Management Matters Management MattersManagement Matters
Practical advice for federal leaders on managing people, processes and projects.

Nixon Intelligence

Presidents have peculiar relationships with the intelligence community. That is to say, most of them have only a faint understanding of how intelligence works.

Richard Helms, the late director of Central Intelligence under Lyndon Johnson and Richard Nixon, gave a bleak assessment of presidential savvy in his posthumous memoir, A Look Over My Shoulder: A Life in the Central Intelligence Agency (Random House, 2003): "No American president in a hundred years has had but a slight idea of how clandestine operations are conceived and run."

The one exception, Helms thought, was George H. W. Bush, who was himself once the DCI. "What presidents do know about secret intelligence," Helms wrote, "seems most often to come from high-spirited movies, novels, press coverage and, occasionally, bits of Washington insider gossip."

Every president has a personal relationship with the intelligence community, shaped by their own prejudices. Nixon -- who fired Helms in 1973 -- was no exception. He implicitly distrusted the CIA, which he regarded as a band of East Coast Ivy League intellectuals who conspired against him throughout his presidency. The story of Nixon and the intelligence community has been told largely through the personalities of the era. It focuses less on the role that the CIA and other agencies played in shaping Nixon-era policies.

Enter Timothy Naftali, a presidential historian, intelligence expert and, full disclosure, an erstwhile co-writer of this author. In July, Naftali became the first director of the new federal Richard Nixon Presidential Library and Museum in Yorba Linda, Calif. There was a private library in the same building, run by a foundation affiliated with the Nixon family, but Naftali is an employee of the National Archives and Records Administration. His tenure is widely seen as a turning point for the study of one of America's most controversial presidents.

So, how does Naftali, who used to teach intelligence history at the University of Virginia and Yale University, plan to treat that subject as part of the Nixon legacy? By putting it in broader context.

"Intelligence history has been ghettoized," Naftali says. "Intelligence is an input, classified information, and an activity, covert action. It has always been treated as a special input, but presidents see it as one of many, and covert action is just one action that a president has for implementing foreign policy."

Intelligence competes with many sources to shape a president's policies. For instance, days before Saddam Hussein invaded Kuwait in 1990, George H. W. Bush used classified intelligence to gauge the Iraqi leader's intentions. But Bush also personally reached out to friends in the region for information. "To get at the intangible part, Bush made phone calls," Naftali says.

Naftali hopes that, to the extent information is declassified, exhibits at the Nixon library can showcase intelligence as part of a more comprehensive story about the president's role in foreign policy. Take, for instance, the Yom Kippur War in which U.S intelligence figured prominently in the administration's decision-making. Naftali would like to include what the CIA and others were saying, and how Nixon and his aides reacted. In this sense, intelligence plays a role in Nixon history, but it's not the entire story, nor is Nixon the only character.

Naftali says Richard Helms told him, before he died in 2002, that when the president did meet with him personally, they spoke mostly about the war in Vietnam. Such limited, though important, discussions of intelligence would offer a window into the Nixon years if that's all there was to say. But if Naftali succeeds in weaving intelligence into the Nixon narrative, then we might gain fresh insights into one of our most mysterious presidents.

Shane Harris, a staff correspondent for National Journal, wrote about intelligence and technology at Government Executive for five years.

Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.