Joe -- Every Republican who holds elected office in the U.S. Congress is an adult. Adults usually learn from their mistakes. So when October's government shutdown cost us something around $24 billion, you might have thought Republicans learned their lesson. Per usual, they disappointed us. Paul Ryan recently said he's willing to do it all over again -- but this time, to our entire economy. He wants concessions from President Obama to avoid a federal default, and he's willing to hold the economy hostage to get them. Sign your name right now and tell Paul Ryan that Americans have had enough of this brinksmanship. President Obama has made it very clear that he won't tolerate this kind of hostage-taking again. And the results of October's shutdown have shown us an example of what's on the line. We have to head this one off at the pass, and then we have to elect representatives who will speak for the middle class, American families, and who will think about our future instead of destroying our economy in one massive temper tantrum. Help make that happen right now: http://my.democrats.org/Tell-Paul-Ryan Thanks for standing with Democrats. Debbie Wasserman Schultz Chair Democratic National Committee |
Paid for by the Democratic National Committee, 430 South Capitol Street SE, Washington DC 20003 and not authorized by any candidate or candidate's committee. This email was sent to securityworld@gmail.com. If this isn't the best email address at which to reach you, update your contact information. Our email list is the best way we have of staying in regular contact with supporters like you across the country and letting you know about the work President Obama and other Democrats are doing. Click here to unsubscribe from our supporter list. This organization is powered by you, and we'd love to hear your ideas. Send us any comments, criticisms, or feedback here. Thanks for supporting President Obama and other Democrats. |
Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Thursday, December 19, 2013
Per usual, Joe
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment