calls by screening
keywords that we have delevoped. When we encouter a chosen
keyword we utilize our location software to determine the
location of the caller's computer and enter the caller's
computer and the recipient's computer to examine their plans
and motives. If we determine that they are engaged in
illegal activities, violating the rule of competitive
fairness, or plotting against the United States, we will
take aggressive action to stop them in their tracks and
empty their bank accounts. We have taken over 20 billion
dollars and deposited it in several off-shore bank accounts.
We will divert these resources to non-profit entities such
as food banks, homeless shelters, orphanages, families going
thru catastrophic health issues, small rural hospitals
struggling to survive, and creating much needed llc's such
as a national rural hospital corporation, DC-10 fire tanker
company, homes for homeless veterans, mobile disaster
hospitals, building a national water pipeline, Preventing
water run-off after a forest fire, and more. We will find
other needy groups or individuals to help with the fruits
of our labor. We also enter the databases of the U.S.
Government to find information on subjects that interest
us and to tell the real story. If the world ever finds
our that we are invading their computer systems and
cell phones, without detection, and what we are doing
with the information we are gathering, the manner in which
everyone uses their computer systems would change
drastically.
We have assembled a very knowledgeable and loyal team
consisting mostly of former military veterans who know the
value of protecting each others backs. They have served in
Iraq, Vietnam, Afghanistan, the USA, and the pentagon. Both
their military duties and their civilian duties involved
computer programming, or network set-up and analysis, or
database creation and maintenance. We all have a current
mission to help eradicate hacking and the damage that is
done by hackers. We have occupied the computer networks of
various government agencies including the IRS, the FBI, and
several District Attorney's offices. We are monitoring these
systems to find companies under surveillance for fraud, or
other illegal activities. We are currently in the process of
reviewing various companies, individuals, and countries to
establish a schedule of computer entry. When we find
violators we will enter their computer systems and cell
phones to determine the improper activity and assess a
proper penalty.
TEAM LEADER:
Arjay, a former hospital controller with an intricate
knowledge of computer hacking techniques and methods who has
been programming computers for 50 years, mainly in
healthcare. He has written systems for hospitals, nursing
homes, medical clinics, various medical specialty offices,
and dental offices. He also programmed one of the first
electronic medical billing systems in the country. He has
re-constructed computer systems after severe virus attacks
and has been instrumental in designing and developing
anti-virus software. He has written "The Robin Hood Virus"
software and developed the necessary hardware and software
to enter computers all over the world without detection.
Arjay is a former active duty Marine as are other team
members. Semper Fi.
SOFTWARE ENGINEER:
Paula is our software engineer. She has 15 years
experience designing and developing business applications.
She has extensive knowledge in designing database systems
for efficient, secure operations. She also has experience in
designing and writing and testing anti-virus software for large
entities.
NETWORK SECURITY SPECIALIST:
Paco, our network security specialist, has been actively
involved in protecting vital government military
installations both in Iraq and here in the United States. He
has implemented anti-virus network protection and the tools
to determine intruders and their location. He has supported
security operations for an academic enterprise, the U.S.
Army at a forward operating base in Iraq, where he
constructed and monitored very large wide area networks to
prevent intrusion. His background and experience more than
qualifies him for Manager of Cyber warfare.
HOSPITAL ADMINISTRATOR:
Duck is a retired hospital administrator with 38 years
experience in small rural hospitals who will head our
Medical Services Division. He has defined proper business
conduct for the medical service industry and the he will
oversee the entry, the verification of business practices,
and planned corrective action if business violations
occur(rates too high, etc.). The medical services division
will also oversee the "World Rural Hospital Corporation"
(WRHC).
DATABASE/WEB DEVELOPER:
Trent, our database/web developer, has 25 years experience
designing and developing very sophisticated index methods
for storing and tracking various business operations. He has
written complex web pages for various clients in various
vertical markets.
TELEPHONE NETWORK ENGINEER:
Pablo is our telephone network expert who has been designing
and developing telephone networks and software for the last
15 years. He has installed numerous, very complicated,
telephone networks all over the world.
LANGUAGE, LINGUISTICS EXPERT:
Rob, our language expert, is proficient in several languages
including Arabic, Farsi, and most languages in the middle
east. He has designed language conversion programs that we
will use to monitor conversations of suspected violators.
We use our team members, working in their desired vertical
market, to discover private, corporate, and governmental
hacking, foreign and domestic, by entering various large
computer networks to extract or divert resources for
humanitarian purposes.
Story & Logistics
Story Type:
Revenge
Cast Size:
Few
Locations:
Several
Special Effects:
Aerial image effects, Other on-set effects
Characters
Lead Role Ages:
Male over 45
Hero Type:
Ordinary
Stock Character Types:
Mad scientist, Nerd, Professor, Wise old man
Advanced
Adaption:
Based on Existing Fiction
Subgenre:
Mysteries, Techno-Thriller
Subculture:
Hacker
Time Period:
Contemporary times, Information Age (1970–present)
Country:
China, North Korea, Russia, Ukraine, United States of America (USA)
Time of Year:
Autumn/Fall, Spring, Summer