Welcome to The Robin Hood Virus
A Book by Robert Nerbovig

                         Discovering Terrorist Activities

                                                   The Robin Hood Virus / 129
Because we have the ability to enter cell phones and computer networks without detection, we are scanning various cell phone and computer networks in the Middle East for keywords that will indicate terrorist activities. We are concentrating our efforts on Syria, Iraq, Iran, and Afghanistan. We have discovered conversations that pinpoint the activity of a very dangerous group. They have conducted brutal beheadings and continue to hold U.S. prisoners. We initially discovered cell-phone history between boots-on-the ground terrorists in Northern Iraq, Northern Syria, and their command headquarters in Northern Iraq. They have planned and executed various attacks on

                                                   The Robin Hood Virus / 130
civilians, military, and commercial targets. Their primary goal is to amass as much capital as possible in order to purchase weapons and pay their army. They are building a military base in northern Iraq to train 20,000 volunteers. They have amassed very large bank accounts in Afghanistan, Pakistan, Kuwait, and Qatar to fund training and operations. We have entered several of their computer networks and continually monitor daily activities. We are giving all of the data we are obtaining to our U.S. communication channel, INSCOM. We have determined which banks are holding the terrorist accounts and what names they are under. We have entered those banks and transferred $250,000,000 from one account in a Pakistani bank to our offshore account. We have also entered an account in Qatar and

                                                    The Robin Hood Virus / 131 transferred $100,000,000 to our offshore account. We will continue to monitor all of the bank accounts that we determined to be those of the terrorist network and transfer most of the balances of those accounts. We are able to move $5,000,000 every week to our offshore account from one of their banks with their authorization. We have made it look like it is used to fund operations. We have been making this same bank transfer to our offshore account for the last 10 weeks and will continue to do so for the forseeable future. They are stealing and selling $1,000,000 worth of oil every day and we have discovered where they are selling it. We have entered the network of the oil buyer and have diverted $15,000,000 to our offshore account with his approval and without his knowledge. He will

                                                    The Robin Hood Virus / 132 find out after the fact that we have access to all signatures necessary for all financial transactions. Based on their cell phone conversations we have intercepted a plan to invade Aleppo and Happa, Syria. They will be staging these attacks from Afreen and Kobani, Syria. We have passed this information on to INSCOM. We hope that the U.S. Military will join with the coalition to strike key terrorist targets in Afreen and Kobani to seriously degrade terrorist capabilities. With our computer network occupation software we found out who is leading the terrorist network in the Kobani region. We have given his name, location and other information to INSCOM for their use. We expect air strikes and ground action to eliminate this

                                                    The Robin Hood Virus / 133 individual and his cohorts. We located the leader of the Syrian Kurdish militiamen thru cell phone intercepts and computer network snooping. We have anonymously donated 10 million dollars to the Kurdish defense chief in order for him to acquire key weapons and ammunition. The need for more reinforcements is great and we will continue to monitor the situation and donate whatever we deem critical in the defense of Kobani. It seems as though Turkey wants Kobani to fall. They are amassed on the border and refuse to help the Kurds in their time of need. They are also preventing Kurdish rebels from crossing the border to help in the fight. Turkey finally allowed over 100 Iraqi fighters -- known as peshmerga or "those who confront death" -- to cross into Kobani with their heavy artillery. This is a major

                                                    The Robin Hood Virus / 134 change in policy for Turkey. The Kurdish rebels have only had mortars up to this point. The heavy artillery will allow the rebels to inflict damage to ISIS from a distance once the observers and the outposts are setup. We have also intercepted a conversation between elements of the largest terrorist network in the region concerning one of our marine captives. He is being held outside Raqqa, Syria. We have passed this info to INSCOM in hopes they will formulate a plan to extract our guy. While scanning cell phone networks we intercepted a call between members of a mercenary force planning an attack on one of the largest terrorist bases. The outlined attack is very large and is planned to eradicate the base and all of its assets. The

                                                    The Robin Hood Virus / 135 attack will take place in 4 days when the base has its largest concentration of terrorists. The planned attack will also be coordinated with U.S. Air Power. We have invaded that particular terrorist computer network and are in the process of creating havoc with their communications systems in both their computer network and in their cell phone network. This will severely hamper their ability to communicate. We are scanning cell phone conversations in and around Azaz and Aleppo, Syria. We are looking for keywords to identify ISIS. We found a conversation that talks about a gathering of key ISIS commanders in the area. We have entered their computer network and found a huge amount of documents concerning the ISIS network. We have identified key members

                                                    The Robin Hood Virus / 136 of their organization, their name, locations, and their duties. We have also entered their bank accounts and transferred 75 million American dollars to our off-shore accounts. We have been monitoring cell phone activity on the U.S./Mexico border for suspicious conversations trying to locate attempted terrorist crossings. We have identified several conversations in the area of Juarez, Mexico using the term “bliss”. We discovered that this word was used several times by high-ranking ISIS leaders in the Azaz and Alepo regions of Syria. We have determined that the conversations in Juarez are plans to cross the border and set explosive devices at Fort Bliss and other military installations. The plot involves about 20 ISIS members. They plan to hire a coyote to help them cross the

                                                    The Robin Hood Virus / 137 border. The group is planning to cross the border in the next 30 days. We have sent specifics of this border operation to INSCOM for their immediate action. We expect INSCOM will monitor the necessary groups, including the 2 drug cartels in the area, and step-up the monitoring of the border to stop this threat. We have also been monitoring cell phone traffic in the area of Dundee, Quebec Canada. There is a border crossing there with absolutely no security. We are trying to determine if an illegal crossing is planned on behalf of ISIS. People who enter the United States thru this crossing are expected to notify the U.S. authorities as soon as they cross. This is a perfect entry point for anyone planning attacks on the United States. We intercepted cell phone chatter concerning

                                                    The Robin Hood Virus / 138 the crossing and conversation was in very broken English. It is between Islamic voices. We have sent this conversation to INSCOM for further review and action.

     Diversion total to date    $497,000,000
     Donation total to date     $480,000,000

The Robin Hood Virus
 Home Page |  Virus, Hospital Infection |  Team, Device, and Location |  Wall Street Infection
 Hospital Foundation Startup |  World-Wide Military Tactics |  Exposing Terrorist Activities
 Hacking the Hackers |  Computer Infection Definitions |  Cyberwarfare Combat & Tactics
 Major Oil Cartel Price-Fixing |  Funding Large Political Donations |  Stealing The Robin Hood Virus
 Contact Us

This site is designed and maintained by: Turquoise Software