Obama's ACORN Denial of Service Attack
Barack Obama knows ACORN from the inside. He trained them.
So now that ACORN is submitting fraudulent voter registration forms in over a dozen States, the reason his $800,000 campaign expense for front work went at least partially to ACORN is now clear.
The purpose of an Internet Denial of Service attack is usually not (just) to disable the particular computer or network under direct attack, but either to draw response resources (troubleshooters) to the attacked system, or to force secondary systems to be used. Sometimes the DOS attack is merely designed to create the appearance of poor performance, so that users of the system turn to competitors or in any case away from the service it provides.
And so it is with the ACORN attack.
Rather than merely registering new Democratic voters, ACORN so clogs the system with phony registrations that it becomes nearly non-functional.
This is a result of ACORN employing people of questionable character (e.g., felons) to strong-arm and wheedle ordinary citizens into registering -- whether or not they are already registered voters (in the same district or another). Further, ACORN assigns to these unvirtuous employees quotas, making it virtually certain that the employees will submit fake registrations, en masse.
So across the country in battleground States, voter registration has ground to a halt, or limps along with demoralized staff and tarnished public image. ACORN is doing direct damage to confidence in the sanctity of our electoral process, in an attempt to destroy its overall integrity. Rather than being content to register new voters, perhaps ACORN wants to make the registration process unnecessary. After all, if the system cannot be trusted, why use it?
And remember, Barack Obama trained them.
Sphere: Related Content
No comments:
Post a Comment