Joe -- I'm about to go speak to the crowd here in Chicago, but I wanted to thank you first. I want you to know that this wasn't fate, and it wasn't an accident. You made this happen. You organized yourselves block by block. You took ownership of this campaign five and ten dollars at a time. And when it wasn't easy, you pressed forward. I will spend the rest of my presidency honoring your support, and doing what I can to finish what we started. But I want you to take real pride, as I do, in how we got the chance in the first place. Today is the clearest proof yet that, against the odds, ordinary Americans can overcome powerful interests. There's a lot more work to do. But for right now: Thank you. Barack | |
PAID FOR BY OBAMA VICTORY FUND 2012, A JOINT FUNDRAISING COMMITTEE AUTHORIZED BY OBAMA FOR AMERICA, THE DEMOCRATIC NATIONAL COMMITTEE, AND THE STATE DEMOCRATIC PARTIES IN THE FOLLOWING STATES: CO, FL, IA, NV, NH, NC, OH, PA, VA, AND WI. Contributions or gifts to Obama Victory Fund 2012 are not tax deductible. The first $2,500 from a contributor to Obama Victory Fund 2012 will be allocated to Obama for America, designated for the general election. The next $30,800 from a contributor will be allocated to the Democratic National Committee. Any additional amount(s) from a contributor will be divided among the State Democratic Party Committees as follows, up to $10,000 per committee and subject to the biennial aggregate limits: OH (24%), FL (15%); WI (12%); IA (10%); NV (10%); VA (9%); CO (7%); NC (7%); PA (3%); and NH (3%). A contributor may designate a contribution for a particular participant. This allocation formula may change if following it would result in an excessive contribution. Contributions will be used in connection with a Federal election, may be spent on any activities of the participants as each committee determines in its sole discretion, and will not be earmarked for any particular candidate This email was sent to: securityworld@gmail.com. |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Tuesday, November 06, 2012
How this happened
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment