Joe -- When I'm out there talking to voters, we talk about what we've done, what we plan to do over the next four years, and why the other guys have dangerous plans to go back to the policies that failed America for almost a decade. But there is another question that keeps coming up, and you need to know about it: "Why do I see so many more ads for the other guys?" You don't need me to tell you that the Romney campaign is outraising us -- that billionaire ideologues and corporate interests are piling on tens of millions more in negative ads trashing us, and that all of it means that undecided voters in battleground states like Iowa could be seeing false, misleading, negative attacks at a rate almost twice as often as they hear from us. Last week, when I was in Iowa, voters told me they were feeling it. The numbers back it up: Our side is getting outspent 2-to-1 on the air there. But the folks asking me about this don't want an explanation -- they want to know what I'm going to do about it. And the fact is that solving this problem is up to you. Close the gap on the air by making a donation of $5 or more now. You're getting this email because you know what the stakes are in this election. You know the facts about what we've done to prevent a deeper crisis and to start building an economy that works for the middle class. But for someone who's not as engaged, these ads may be an important and possibly even primary source of information about the choice in this election. So it's a bad situation if 90 percent of them are false, negative attacks on us. We're losing this air war right now. I don't have as much time to campaign this time as I did in 2008, so this whole thing is riding on you making it happen. Donate now to close the gap on the air: https://donate.barackobama.com/72-Days Thank you, Barack |
Contributions or gifts to Obama for America are not tax deductible |
This email was sent to: securityworld@gmail.com. We believe that emails are a vital way for the campaign to stay in direct contact |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
No comments:
Post a Comment