Journal: Rolfe Winkler on Buffet’s Betrayal

03 Economy, Commercial Intelligence
Full Story Online
Full Story Online

Phi Beta Iota Editorial Comment: Warren Buffet is a fraud–so is George Soros and all the other allegedly “for the people” individuals who ultimately put personal profit above the public good.  Congress and the White House serve these people, not We the People, and that is the root cause of America’s demise.

+++++++

When I was 14, Warren Buffett wrote me a letter.

It was a response to one I’d sent him, pitching an investment idea.  For a kid interested in learning stocks, Buffett was a great role model.  His investing style — diligent security analysis, finding competent management, patience — was immediately appealing.

Buffett was kind enough to respond to my letter, thanking me for it and inviting me to his company’s annual meeting.  I was hooked.  Today, Buffett remains famous for investing The Right Way.  He even has a television cartoon in the works, which will groom the next generation of acolytes.

But it turns out much of the story is fiction.  A good chunk of his fortune is dependent on taxpayer largess. Were it not for government bailouts, for which Buffett lobbied hard, many of his company’s stock holdings would have been wiped out.

. . . . . . .

But there’s nothing fair about Buffett getting a bailout, about exploiting the taxpaying public for his own gain.  The naïve 14-year-olds among us thought he was better than this.

What would Ben Graham say?

Threat Archives on Public Intelligence (1992-2006)

Threats

2004

NO

Threat Bjorgo Root Causes of Terrorism

2004

US

Threat Kaplan The Saudi Connection to Terrorism

2004

US

Threat Knapp Al Qaeda and the Mass Media (PSYOP Briefing)

2004

US

Threat Knapp Al Qaeda and the Mass Media (Reference)

2004

US

Threat Knapp Distortion in Islam and Jihad

2004

US

Threat Knapp Diversity in Islam

2006

US

Threat Daly Al Qaeda Against Saudi Oil

2006

US

Threat Johnson Battle of Algiers and Its Lessons

2006

US

Threat Seagraves Gold Warriors: New Epilogue, Further of US Theft of WWII Gold Loot

2006

US

Threat Seagraves Gold Warriors New Chapter Seventeen

2006

US

Threat Steele Who Is to Blamce?  The Vice President and Us

2006

US

Threat Stern Al Qaeda Approach to US Muslims

2006

UK

Threat Story Crunch Time for CIA, Banks, and Related Thieves of $742 Trillion

2005

US

Threat Ellis Scenarios for Next Generation Crises in Latin America

2005

US

Threat GAO GAO Report: US Not Addressing Islamic Fundamentalism

2005

US

Threat OSS Somalia Piracy Quick Report

2005

US

Threat OSS Report on Remote Detonation of Improvised Explosive Devices

2005

US

Threat OSS PRC Trade in Latin America

2005

US

Threat Ray & Gross The Perfect Storm

2005

US

Threat Steele Worksheet for Book Review on Crossing the Rubicon

2005

US

Threat Steele Mother Nature as Terrorist

2005

US

Threat Steele 9-11: Who’s To Blame?  One Man’s Opinion

2005

US

Threat Thompson Is the Terrorism Threat Over-Rated?

2004

US

Threat Daly Globalization & National Defense (Ecological Economics)

2004

US

Threat Louisiana Pre-Hurricane Katrina Study and Conclusions

2004

US

Threat Palmer The Real Axis of Evil: 44 Dictators

2004

US

Threat Peters Early Warning of Disease From Pattern Analysis

2004

US

Threat Seagrave Transcript of Video on Stolen Gold Held by US Treasury & Citi-Bank

2004

US

Threat Vlahos Attachment to the Muslim Renovatio Memorandum

2004

US

Threat Vlahos The Muslim Renovatio and U.S. Strategy

2004

US

Threat Vlahos The Muslims Are Coming

2004

US

Threat Vlahos Insurgency Within Islam

2003

US

Threat Danzip Countering Traumatic Attacks

2003

PRC

Threat OSS PRC Treaty & Trade Penetration of Latin America

2002

US

Threat Emerson & Steele American Jihad Map

2002

US

Threat Steele ACFR, 19 Cities: 9-11, U.S. Intelligence, & the Real World

2000

US

Threat Steele Georgetown/AWC: Non-Traditional Threats

1998

US

Threat Steele TAKEDOWN: Targets, Tools, & Technocracy

1994

US

Threat Steele 6th National Threat Symposium: New Directions in Information Sharing

2005

NGO

Threat NGO Changing Face of Global Violence

2005

NGO

Threat NGO Human Security Audit

2004

US

Threat Pelton Robert Young Pelton on Dangerous World

2004

US

Threat Steele Three Book Review Relevant to Global War on Terror (GWOT)

2003

US

Threat Copeland Analysis of the New Paradigm for Terrorism

2003

US

Threat Manwaring Street Gangs: New Urban Insurgency

2003

US

Threat Manwaring War & Conflict: Six Generations

2003

US

Threat Pelton Summary of Presentation on World’s Most Dangerous Places

2002

US

Threat Betts The Next Intelligence Failure: The Limits of Prevention

2002

NL

Threat Jongman World Conflict and Human Rights Map 2001-2002

2002

US

Threat Wheaton Transitions from Authoritarian Rule: A Model

2002

US

Threat Wheaton Virtual Afghanistan: Modeling a Transition from Authoritarian Rule

2001

US

Threat Godson Governments and Gangs

2001

US

Threat Heidenrich Early Warning & Complex Monitoring of Ethnic Genocide (Slides)

2001

US

Threat Heidenrich Early Warning & Complex Monitoring of Ethnic Genocide (Text)

1998

US

Threat Transnational Enemies: Threats Without Names

1998

US

Threat Glaebus Metaphors & Modern Threats: Biological, Computer, Cognitive Viruses

1997

US

Threat Fialka War by Other Means: Economic Espionage In (Against) America

1997

US

Threat Schwartau Information Warfare: The Weapons of the Information Age

1997

US

Threat Tenney Cyber-Law and Cyber-Crime: Spamming Methods and Costs

1996

US

Threat Keuhl School of Information Warfare Threat and Strategy: Shifting Paradigms

1996

US

Threat O’Malley Countering the Business Intelligence Threat

1996

US

Threat Strassmann U.S. Knowledge Assets: The Choice Target for Information Crime

1996

US

Threat Winkler Electronic Industrial Espionage: Defining Ground Zero

1994

US

Threat Whitney-Smith Refugees: Weapon of the Post Cold War World–Counter Offensive: IW

Review: Corporate Espionage–What It Is, Why It’s Happening in Your Company, What You Must Do About It

4 Star, Crime (Corporate), Intelligence (Commercial)

Amazon Page
Amazon Page

4.0 out of 5 stars Insider Threat, and Poor Management = Major Losses,

April 8, 2000
Ira Winkler
Ira, a former National Security Agency professional, made a name for himself in his second career as a corporate electronic security specialist by using a combination of common sense and basic work-arounds to penetrate and download millions if not billions of dollars worth of corporate research and development-always at the company’s request, and generally with astonishing results. From his antics as a “temp” hire gaining access within two days, to his more systematic attacks using all known vulnerabilities including factory-shipped system administrator passwords that were never changed, he has exposed in a very practical way the “naked emperor” status of corporate America.
Vote on Review
Vote on Review