Watergate Scandal

On June 16, 1972, a security guard at the Watergate Hotel in Washington , D.C. , discovered a piece of tape on the lock of the door that led to the National Democratic Headquarters.

This foiled break-in attempt at the Watergate was part of a larger campaign by Nixon supporters to tarnish the reputation of Democratic candidates and the Democratic Party. Democratic candidates were harassed, subject to negative campaign ads, and on two separate occasions the National Democratic Headquarters were broken into.

As soon as the attempted break-in at Watergate Hotel became know, president Richard Nixon ordered the entire affair covered up. It became clear that the Nixon presidency had been involved in serious manipulation and abuses of power for years. Millions of dollars coming from Nixon supporters were used to pay for the cover-up in an attempt to hide the truth from Congress and the American people.

The investigation would introduce the American people to such people as John Ehrlichman and Bob Haldeman. Ehrlichman was the President and Chief of the Domestic Council and Haldeman was the Chief of Staff. Both would be fired in a desperate attempt to save the presidency.

The investigation would ask two questions which would forever live in political infamy.The questions were, "What did the president know?" and "When did he know it?"

The investigation into Watergate scandal revealed that Nixon knew about the break-in from the beginning and that he was involved in the cover-up as it progressed.

In the early stages of the Watergate scandal almost of the media reported the break-in as a minor story with little national significance. This was until two young reporters, Carl Bernstein and Bob Woodward who were working for the Washington Post began to dig deeper into the mystery.

Aided by an informant identified as Deep Throat, Woodward and Bernstein uncovered one of the significant stories of the twentieth century. They became the catalyst in forcing the first presidential resignation in American history.

As the Watergate scandal investigation began testimony revealed that there was a taping system which was installed to record conversations in the Oval Office, Camp David , the Cabinet rooms, and Nixon's hideaway office.

Nixon argued that the tapes contained only private conversations between the president and his advisors. The Supreme Court did not agree. The court ordered the president to release the tapes.

The Nixon tapes were released in the 1970s and contained 18 minutes of silence that have never been explained.

John Parsons is founder of corporatenarc.com?. The mission of corporatenarc.com? is to educate the public in consumer affairs and to provide consumers with up-to-date business information. In addition we hope to ensure better services for the consumer by exposing business fraud and corruption, as well as unfair and deceptive business practices.

This article my be reproduced as long as the author's name and url to corporatenarc.com? are present at the end of the article.

cleaning help near Mundelein ..
In The News:

Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.

Bush Victory: A Defeat for the Have-Nots?

The shouting is over and directions for the next four... Read More

A Component of Liberty is a Strong Social Contract with Governing Body

Recently I got to talking with a gentleman at a... Read More

Bushs Election Victory: Ethics, Morality and Religion Defeated War, Economy and Foreign Policy

President George W. Bush has unofficially won his re-election bid... Read More

Electronic Commerce Taxaton: Emerging Legal Issues - Part II

UNAUTHORIZED HACKINGThe term "computer hacking" traditionally describes the penetration into... Read More

Conspiracy Theory; Kill Off the Old Folks

Recently I met a man in a coffee shop, a... Read More

Will They Sterilize Vagabonds and Drunkards in Belarus?

In Belarus parliament is going to struggle with degeneration of... Read More

Lyndon Johnson - The Day After Dallas

J. Edgar Hoover and LBJ used to enjoy watching Hoover's... Read More

Patriots and Parrots: Imprisoning Tongues in America

It can be dangerous to engage in free speech. This... Read More

Sodomy

Sodomy is against the law, yet goes on every day... Read More

The Fabric of Economic Trust

Economy is called the dismal science because it pretends to... Read More

Reelect President Bush for the 2nd term: Evidence & Proofs

Why President Bush should have his second term? The arguments... Read More

Confession of a King

Rufus King: (Said to be the fifth most important person... Read More

Nurturing Global Disequilibrium

This brings to our consciousness, issues concerning the ever rising... Read More

The Self-Appointed Altruists

Their arrival portends rising local prices and a culture shock.... Read More

The Gay Male Agenda for Political Dominance

I would like to pose a question. I am unsure... Read More

How Can We Elect Good Leaders?

Absolute power corrupts absolutely. Men desire power. Give power to... Read More

New York Lawyers; Vindictive Government Prosecutors

We all know Elliot Spitzer is going to run for... Read More

CBM?s Indo-Pak Peace Process

Will a bus running across the borders bring cordial relations... Read More

World Power Brokers Readying for WWIII

Einstein when ask how did he believe WWIII would be... Read More

Fight Terror, With Education

A War on Terrorism? Conventional war being brought on an... Read More

Iranian Elections - Roadmap To Continued Apathy

The recent first round of the Iranian elections somewhat resembled... Read More

Voters are to Blame for Bad Politics

When I was growing up, I actually considered a career... Read More

Liquidity or Liquidation

Large parts of the world today suffer from a severe... Read More

Hypocrisy of Over Regulation

All to often law makers and regulators create rules and... Read More

OPECs Swan Song?

Indonesia's Energy Minister, Purnomo Yusgiantoro, is unhappy with the modest... Read More

reliable maid service Wilmette ..