Limits of the President’s Power
Introduction
History has documented several instances where the president has used their power in injustice way, therefore its best to limit their power, especially on the exploitation of military force to protect the nation. For the Westgate burglars were an employee of the committee formed to re-elect President Nixon (00:12-00:15). Additionally, in 1970, a secret bombing campaign against neutral Cambodia (South East Asia) was disclosed to the public. This campaign was being plotted along with the American war in Vietnam.
Limits of the President’s Power
Currently, all aspirants, political parties, and committees are all on a strict contribution to the campaign funds. They are bound by the constitution to disclose how their budget to the last coin (expenditure and income). During Nixon’s era, several unethical practices entailing funds on the campaign occurred. Firstly, 0:54, there was a secret campaign to acquire funds in the white house by developing fake voter committees that reinforced Nixon and his laws to spy his opponents unlawfully. Moreover, there was a trade-off corruption incident where the firm “donated” four hundred thousand dollars to Nixon campaign, wherein return they were rewarded Department of justice to work in harmony to resolve lawsuit on antitrust.
The Freedom of Information Act (FIA) clearly defined the information that could be withheld. FIA stated only information that was classified correctly that could be withheld based on national security; this law allowed the judge to access the information and verify if it’s appropriately classified. About this (01:54) Nixon refused to submit information to the Congress among the conversation recordings in the White House.
Nixon had used his presidential power to acquire private tax data from the Internal Revenue Service (IRS) to taint the image of his opponent. Regarding this, Privacy Act passed a law on how organizations should collect, store, use, and distribute an individual’s personal information. The agencies were only allowed to use the information for legitimate purposes only, secure their servers, and only on written consent should the information be disclosed.